2024-07-05 10:48:29,989:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-07-05 10:48:29,989:DEBUG:certbot._internal.main:Arguments: [] 2024-07-05 10:48:29,990:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-07-05 10:48:30,818:DEBUG:certbot._internal.log:Root logging level set at 20 2024-07-05 10:48:30,818:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-07-05 10:48:30,856:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x0528AEF0> and installer <certbot._internal.cli.cli_utils._Default object at 0x0528AEF0> 2024-07-05 10:48:30,898:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 10:48:31,129:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 10:48:31,130:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2024-07-05 10:48:31,135:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2024-07-05 10:48:31,143:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:12 UTC. 2024-07-05 10:48:31,143:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 10:48:31,144:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 10:48:31,148:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04CDA610> Prep: True 2024-07-05 10:48:31,148:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04CDA610> and installer None 2024-07-05 10:48:31,148:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-05 10:48:31,154:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-07-05 10:48:31,155:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-05 10:48:31,158:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-05 10:48:31,649:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-05 10:48:31,650:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:48:29 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "QzWW0_lz9fE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-05 10:48:31,651:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-05 10:48:37,069:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8183_key-certbot.pem 2024-07-05 10:48:42,209:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8181_csr-certbot.pem 2024-07-05 10:48:42,210:DEBUG:acme.client:Requesting fresh nonce 2024-07-05 10:48:42,210:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-05 10:48:42,369:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-05 10:48:42,369:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:48:40 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: qqMiT6CkAjTskXsaKQjrgEHRqHzg95vm-nCQwSo3lZG6hjv6BWs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-05 10:48:42,370:DEBUG:acme.client:Storing nonce: qqMiT6CkAjTskXsaKQjrgEHRqHzg95vm-nCQwSo3lZG6hjv6BWs 2024-07-05 10:48:42,370:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-07-05 10:48:42,376:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tBalRza1hzYUtRanJnRUhScUh6Zzk1dm0tbkNRd1NvM2xaRzZoanY2QldzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "GsX-qhjOFwOPvdI4_EWiDFrUTpQ9cQsBngZl3Wz64AS3HG4yBzPNd-bljDZrq5WLdnGNJlzKwT6by5RSkUjskKFePWFJth77RI2j4Fl_HI1bNYiRGBh4zsyRs1sHEMmM8K4vBdxBe4ItravPC0Ic_p5c48Rm35G37N9LcQT96vwiD9E3znBAHo1j3RjtLYqHdOCi-eB5RknMTkHHYPjD-elkb7MqibVQz5bkDOtcmM__szc0R4AD275JbbqIWsZiwHtVS_9e_W51oqD0B6JcdveO-U347T3wRzpRa3TF9yqm5sSZ0RzVVCluB9d1OlLsfhUg4RLo2XFuaI-D6MdBNA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-05 10:48:42,546:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-07-05 10:48:42,547:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 05 Jul 2024 08:48:40 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963066047 Replay-Nonce: jqVAJFJ0q5B4MhIfJVhDdTm7zWGCNTLNBWCIAx6qMnQdt4lGMqc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:05Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123065917" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963066047" } 2024-07-05 10:48:42,547:DEBUG:acme.client:Storing nonce: jqVAJFJ0q5B4MhIfJVhDdTm7zWGCNTLNBWCIAx6qMnQdt4lGMqc 2024-07-05 10:48:42,547:DEBUG:acme.client:JWS payload: b'' 2024-07-05 10:48:42,553:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123065917: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBxNUI0TWhJZkpWaERkVG03eldHQ05UTE5CV0NJQXg2cU1uUWR0NGxHTXFjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMwNjU5MTcifQ", "signature": "IB5rdKzRsMMbPHm7MXx823JzeY2Qeg50GOW_fwsLOr503ZqyfZcCiuWdYdwaecG21JfEZOaYRrwVeKRpIgBCmGBxDOqhYs7k1aC6-w63DqSXk1wjf5a00lvszYJ_XNdbqNuH-sboTqbmjcizsXLmyv41UsCMx7iBMMkl0ENE7JSwN-Zsb1qhVTy8cq0V1o6f2BRDSJD8m87ypPprubvLqh3ZvjLCB0lhSXWKblQE6FM-39NT7Y_jbJpg605cGuHvFpDhUGTM893PI5E-vHZgxGCFD0y-tDfC5piJ2EoSdXXRjlXO5G41nl0mWgn9ok8XbTJSNr_JbVFvMhlpU8sE4g", "payload": "" } 2024-07-05 10:48:42,718:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123065917 HTTP/1.1" 200 810 2024-07-05 10:48:42,719:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:48:40 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: jqVAJFJ0noIyQk53r4tipOsoXErIkV6aAEuhJZlSpiBGzspAdh0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:05Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123065917/AopFCQ", "status": "pending", "token": "oZ9G6xAwEwS4CZiIJPgbxKNne0b9jdSOw26Q3r8jqQ4" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123065917/xbrZjg", "status": "pending", "token": "oZ9G6xAwEwS4CZiIJPgbxKNne0b9jdSOw26Q3r8jqQ4" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123065917/2pJhlw", "status": "pending", "token": "oZ9G6xAwEwS4CZiIJPgbxKNne0b9jdSOw26Q3r8jqQ4" } ] } 2024-07-05 10:48:42,720:DEBUG:acme.client:Storing nonce: jqVAJFJ0noIyQk53r4tipOsoXErIkV6aAEuhJZlSpiBGzspAdh0 2024-07-05 10:48:42,721:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-05 10:48:42,722:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-07-05 10:48:42,723:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-05 10:48:42,723:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-05 10:48:42,737:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 10:48:42,738:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-05 10:48:42,738:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-05 10:48:42,738:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-05 10:48:42,744:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 10:48:42,785:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 10:48:42,989:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 10:48:42,991:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-05 10:48:42,991:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-05 10:48:42,996:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:26 UTC. 2024-07-05 10:48:42,996:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 10:48:42,997:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 10:48:43,001:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x052709F0> Prep: True 2024-07-05 10:48:43,001:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x052709F0> and installer None 2024-07-05 10:48:43,001:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-05 10:48:43,017:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-07-05 10:48:43,018:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-05 10:48:43,020:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-05 10:48:43,466:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-05 10:48:43,466:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:48:41 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "gXamRqc5T0s": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-05 10:48:43,467:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-05 10:48:48,391:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8184_key-certbot.pem 2024-07-05 10:48:53,132:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8182_csr-certbot.pem 2024-07-05 10:48:53,133:DEBUG:acme.client:Requesting fresh nonce 2024-07-05 10:48:53,133:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-05 10:48:53,281:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-05 10:48:53,282:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:48:51 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: B-hK_YLC36cqlzJdIzjVa2fAdKOKq_r3slRTyO0Dnb9nvslng78 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-05 10:48:53,282:DEBUG:acme.client:Storing nonce: B-hK_YLC36cqlzJdIzjVa2fAdKOKq_r3slRTyO0Dnb9nvslng78 2024-07-05 10:48:53,282:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-07-05 10:48:53,289:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTEMzNmNxbHpKZEl6alZhMmZBZEtPS3FfcjNzbFJUeU8wRG5iOW52c2xuZzc4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "jl9sZhtBh1c-HAFNZKsC_s5LZYAbiaogMseDNxwoYE_O53s1hjCL9Ob-iA-AP7-IKPp_jcL3RItHzqk0r6pTLlau7ym2SallAmsZZrqpcoIYgiLq1WToAOKbMXtDpbkR_dMFpIwakoGCfMPV985zNT7xTBlWBkU6WE5Zr1Z6121kE_XDItdiCx645a18813BswzP_ZbcOjPH0FmnKXiM9HRKcniRhl8q2gRsWTkGxfgGVCOTG_RQ5JxW35JLgol3oGGzjYrcTWLL5i8yhyQ63T_vweypNlKTvsP-JbHV9YFycBXRGmNoSZ-CxMSK1gQyUQNORgl4-c9JfVnptMSRqQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-05 10:48:53,450:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-07-05 10:48:53,451:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 05 Jul 2024 08:48:51 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963103477 Replay-Nonce: eF-2qMJ96LRvGjDugv9ACNanV8kh7_LGGzAoiwNUGIXKqc6ZQoY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:16Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123121967" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963103477" } 2024-07-05 10:48:53,451:DEBUG:acme.client:Storing nonce: eF-2qMJ96LRvGjDugv9ACNanV8kh7_LGGzAoiwNUGIXKqc6ZQoY 2024-07-05 10:48:53,451:DEBUG:acme.client:JWS payload: b'' 2024-07-05 10:48:53,458:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123121967: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjk2TFJ2R2pEdWd2OUFDTmFuVjhraDdfTEdHekFvaXdOVUdJWEtxYzZaUW9ZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMxMjE5NjcifQ", "signature": "FswJ9WFK6lXSnfuyAGwdGfmcMYuCwaBKPsii-SNL314Vli2GB3CaDDptCh2BTJJqHdomw8aREecS6__FFm58wDlb2cNDrRkdSnWFhIBXUtobsH6cJK07oKUzcGjGzyorvvbN1meWiiNhUMsUG-aU14__gsLm4YyAtWSuIKXyZJUuq-PK3sRt86dnfdD7u5RYS-m2ah43-rZII5SS-Wmm9J2XcanPKm8nLgPoQrXXkqlOrsIIwYka5Kkwt4rFnDmWNfLNCM4STw0_AKRz-yzxmca5zOmx9CD-FK0SHElTlFVZeLypgwT_XQU3KPZHNJhuJ_3zBpjAi9yunwSU9VJ7vw", "payload": "" } 2024-07-05 10:48:53,624:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123121967 HTTP/1.1" 200 804 2024-07-05 10:48:53,625:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:48:51 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: B-hK_YLCxEcIxGGFGj-pmxNWH431sCGiWbm2F02Qp0naaIvST2Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:16Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123121967/Ag883A", "status": "pending", "token": "92rAkg4FmWXDWDjFdZUukAMT34AdSrJ47Vp7Q_ZZoW0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123121967/g4f58w", "status": "pending", "token": "92rAkg4FmWXDWDjFdZUukAMT34AdSrJ47Vp7Q_ZZoW0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123121967/s77iUg", "status": "pending", "token": "92rAkg4FmWXDWDjFdZUukAMT34AdSrJ47Vp7Q_ZZoW0" } ] } 2024-07-05 10:48:53,625:DEBUG:acme.client:Storing nonce: B-hK_YLCxEcIxGGFGj-pmxNWH431sCGiWbm2F02Qp0naaIvST2Y 2024-07-05 10:48:53,626:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-05 10:48:53,626:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-07-05 10:48:53,627:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-05 10:48:53,627:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-05 10:48:53,628:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 10:48:53,628:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-05 10:48:53,628:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-05 10:48:53,629:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-05 10:48:53,630:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 10:48:53,683:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 10:48:53,867:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 10:48:53,868:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-05 10:48:53,869:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-05 10:48:53,873:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:40 UTC. 2024-07-05 10:48:53,873:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 10:48:53,874:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 10:48:53,879:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04CDA610> Prep: True 2024-07-05 10:48:53,879:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04CDA610> and installer None 2024-07-05 10:48:53,879:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-05 10:48:53,891:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-07-05 10:48:53,892:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-05 10:48:53,894:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-05 10:48:54,340:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-05 10:48:54,341:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:48:52 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "1TwvSg_ALtE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-05 10:48:54,342:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-05 10:48:59,350:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8185_key-certbot.pem 2024-07-05 10:49:03,993:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8183_csr-certbot.pem 2024-07-05 10:49:03,994:DEBUG:acme.client:Requesting fresh nonce 2024-07-05 10:49:03,994:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-05 10:49:04,143:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-05 10:49:04,144:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:49:02 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: eF-2qMJ92hlPalVOVoy_zR03c9c_NUwqYqGVzzqG1wv4wDIz2CY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-05 10:49:04,144:DEBUG:acme.client:Storing nonce: eF-2qMJ92hlPalVOVoy_zR03c9c_NUwqYqGVzzqG1wv4wDIz2CY 2024-07-05 10:49:04,144:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-07-05 10:49:04,150:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjkyaGxQYWxWT1ZveV96UjAzYzljX05Vd3FZcUdWenpxRzF3djR3REl6MkNZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "PUraSyf42u1sK3MzhuxoHFNjS0bjrdtDRtiGovadVFPy_3m6SPr_cLDw5f3xgeBYUM1oMGisrqgjvze4-Wty542BrGjR4NNHUK6CFMd4cy5rY-qZz0M4odALF0xuu924OAbWcIAvTaOCjat4w1nadrCHiXDlBMX-QvcyCQjPegrZTeBfE814xOSxiXXrGggkwQ5Q_WAln81murdzpZv4bNeSX9-FKZ2j47JTVUNX1vUfuMY_ob-J-tpFbf4g0jqf4A8LNg7V7wjSnfFQaiOsBHb3GXPrSJS1zVec8fWgr-OZWLrjx3Sg1vIOUij0emGFtLTZg_9lfhHDdUl8z6gYtA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-05 10:49:04,311:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-07-05 10:49:04,312:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 05 Jul 2024 08:49:02 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963135847 Replay-Nonce: B-hK_YLCy-_r1Zxz2Algy1YfxKs8K7HD3iw6_VKa_vZKUR80ALE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:27Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123171097" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963135847" } 2024-07-05 10:49:04,312:DEBUG:acme.client:Storing nonce: B-hK_YLCy-_r1Zxz2Algy1YfxKs8K7HD3iw6_VKa_vZKUR80ALE 2024-07-05 10:49:04,313:DEBUG:acme.client:JWS payload: b'' 2024-07-05 10:49:04,319:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123171097: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTEN5LV9yMVp4ejJBbGd5MVlmeEtzOEs3SEQzaXc2X1ZLYV92WktVUjgwQUxFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMxNzEwOTcifQ", "signature": "T2KNhvIIK6vSEUmtIXwNVmsXWjlkrmM_qCVfMa4XzjasZunFU-Y820eck7zc_sfReveob9qusm2nwrzFDA8fSxfMxZ64H65hO90ee2en_PDl5xKAm3PPObt4X0XKw787ePoXnJfrvzK2Nrh2Uu5lb39tCpIDqqV83cHYDWXwxoZdbOD5o-oLHppVEXXhDJkJ2d3-uCWtodMZlWZvfOjCMmImukISClQ4EQdndnkow7LVAw6d02BunirX-FWfXmpYESn7zLvb3ER1f3ZfhLi4EhQ3pj7bm5CYDkU11q_MWJeq-jOFwTeZ1iBmWlFXUM1wf8uMCq4eIqqljvAz55rAPQ", "payload": "" } 2024-07-05 10:49:04,471:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123171097 HTTP/1.1" 200 807 2024-07-05 10:49:04,471:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:49:02 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: eF-2qMJ94fjxKvDjeUyJSc3bpP8sIQXSrjOoZnbvlpduGJV8Gwk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:27Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123171097/vQZynA", "status": "pending", "token": "gy1F1Yd4iDVgUOSDLa4rYsr2nxTIYkDwl8IuhC7mDPo" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123171097/XD91Zg", "status": "pending", "token": "gy1F1Yd4iDVgUOSDLa4rYsr2nxTIYkDwl8IuhC7mDPo" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123171097/qlRt6w", "status": "pending", "token": "gy1F1Yd4iDVgUOSDLa4rYsr2nxTIYkDwl8IuhC7mDPo" } ] } 2024-07-05 10:49:04,471:DEBUG:acme.client:Storing nonce: eF-2qMJ94fjxKvDjeUyJSc3bpP8sIQXSrjOoZnbvlpduGJV8Gwk 2024-07-05 10:49:04,472:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-05 10:49:04,472:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-07-05 10:49:04,473:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-05 10:49:04,473:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-05 10:49:04,474:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 10:49:04,474:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-05 10:49:04,474:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-05 10:49:04,474:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-05 10:49:04,475:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 10:49:04,515:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 10:49:04,692:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 10:49:04,694:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-05 10:49:04,695:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-05 10:49:04,700:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:54 UTC. 2024-07-05 10:49:04,700:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 10:49:04,700:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 10:49:04,705:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04CBE030> Prep: True 2024-07-05 10:49:04,706:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04CBE030> and installer None 2024-07-05 10:49:04,706:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-05 10:49:04,711:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-07-05 10:49:04,712:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-05 10:49:04,714:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-05 10:49:05,164:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-05 10:49:05,165:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:49:03 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "b0YW1_BW9Vk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-05 10:49:05,165:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-05 10:49:09,975:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8186_key-certbot.pem 2024-07-05 10:49:14,590:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8184_csr-certbot.pem 2024-07-05 10:49:14,590:DEBUG:acme.client:Requesting fresh nonce 2024-07-05 10:49:14,591:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-05 10:49:14,741:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-05 10:49:14,741:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:49:12 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: B-hK_YLC0yfwDVqDbe2kOLqpoqzCP_FZza3RFDqIEVUjA_bjRdg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-05 10:49:14,742:DEBUG:acme.client:Storing nonce: B-hK_YLC0yfwDVqDbe2kOLqpoqzCP_FZza3RFDqIEVUjA_bjRdg 2024-07-05 10:49:14,742:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-07-05 10:49:14,750:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTEMweWZ3RFZxRGJlMmtPTHFwb3F6Q1BfRlp6YTNSRkRxSUVWVWpBX2JqUmRnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ASXhwJA8dcror_vWEE98ajaUnNA0BV4SyzEN1Rxoq28XL6OngcX_dI6UpnxCbUswq7bXnaqUgHDJjqRX4gLsUmJvG6A77ixLQxDOIcHGrpHAAskPNIHxoFrhnO-RbWAhMaf6vvk4zAxZGXcwNkRQwqWTKTQCsmu9H_QkDEclgnP83Cz2dF9pVomApOXDus26pH5loNX58Zyit7iU7Y5bXOYA7LoeV3BUZ8R9jsX-vhUkc71r9zAUkzsHz5tjRpBy8qeernDFgnnpqh9N8BjKt2KsU5Qu7bYYflt8HGp1O2uy0eT8L48a78DK6InJcoYSQqPosug02jtELUAp6eaHIQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-05 10:49:14,913:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-07-05 10:49:14,913:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 05 Jul 2024 08:49:12 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963164787 Replay-Nonce: B-hK_YLC7TNFDxIGxMcI8XMkvGgxyZXDeVJdKt4TQiiFu2eeS58 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:38Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123214537" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963164787" } 2024-07-05 10:49:14,914:DEBUG:acme.client:Storing nonce: B-hK_YLC7TNFDxIGxMcI8XMkvGgxyZXDeVJdKt4TQiiFu2eeS58 2024-07-05 10:49:14,914:DEBUG:acme.client:JWS payload: b'' 2024-07-05 10:49:14,920:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123214537: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTEM3VE5GRHhJR3hNY0k4WE1rdkdneHlaWERlVkpkS3Q0VFFpaUZ1MmVlUzU4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMyMTQ1MzcifQ", "signature": "iEoAIu3QtaGO_qnJscue8_ownbaS5V1ZwmdHn0dGhLwq8zM11Tgm5Rn-WTSD-Jod0F6j5vqT0Kuxy1kxmfhNR8JJrINLMQRHdm1SSsH_-ynyL2ruKpw5s0hRtiBn9pz17f83RBQFkaiTYjYi82_KGxvkPWrHzgs9JeAGUPE_a-5f7bzzjjVDWBIEQsrh4Hazxk1i6uralnDw6NRTrjV12I0LugAzPHv-OPVbaT5RrCg_i4VPWxwTBRibRI6pduF1TC2KtcZ3VTXjrdbEX_JdjCTz6Nr2Gvbhn-jffeIEm7cYkCfiuT-b1waeC9U7MgkTmr1wIf-RBpVCK0fNqq0f1w", "payload": "" } 2024-07-05 10:49:15,075:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123214537 HTTP/1.1" 200 801 2024-07-05 10:49:15,076:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:49:13 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: B-hK_YLCalxHAHGRAjIwv2HgcaYxaaxrbYxGufI3savljRIp5iA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:38Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123214537/FMZRsw", "status": "pending", "token": "4A-GU-gmUb8V_U_TFgjrqWrIQIHWSTkyvrB5EuDMS3A" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123214537/6lpfOw", "status": "pending", "token": "4A-GU-gmUb8V_U_TFgjrqWrIQIHWSTkyvrB5EuDMS3A" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123214537/gp7pwg", "status": "pending", "token": "4A-GU-gmUb8V_U_TFgjrqWrIQIHWSTkyvrB5EuDMS3A" } ] } 2024-07-05 10:49:15,076:DEBUG:acme.client:Storing nonce: B-hK_YLCalxHAHGRAjIwv2HgcaYxaaxrbYxGufI3savljRIp5iA 2024-07-05 10:49:15,076:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-05 10:49:15,077:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-07-05 10:49:15,077:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-05 10:49:15,077:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-05 10:49:15,078:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 10:49:15,078:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-05 10:49:15,079:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-05 10:49:15,079:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-05 10:49:15,080:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 10:49:15,118:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 10:49:15,300:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 10:49:15,301:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-05 10:49:15,302:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-05 10:49:15,308:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:09 UTC. 2024-07-05 10:49:15,309:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 10:49:15,309:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 10:49:15,314:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04CF1290> Prep: True 2024-07-05 10:49:15,314:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04CF1290> and installer None 2024-07-05 10:49:15,315:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-05 10:49:15,321:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-07-05 10:49:15,322:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-05 10:49:15,325:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-05 10:49:15,770:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-05 10:49:15,771:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:49:13 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "zzyy3PMobXc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-05 10:49:15,771:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-05 10:49:20,996:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8187_key-certbot.pem 2024-07-05 10:49:25,698:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8185_csr-certbot.pem 2024-07-05 10:49:25,698:DEBUG:acme.client:Requesting fresh nonce 2024-07-05 10:49:25,698:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-05 10:49:25,847:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-05 10:49:25,848:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:49:23 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: eF-2qMJ91GwPfHc4FSXZMT5ACcK33eXjpbA6Vk0VqGs20zwsquw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-05 10:49:25,848:DEBUG:acme.client:Storing nonce: eF-2qMJ91GwPfHc4FSXZMT5ACcK33eXjpbA6Vk0VqGs20zwsquw 2024-07-05 10:49:25,848:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-07-05 10:49:25,853:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjkxR3dQZkhjNEZTWFpNVDVBQ2NLMzNlWGpwYkE2VmswVnFHczIwendzcXV3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "eQoceF9wBIeyqHrDSSoR7XqVEy89rf1xOCJGk3I-IiwS7-n5Wf0hMuW2Arx-enSgmoVeaLrafYN7alWS8gLAXzTd_smJQksrHccXt21Ks5ndEfLPtmzolX4tRQO0N0ZxPiZwYM74KhkV72HDsnBLJP2nDKQcPwZsPlyFUTLLle_wuvvcc1Ys3yenyzKxFeyL_-JrANQBo8vgLajEeOqzOQ5dFRGere-U4N-AIE_rbA-lsz5lTq1ihmruJ2NiJEn-D4fiDNHqusckY7Pt1eDQwG9SrcXH5kc0v1_3lawPutSHod8wQe_jvDQZewRSsYuzetA6FhXwDVmG_4IVyE85Hg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-05 10:49:26,017:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-05 10:49:26,018:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 05 Jul 2024 08:49:24 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963193117 Replay-Nonce: B-hK_YLC7EDKKN6YeadFkFqP8v23dLn6CrppO4x2dyD6xAHKyQI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:49Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123258277" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963193117" } 2024-07-05 10:49:26,018:DEBUG:acme.client:Storing nonce: B-hK_YLC7EDKKN6YeadFkFqP8v23dLn6CrppO4x2dyD6xAHKyQI 2024-07-05 10:49:26,018:DEBUG:acme.client:JWS payload: b'' 2024-07-05 10:49:26,024:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123258277: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTEM3RURLS042WWVhZEZrRnFQOHYyM2RMbjZDcnBwTzR4MmR5RDZ4QUhLeVFJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMyNTgyNzcifQ", "signature": "Yc9Oi5tBR78P6N4y-pRUY9J_Mncnxb61tOzNIueaI_G-dJN-kL8t6QpzipXSrY1ESPbtPHgXPH75pO8UD-HBmKcSkIF4tWEAw9NqE538FpQLaCPdGiJ7117gE2-OldH6DPTZxIulEk3aYQk4FKYRJBw_6iOiVKzuniIc-riTpcCVqlV9uQ6zhaFee6O8M5Fn7ln7D6_K6eTbe6BJVPl49Bg92hDoOUQ3b1H6hQG30tAO10Ln6jIYW6jFF7AcSGLwBJ8E16zd4GzEDElu3nfh3RAUhHKgGfHeNJA-m1aeEC1DtdmVrHtuWvoI-1z5rXTnbvJkOyAX_twoFW9_JbKL1g", "payload": "" } 2024-07-05 10:49:26,177:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123258277 HTTP/1.1" 200 805 2024-07-05 10:49:26,178:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:49:24 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: eF-2qMJ9-roQ1ol_9aKNSizfZYXRi7-8s-hVnlSoR3GRCm5VjqQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:49Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123258277/7Y8QQA", "status": "pending", "token": "ILZIh76BP24PmbX0hDnhyA52SUs2CCLrasbf1wWz400" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123258277/6IRQnQ", "status": "pending", "token": "ILZIh76BP24PmbX0hDnhyA52SUs2CCLrasbf1wWz400" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123258277/ZS_Kuw", "status": "pending", "token": "ILZIh76BP24PmbX0hDnhyA52SUs2CCLrasbf1wWz400" } ] } 2024-07-05 10:49:26,178:DEBUG:acme.client:Storing nonce: eF-2qMJ9-roQ1ol_9aKNSizfZYXRi7-8s-hVnlSoR3GRCm5VjqQ 2024-07-05 10:49:26,179:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-05 10:49:26,179:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-07-05 10:49:26,180:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-05 10:49:26,180:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-05 10:49:26,181:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 10:49:26,181:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-05 10:49:26,181:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-05 10:49:26,182:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-05 10:49:26,183:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 10:49:26,236:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 10:49:26,428:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 10:49:26,429:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-05 10:49:26,430:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-05 10:49:26,434:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:26 UTC. 2024-07-05 10:49:26,434:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 10:49:26,435:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 10:49:26,440:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x03D12290> Prep: True 2024-07-05 10:49:26,441:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x03D12290> and installer None 2024-07-05 10:49:26,441:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-05 10:49:26,456:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-07-05 10:49:26,457:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-05 10:49:26,459:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-05 10:49:26,903:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-05 10:49:26,904:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:49:24 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "D3FgFkPwj4k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-05 10:49:26,904:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-05 10:49:31,628:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8188_key-certbot.pem 2024-07-05 10:49:36,298:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8186_csr-certbot.pem 2024-07-05 10:49:36,298:DEBUG:acme.client:Requesting fresh nonce 2024-07-05 10:49:36,299:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-05 10:49:36,448:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-05 10:49:36,449:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:49:34 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: B-hK_YLC3sinYje8hgtYUpcp1UBjSNssBrIcMg9YCTEc37vvWpw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-05 10:49:36,449:DEBUG:acme.client:Storing nonce: B-hK_YLC3sinYje8hgtYUpcp1UBjSNssBrIcMg9YCTEc37vvWpw 2024-07-05 10:49:36,449:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-07-05 10:49:36,456:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTEMzc2luWWplOGhndFlVcGNwMVVCalNOc3NCckljTWc5WUNURWMzN3Z2V3B3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "cwDWDJ341_BoEbdOYmd-d6TPF0XMmPOTdDvDmh977CPRMFu7-LTPWfMaqfRXpwW2Eim12OxZfKDAqsKEsyqmVByhZ4RehoUM5Z0TP0rI0aa51IgdHL-xsvKuTf9cea8nkB2R_q5LSC0fc_utI3hXYveLbq-334niPx3EDUdfbEs1EIV8iARqJeEsZ0rZTgCc5jijpb1URL89WVfQsDyUztKo4sobfSDpY4SLKKELqZ9UvDy0GxWmOcj5m08FtJ_N7Po6h_JTfZGY1CZFWIYjug4iigDKdKNyczXeh-kaJnkwY5Nv_b4XF8z-WZqiOmMwHdCNwIO8P8HxcvT2ZkiiKQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-05 10:49:36,622:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-07-05 10:49:36,623:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 05 Jul 2024 08:49:34 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963222697 Replay-Nonce: B-hK_YLCAEV4ApxTPalfhwft5YVtsMCWkqsmA8FLfcAaRb1v_CY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:59Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123301867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963222697" } 2024-07-05 10:49:36,623:DEBUG:acme.client:Storing nonce: B-hK_YLCAEV4ApxTPalfhwft5YVtsMCWkqsmA8FLfcAaRb1v_CY 2024-07-05 10:49:36,624:DEBUG:acme.client:JWS payload: b'' 2024-07-05 10:49:36,630:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123301867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENBRVY0QXB4VFBhbGZod2Z0NVlWdHNNQ1drcXNtQThGTGZjQWFSYjF2X0NZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMzMDE4NjcifQ", "signature": "D3I9jDXi-60GIYPSERsZdPEb5Ywt-jU9gj-ketjokZZTEPvrTcyLFRvI_pWhrFLlzMOUjXOlfx-5-Kk00LfrGFAWzeMOVh_J5Qyt3x5Fhot9O2l7yHHU3CHMBpgkyr9A5Mh7_TaLbLVPZOCP1SiJ_jlzkSK6U1kYENZQNaehmPYydTVEuIO4sYtjrg5TytcmXjtiYUbzBrPM4SpEFakcaLPdEZzcoBRGsFhQ6bJYjDeS2AC8-UxA0D73wjCOFZeqgiHgOUoYdjS9XTGbq1ZQBzkbYJndcL07xCvA6QB7lWzxmB3sMwgkiur6VZVEYOwTuZz75AdgsvQKD3IUpHU5qA", "payload": "" } 2024-07-05 10:49:36,784:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123301867 HTTP/1.1" 200 809 2024-07-05 10:49:36,784:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:49:34 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: eF-2qMJ93VlaWyh41ChQ6w-eedmnBanXgFtiKXNp1o4RcxHvn9s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:59Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123301867/VjMp2w", "status": "pending", "token": "36L88NDkWSNEPcDsROWIUpbt0tyBKr4cI-DFwT9ug94" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123301867/GGZVqQ", "status": "pending", "token": "36L88NDkWSNEPcDsROWIUpbt0tyBKr4cI-DFwT9ug94" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123301867/GI9X-A", "status": "pending", "token": "36L88NDkWSNEPcDsROWIUpbt0tyBKr4cI-DFwT9ug94" } ] } 2024-07-05 10:49:36,785:DEBUG:acme.client:Storing nonce: eF-2qMJ93VlaWyh41ChQ6w-eedmnBanXgFtiKXNp1o4RcxHvn9s 2024-07-05 10:49:36,785:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-05 10:49:36,786:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-07-05 10:49:36,787:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-05 10:49:36,787:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-05 10:49:36,788:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 10:49:36,788:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-05 10:49:36,788:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-05 10:49:36,789:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-05 10:49:36,790:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 10:49:36,829:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 10:49:37,005:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 10:49:37,006:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is signed by the certificate's issuer. 2024-07-05 10:49:37,007:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD 2024-07-05 10:49:37,011:INFO:certbot._internal.renewal:Cert not yet due for renewal 2024-07-05 10:49:37,015:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 10:49:37,054:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 10:49:37,253:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 10:49:37,255:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-05 10:49:37,255:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-05 10:49:37,260:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:40 UTC. 2024-07-05 10:49:37,260:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 10:49:37,260:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 10:49:37,265:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05580C50> Prep: True 2024-07-05 10:49:37,265:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05580C50> and installer None 2024-07-05 10:49:37,265:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-05 10:49:37,281:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-07-05 10:49:37,282:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-05 10:49:37,284:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-05 10:49:37,730:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-05 10:49:37,730:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:49:35 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "huipM93exCU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-05 10:49:37,730:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-05 10:49:42,538:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8189_key-certbot.pem 2024-07-05 10:49:47,155:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8187_csr-certbot.pem 2024-07-05 10:49:47,156:DEBUG:acme.client:Requesting fresh nonce 2024-07-05 10:49:47,156:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-05 10:49:47,307:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-05 10:49:47,307:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:49:45 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: B-hK_YLCx6PQG5uO5lBFpugRWnXfPLuA1YxSLOuN6l0tl0SOYZQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-05 10:49:47,307:DEBUG:acme.client:Storing nonce: B-hK_YLCx6PQG5uO5lBFpugRWnXfPLuA1YxSLOuN6l0tl0SOYZQ 2024-07-05 10:49:47,308:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-07-05 10:49:47,314:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTEN4NlBRRzV1TzVsQkZwdWdSV25YZlBMdUExWXhTTE91TjZsMHRsMFNPWVpRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "MtVJhrtrmvSaOtqsZpvRsuoku-NjNXccKMoZntffF_wsmpHvnfyDodnGtDv-dSiLS7m37J-0dP4uJr1fEBD4hMoNdRdaO8QbElIZH9xPhuYaNZ012tJ7I3KX5HdnvUBVaEOJEop3pDaM-kRFBt_VtN1xE-oqv-D8KV_8zJYEZHYCH4ELg9UKg_Xr2c0RFJyTdb216Hhqav-ymESy8eJ-aZOEJ045L0PGmYWolBNHCA1mu_3He6EzX4_MZhkNTThxsXPh3IDfBnzwLLrOa9YhCGBnwrn9_N_AbFB-5hfQ-iNUd6MUJpN73uvMtQBIHmFdaJLnPKtc3Hj9NG2MjugyWA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-05 10:49:47,476:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-07-05 10:49:47,476:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 05 Jul 2024 08:49:45 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963261767 Replay-Nonce: B-hK_YLCI1OUXT5C7ttSL85Gb-PNJINbc_TqsTm72VZMLHaGpik X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:18:10Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123357867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963261767" } 2024-07-05 10:49:47,476:DEBUG:acme.client:Storing nonce: B-hK_YLCI1OUXT5C7ttSL85Gb-PNJINbc_TqsTm72VZMLHaGpik 2024-07-05 10:49:47,477:DEBUG:acme.client:JWS payload: b'' 2024-07-05 10:49:47,483:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123357867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENJMU9VWFQ1Qzd0dFNMODVHYi1QTkpJTmJjX1Rxc1RtNzJWWk1MSGFHcGlrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMzNTc4NjcifQ", "signature": "tPRXKxC8N_as5sYp3NHI8BfhK1egLhZANjUMDejwlKsMT7TAN2DNSSaxmcdbMhvjPVpgh6j9HgkbbzcCYRo88E2L5F_mqQ09ANSNtpHVZXtutNYUlqijCGJkMX--CCbLuH22nQhjNaYbI8gXwe8elrs0snHuprHAzCG2RnbumDYd-dX9SzE0paAqZFiezYFoBUTGOyj5nGbY4g1FWbrqlXrGGeAnba1T1GOEd-8Q_fM3Gjv0hdDU3oz6VQ0YWQ7knfIAf9Ej6VM1-6nYAdKV8UIsFYOfBXRsPDIA4usTZy9N90rKhs5H3LzvwzyxsmOClrwATGZC-X43cyQPJ3o5NA", "payload": "" } 2024-07-05 10:49:47,635:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123357867 HTTP/1.1" 200 806 2024-07-05 10:49:47,635:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:49:45 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: B-hK_YLCPzbzgsNVPfMPz-smclbgUR2SaU_jm6r1r5Leo_ZS2DQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:18:10Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123357867/mRUn6w", "status": "pending", "token": "vR57CfJIiEzBkyxS5-OQeudZZpEMMl4X5XMNjQG9OUU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123357867/Flovww", "status": "pending", "token": "vR57CfJIiEzBkyxS5-OQeudZZpEMMl4X5XMNjQG9OUU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123357867/ejtuAg", "status": "pending", "token": "vR57CfJIiEzBkyxS5-OQeudZZpEMMl4X5XMNjQG9OUU" } ] } 2024-07-05 10:49:47,635:DEBUG:acme.client:Storing nonce: B-hK_YLCPzbzgsNVPfMPz-smclbgUR2SaU_jm6r1r5Leo_ZS2DQ 2024-07-05 10:49:47,636:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-05 10:49:47,636:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-07-05 10:49:47,637:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-05 10:49:47,637:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-05 10:49:47,638:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 10:49:47,638:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-05 10:49:47,638:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-05 10:49:47,639:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-05 10:49:47,640:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 10:49:47,690:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-07-05 10:49:47,691:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 10:49:47,691:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-07-05 10:49:47,698:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-07-05 10:49:47,700:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-07-05 10:49:47,700:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-07-05 10:49:47,700:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-07-05 10:49:47,701:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-07-05 10:49:47,704:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-07-05 10:49:47,744:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 10:49:47,797:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 10:49:47,798:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-05 10:49:47,799:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-05 10:49:47,804:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:58 UTC. 2024-07-05 10:49:47,804:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 10:49:47,805:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 10:49:47,810:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05294530> Prep: True 2024-07-05 10:49:47,810:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05294530> and installer None 2024-07-05 10:49:47,810:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-05 10:49:47,815:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-07-05 10:49:47,816:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-05 10:49:47,818:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-05 10:49:48,285:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-05 10:49:48,286:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:49:46 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "MhrzNqyyKnE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-05 10:49:48,286:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-05 10:49:53,123:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8190_key-certbot.pem 2024-07-05 10:49:57,625:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8188_csr-certbot.pem 2024-07-05 10:49:57,625:DEBUG:acme.client:Requesting fresh nonce 2024-07-05 10:49:57,626:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-05 10:49:57,783:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-05 10:49:57,783:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:49:55 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: jqVAJFJ0AOroGTZadZXoI6th2zQdFcs-RSf3LN6q0VCMek0PCMs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-05 10:49:57,783:DEBUG:acme.client:Storing nonce: jqVAJFJ0AOroGTZadZXoI6th2zQdFcs-RSf3LN6q0VCMek0PCMs 2024-07-05 10:49:57,783:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-07-05 10:49:57,789:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBBT3JvR1RaYWRaWG9JNnRoMnpRZEZjcy1SU2YzTE42cTBWQ01lazBQQ01zIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "DoWWvKCZrMZ5758MAmJiLspbtGkhdzP2zY9EG4AQiKxnJoR9U881zjetWtimp1k7FqZhTnB477BLerZPHGoEGTzpE2lEqIfHF47JOVCQb4WGBPuDp3Kx_nS2u9dDkQtttgWG3Qke5axoa6B7Ym3gGcTr2E3tDH8w02WlcF398XM-FtryC78fai0hBJmrTyXdMnmmBGGex5fC2z9xmo5RAE3O6RUI8WvqO3Ivpj2d1k0_M5bhsGmCEaCND7dh-ib2OjVTR69y3JvmrjTbxenLel-la1K2WLrmqZiVcisPaXTh_HE3Vn1SQ1lzHmrPPcCHU-HNRhcNFPL8-1AzZ16jgA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-05 10:49:57,958:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-07-05 10:49:57,959:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 05 Jul 2024 08:49:55 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963292297 Replay-Nonce: qqMiT6CkHZr7_8tMcciSiKjDww8UOF2TVaAGnsOhv26f0obK_sk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:18:20Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123407597" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963292297" } 2024-07-05 10:49:57,959:DEBUG:acme.client:Storing nonce: qqMiT6CkHZr7_8tMcciSiKjDww8UOF2TVaAGnsOhv26f0obK_sk 2024-07-05 10:49:57,959:DEBUG:acme.client:JWS payload: b'' 2024-07-05 10:49:57,970:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123407597: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tIWnI3Xzh0TWNjaVNpS2pEd3c4VU9GMlRWYUFHbnNPaHYyNmYwb2JLX3NrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM0MDc1OTcifQ", "signature": "Y5kixsiHP6xlzF9hedYZqH4IUND8ZsRDwz7J7aaW1_0QiY4S0qIzi4uDADugzqY3K1eiMrjhAdvZFsiCKr2us4IjYvVoIu1Fq3LCu6Rd7aEDitZzykNTSSLrvu1CG0MddZkX_rOlkoRgeU5x6Ns6QGq-9Qb7ojj_H3pkkjV8VYRfSKQ9T-VfIRiyaA1LzPTwjW-P_VGWZKPV8TtXEOvs2r8fTCfW6w_brn72FblvtkaHM2BL6_dxFn9kGEYl-P-E0N15aT-56jDUGiT1-uYt1x6DPAC-QOh5wAveXX4h_KF7jXWgduGDVl-M8aX8sh7bC4maUZvvpKUT-IRwbrAhhg", "payload": "" } 2024-07-05 10:49:58,132:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123407597 HTTP/1.1" 200 811 2024-07-05 10:49:58,132:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:49:56 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: jqVAJFJ0bWHAnTzAtJMv831G4koyXi5OMPMw_6o678ESGwIIarI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:18:20Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123407597/PlHedw", "status": "pending", "token": "c5NxYNQ8WjSBVHJ7l0AB7_0jPNRAMHulYIw8_gBxlCM" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123407597/IGmPMQ", "status": "pending", "token": "c5NxYNQ8WjSBVHJ7l0AB7_0jPNRAMHulYIw8_gBxlCM" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123407597/vPSuUg", "status": "pending", "token": "c5NxYNQ8WjSBVHJ7l0AB7_0jPNRAMHulYIw8_gBxlCM" } ] } 2024-07-05 10:49:58,133:DEBUG:acme.client:Storing nonce: jqVAJFJ0bWHAnTzAtJMv831G4koyXi5OMPMw_6o678ESGwIIarI 2024-07-05 10:49:58,133:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-05 10:49:58,134:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-07-05 10:49:58,134:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-05 10:49:58,135:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-05 10:49:58,136:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 10:49:58,136:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-05 10:49:58,136:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-05 10:49:58,137:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-05 10:49:58,138:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 10:49:58,190:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 10:49:58,370:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 10:49:58,371:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-05 10:49:58,372:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-05 10:49:58,377:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:15 UTC. 2024-07-05 10:49:58,378:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 10:49:58,378:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 10:49:58,383:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05597E10> Prep: True 2024-07-05 10:49:58,383:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05597E10> and installer None 2024-07-05 10:49:58,384:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-05 10:49:58,387:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-07-05 10:49:58,388:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-05 10:49:58,390:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-05 10:49:58,859:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-05 10:49:58,860:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:49:56 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "f8wY1bTw7KA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-05 10:49:58,860:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-05 10:50:03,630:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8191_key-certbot.pem 2024-07-05 10:50:07,907:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8189_csr-certbot.pem 2024-07-05 10:50:07,907:DEBUG:acme.client:Requesting fresh nonce 2024-07-05 10:50:07,908:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-05 10:50:08,065:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-05 10:50:08,066:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:50:06 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: qqMiT6CkQMPXO4Sjawcuy1UxToA4t-amfPIGWVs6eYsNsQmVqls X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-05 10:50:08,066:DEBUG:acme.client:Storing nonce: qqMiT6CkQMPXO4Sjawcuy1UxToA4t-amfPIGWVs6eYsNsQmVqls 2024-07-05 10:50:08,066:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-07-05 10:50:08,072:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tRTVBYTzRTamF3Y3V5MVV4VG9BNHQtYW1mUElHV1ZzNmVZc05zUW1WcWxzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "RkzbFAMXJ2myVd6lXfx6OjQouX1nWq_0d1lZOt5GLO4zX6hr0Doo-jxAu75bo3hCPpooMb8s9ncSpGGp-Jtrr2-BSSk_tBLmzh6X3dLV1AaimXi8Ckcs4Ng_AR66nPB18Lwv4SfHoPjBUDY-3uYthTbkd7mVH7GZZsJCENPbJr8NyIVAY6tQk8pe8X3rXaycHUZHi69LIkraVpPePodTInhdpIC7iC8fd6jVzxpCOuyDz-s1-z9JrdbUh07GPJzmaR2wjvRz6bEfn4owFwksX5ZnW4BRdjtZUa6W0IoTtY5M75i5h9b0ZZYY6xYRQtz--_VL7rQbBFrK9Yff_V1t3Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-05 10:50:08,239:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-07-05 10:50:08,240:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 05 Jul 2024 08:50:06 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963320687 Replay-Nonce: qqMiT6Ckk5Y5oIRe7I84D4KGKBD8xfWIqep-dmlxAFaoqRGmd_k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:18:30Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123452997" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963320687" } 2024-07-05 10:50:08,240:DEBUG:acme.client:Storing nonce: qqMiT6Ckk5Y5oIRe7I84D4KGKBD8xfWIqep-dmlxAFaoqRGmd_k 2024-07-05 10:50:08,240:DEBUG:acme.client:JWS payload: b'' 2024-07-05 10:50:08,246:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123452997: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2trNVk1b0lSZTdJODRENEtHS0JEOHhmV0lxZXAtZG1seEFGYW9xUkdtZF9rIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM0NTI5OTcifQ", "signature": "q0ND4seicrRYg6f_8IXwBpe7LuXYp9PqWDwNKj-G8Z29dGsJq4kRi6-uY4VZKPAVwc6ip1Zn5vBXluK0HNAcly4O7f5FfvdsP25NRsXFZcIBFGCFrodlG_b2sIAXwZMlLEUuRvdcgcPb-GBvns-DULBxo3OzrVh4Z2p1dwUwjzHfve_mXp-IRaHxf_8BHAm6riamYOr_IySU-KQflwLe0AXYpzXL8Ece5Ynih_jsxcI-5TEOaDnXkDqIcugydz5qqhZozd1sbQn4l9CxslstvgxXMCnJTojG_QXPQD2Y91zNdqfIoYKehLXsMqsIwIC54XPuTsSG30uwPVdII-FWAg", "payload": "" } 2024-07-05 10:50:08,407:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123452997 HTTP/1.1" 200 810 2024-07-05 10:50:08,409:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:50:06 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: qqMiT6CkUyNGIHhG-jjtyEOsacoX8AgHw6q1u2zhHlvaVHnPFnQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:18:30Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123452997/jVGASw", "status": "pending", "token": "MYOwzrR2RRKB5uTkD_qGd9O1ma1MnG7fQdor3OIAZ5A" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123452997/HCdluw", "status": "pending", "token": "MYOwzrR2RRKB5uTkD_qGd9O1ma1MnG7fQdor3OIAZ5A" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123452997/7JAHfA", "status": "pending", "token": "MYOwzrR2RRKB5uTkD_qGd9O1ma1MnG7fQdor3OIAZ5A" } ] } 2024-07-05 10:50:08,409:DEBUG:acme.client:Storing nonce: qqMiT6CkUyNGIHhG-jjtyEOsacoX8AgHw6q1u2zhHlvaVHnPFnQ 2024-07-05 10:50:08,410:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-05 10:50:08,411:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-07-05 10:50:08,411:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-05 10:50:08,412:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-05 10:50:08,412:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 10:50:08,413:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-05 10:50:08,413:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-05 10:50:08,413:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-05 10:50:08,414:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 10:50:08,464:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 10:50:08,657:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 10:50:08,658:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-07-05 10:50:08,659:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-07-05 10:50:08,665:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:29 UTC. 2024-07-05 10:50:08,665:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 10:50:08,665:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 10:50:08,671:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05299530> Prep: True 2024-07-05 10:50:08,671:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05299530> and installer None 2024-07-05 10:50:08,671:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-05 10:50:08,676:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-07-05 10:50:08,677:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-05 10:50:08,679:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-05 10:50:09,112:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-05 10:50:09,113:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:50:07 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "uOloGOyisj0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-05 10:50:09,114:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-05 10:50:13,808:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8192_key-certbot.pem 2024-07-05 10:50:18,086:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8190_csr-certbot.pem 2024-07-05 10:50:18,086:DEBUG:acme.client:Requesting fresh nonce 2024-07-05 10:50:18,087:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-05 10:50:18,233:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-05 10:50:18,234:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:50:16 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: B-hK_YLCQKrdlEc0BCI1RjiUYqMBAhnpNdz4N8H3j852ecu6438 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-05 10:50:18,234:DEBUG:acme.client:Storing nonce: B-hK_YLCQKrdlEc0BCI1RjiUYqMBAhnpNdz4N8H3j852ecu6438 2024-07-05 10:50:18,235:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-07-05 10:50:18,241:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENRS3JkbEVjMEJDSTFSamlVWXFNQkFobnBOZHo0TjhIM2o4NTJlY3U2NDM4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "nUgRwNQxYp1RY3513xs8TSIMPmw3outU-SVygNEd52oGlNLQdNpgdho6XkIQ87jhMhHDia5ta8oyRFKISFrgTvjTfJMw8X8nt9Doa_BM4SQRmuhIEBLjhrE2NvN_MNQklwc3DWftxNXxevPJTFP8V1ooU173YYyAmfCh2pK3ztwS8pubw4D1Gpfk1HDsulZe_M-HYw6IMXEPzgpy8eT5TrI3-co8Nv_Q1Ucc_tLJrH7gf01FIRfjB0LTCNAKTf5ety8t8VYoy5fYN7BrGd5AefuHuwFcqz753IGoWvlJOcJUAVU9DI0lPGZSg8skm_FjEemSkFQzyYa85Y42Fx7SIg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-05 10:50:18,398:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-07-05 10:50:18,399:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 05 Jul 2024 08:50:16 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963348157 Replay-Nonce: eF-2qMJ9dZGlNKZJZOpwZZZ_9qC30axwH2r50VjuWUXw4EuJ22Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:18:40Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123495577" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963348157" } 2024-07-05 10:50:18,399:DEBUG:acme.client:Storing nonce: eF-2qMJ9dZGlNKZJZOpwZZZ_9qC30axwH2r50VjuWUXw4EuJ22Y 2024-07-05 10:50:18,400:DEBUG:acme.client:JWS payload: b'' 2024-07-05 10:50:18,406:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123495577: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlkWkdsTktaSlpPcHdaWlpfOXFDMzBheHdIMnI1MFZqdVdVWHc0RXVKMjJZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM0OTU1NzcifQ", "signature": "jHKUgFmAjYtdxlD9bI3KUEAvAOVMvXPtuxocxa6PJTGLQCLFtJDSS_HnTUtzjBmmopDjFsYbrqr646aIdj_yhV1MxXHg84v6CIjWmxj_NokjoMfWMkycWYkku7x-Rp79Su-ABqOpBowdHK4VA8lVBwVlUz2ibmss4Bw1UbOPrUiNjsci_YqUD1-P72K4TW5Qns8_CfZYSVd5kooPIagSCeuTO3TvMCw5Un1R_s8w1lNq1ajmwERvzvOrgjlO8YJiGtZExe93nOpYs6Z7qSQgUbU_TEhuMhRfI9TE2KOk7VALs9mOPLGw6sAzDkjEamOEsY3SyHQjWtnCMjiINre86Q", "payload": "" } 2024-07-05 10:50:18,554:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123495577 HTTP/1.1" 200 809 2024-07-05 10:50:18,554:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:50:16 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: B-hK_YLCCOBa6cGHzpFHLfSyFzkluEL2lmYCtx87S-hVV1g88XA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:18:40Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123495577/CYYT4Q", "status": "pending", "token": "hH2ZlSVCjTVVXgA8Ah2DT5fxGcRpFcteegN4uH99PiA" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123495577/HlKjqg", "status": "pending", "token": "hH2ZlSVCjTVVXgA8Ah2DT5fxGcRpFcteegN4uH99PiA" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123495577/iwR44A", "status": "pending", "token": "hH2ZlSVCjTVVXgA8Ah2DT5fxGcRpFcteegN4uH99PiA" } ] } 2024-07-05 10:50:18,555:DEBUG:acme.client:Storing nonce: B-hK_YLCCOBa6cGHzpFHLfSyFzkluEL2lmYCtx87S-hVV1g88XA 2024-07-05 10:50:18,555:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-05 10:50:18,556:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-07-05 10:50:18,556:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-05 10:50:18,557:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-05 10:50:18,558:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 10:50:18,558:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-05 10:50:18,558:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-05 10:50:18,558:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-05 10:50:18,560:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 10:50:18,612:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 10:50:18,800:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 10:50:18,801:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-07-05 10:50:18,802:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-07-05 10:50:18,807:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:53 UTC. 2024-07-05 10:50:18,807:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 10:50:18,807:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 10:50:18,812:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0145FD70> Prep: True 2024-07-05 10:50:18,812:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0145FD70> and installer None 2024-07-05 10:50:18,813:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-05 10:50:18,817:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-07-05 10:50:18,817:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-05 10:50:18,820:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-05 10:50:19,299:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-05 10:50:19,300:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:50:17 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "r6dv1DzGUvo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-05 10:50:19,300:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-05 10:50:24,126:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8193_key-certbot.pem 2024-07-05 10:50:28,553:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8191_csr-certbot.pem 2024-07-05 10:50:28,553:DEBUG:acme.client:Requesting fresh nonce 2024-07-05 10:50:28,553:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-05 10:50:28,715:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-05 10:50:28,715:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:50:26 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: qqMiT6CkXsIlni_WfXDQbiudx2TJd1I7Ya3ElMtzG5N88PyQyzQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-05 10:50:28,716:DEBUG:acme.client:Storing nonce: qqMiT6CkXsIlni_WfXDQbiudx2TJd1I7Ya3ElMtzG5N88PyQyzQ 2024-07-05 10:50:28,716:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-07-05 10:50:28,722:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tYc0lsbmlfV2ZYRFFiaXVkeDJUSmQxSTdZYTNFbE10ekc1Tjg4UHlReXpRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "NmlKlqASrdLg8U3sne6WHfAnjN1f9SM2kMRlEICSEQ_7udoR0FuJjGWKf__QlGp8IFbRgRIQFsTCzkeuEdI5KfnP4rFB3jSLkHUkDfe10V08e3xAvV2e2DmwHazgV5AmQcQUVpuoAy6_QQ3LYe07J79AyEpusPJKnQCQLzcHv7pKWP0fxS5eGoh8RWppnSBtg59bNmX48BIjWM59hOYSJ4ePVO8oXTPKBRdpTPdO1jEk3pLZk02_Z44mNBiczxXS9Wc7hhmAkEq9sW72FlGiQd3dR6Dsr0mP-xZpfdou02D3eygObTP3qugMJv77HS8s4w4W1YbA78xe3eDG4WlVJw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-05 10:50:28,909:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-05 10:50:28,910:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 05 Jul 2024 08:50:26 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963374667 Replay-Nonce: qqMiT6CkOxv4fD7HRey4jV0V-gB9RGZNOi2nfwY3eHtm0syge5c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:18:51Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123535867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963374667" } 2024-07-05 10:50:28,910:DEBUG:acme.client:Storing nonce: qqMiT6CkOxv4fD7HRey4jV0V-gB9RGZNOi2nfwY3eHtm0syge5c 2024-07-05 10:50:28,910:DEBUG:acme.client:JWS payload: b'' 2024-07-05 10:50:28,916:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123535867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tPeHY0ZkQ3SFJleTRqVjBWLWdCOVJHWk5PaTJuZndZM2VIdG0wc3lnZTVjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM1MzU4NjcifQ", "signature": "FvXvW7ZRZVLDqddqFKas5zkgQyvLPmSuZcc4wmn51uxxMnTj_lgbQnaOhw8qbXdZQtXhXLdYtnS6OZSK-ZCsmYH__-Pa0Fp2oV-LN9B05Zwo7SoYXNwzigtvRsNK60xy2lHU3HXP8Ls6KkdtWPtI-ps7NH6qFB2_EuKFlAlBRJd3CAsqEPFWvFOYiyxZBOqlCxU8ruTHPn0aYVSTJ3cZrFI0-U2Yk4wN7CYGb5gAHbazlkN2YkRFNRsrv2mE2wgAHIk5Il4nIWrdfHGxmFXs9wRfG8eQl2N5pm9IoRqZEvNmzbNA-zgmoJRKAsd0SyXCYFb0a7rYOcMJaZX4ESl6sQ", "payload": "" } 2024-07-05 10:50:29,080:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123535867 HTTP/1.1" 200 805 2024-07-05 10:50:29,081:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:50:27 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: jqVAJFJ0GrrcHZP4ZEj4ZkBbqAgHU8Z9Q5-qoy5A_Ja6e3JqLO0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:18:51Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123535867/7949-Q", "status": "pending", "token": "Ekt5G4sOXt2Ok7lxEhvWeLSKtYbzRE-Q7SXrZi_oLK8" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123535867/1xlmxg", "status": "pending", "token": "Ekt5G4sOXt2Ok7lxEhvWeLSKtYbzRE-Q7SXrZi_oLK8" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123535867/Gfn7VQ", "status": "pending", "token": "Ekt5G4sOXt2Ok7lxEhvWeLSKtYbzRE-Q7SXrZi_oLK8" } ] } 2024-07-05 10:50:29,081:DEBUG:acme.client:Storing nonce: jqVAJFJ0GrrcHZP4ZEj4ZkBbqAgHU8Z9Q5-qoy5A_Ja6e3JqLO0 2024-07-05 10:50:29,082:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-05 10:50:29,082:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-07-05 10:50:29,083:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-05 10:50:29,083:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-05 10:50:29,084:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 10:50:29,084:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-05 10:50:29,084:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-05 10:50:29,085:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-05 10:50:29,086:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 10:50:29,134:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 10:50:29,329:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 10:50:29,330:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-05 10:50:29,331:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-05 10:50:29,337:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:19 UTC. 2024-07-05 10:50:29,337:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 10:50:29,337:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 10:50:29,343:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05597BD0> Prep: True 2024-07-05 10:50:29,344:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05597BD0> and installer None 2024-07-05 10:50:29,344:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-05 10:50:29,349:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-07-05 10:50:29,350:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-05 10:50:29,352:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-05 10:50:29,799:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-05 10:50:29,800:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:50:27 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "xgYh8EGbg8k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-05 10:50:29,801:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-05 10:50:35,243:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8194_key-certbot.pem 2024-07-05 10:50:39,739:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8192_csr-certbot.pem 2024-07-05 10:50:39,739:DEBUG:acme.client:Requesting fresh nonce 2024-07-05 10:50:39,740:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-05 10:50:39,890:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-05 10:50:39,890:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:50:37 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: eF-2qMJ996GRd9r6N_24U9NeamaN1Vv7YP2wVscNbacEdnaIUHk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-05 10:50:39,890:DEBUG:acme.client:Storing nonce: eF-2qMJ996GRd9r6N_24U9NeamaN1Vv7YP2wVscNbacEdnaIUHk 2024-07-05 10:50:39,891:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-07-05 10:50:39,898:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjk5NkdSZDlyNk5fMjRVOU5lYW1hTjFWdjdZUDJ3VnNjTmJhY0VkbmFJVUhrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Z9KO7GxIhfaH2mtUsmPX5clE-Fl6EWP1Np-ZiUpxYGUWHk8CppyIw8KbuvcB0TaGoDyKx0niP8egLLm8cglzjmcpOAnS7VDouI-kucRk0KlxigRVFnFN2hoBp2U-9UqxL9QBEGapaoiFoIyamuNsPJ7EoCpwKfMsFiaD1WjiDpUxFrhLJxg9ZRJzKRUcE8v9GqksqTlsG5ELPTnElY5M3VtbYaOsRnobd60SF_BhO3la8IautUpF7b00wN8P0EoOJrXMXZcygfkWPHIPeioq8Fs7c6xduYG4uGSrP5mElON5gD-TpyxxdEhRuWr8AD3lGk-D4i11ZN5suafqVZYUMQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-05 10:50:40,075:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-05 10:50:40,076:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 05 Jul 2024 08:50:38 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963400877 Replay-Nonce: eF-2qMJ92mmybbEjuxj1KGE4FtwDxI70qkhzfSv-o95VT0gy4DM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:19:01Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123574347" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963400877" } 2024-07-05 10:50:40,076:DEBUG:acme.client:Storing nonce: eF-2qMJ92mmybbEjuxj1KGE4FtwDxI70qkhzfSv-o95VT0gy4DM 2024-07-05 10:50:40,076:DEBUG:acme.client:JWS payload: b'' 2024-07-05 10:50:40,084:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123574347: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjkybW15YmJFanV4ajFLR0U0RnR3RHhJNzBxa2h6ZlN2LW85NVZUMGd5NERNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM1NzQzNDcifQ", "signature": "JGzrcC1XuctK7YRFJwggAerAWuu0jV5K_z-m1U7d_qzorbDMScC0nVgnGlP_HX6K5Er8KddPaAd8mpau3foNB8cLcnKkjdNFG54aiv1GtidLaT0vdviYEudVkjTr5VKQWEMVmHHSGFcX2BwHEuUY5s-qt5LoP-md_naiAdoHyG32RcXMbv1slaGKSbEd7Y4CaplDEcglYpHtb7PazxD6XiIIVoLq4z9kqVnfKto_vyHGPFlWXn8Yg8kbPCqv0bWjMjeiOg6PXSP-2OYG7m1SbOUUfwmlPQoxhN8hjOy1xHdWzCsjb0BFU606mwogx6PN8mcVEEwtX0SV1NWntnUNaA", "payload": "" } 2024-07-05 10:50:40,240:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123574347 HTTP/1.1" 200 805 2024-07-05 10:50:40,240:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:50:38 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: eF-2qMJ9MYm7vlX9Zl4HBvwThP_vFM5r7IPHSrat5t5ZpJBQAf8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:19:01Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123574347/NeAJIw", "status": "pending", "token": "gEmc-Xtg1wVd_4T_7zo-9M-F8HiHOy4tsBmAS7699IU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123574347/4slvLA", "status": "pending", "token": "gEmc-Xtg1wVd_4T_7zo-9M-F8HiHOy4tsBmAS7699IU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123574347/_5WNoA", "status": "pending", "token": "gEmc-Xtg1wVd_4T_7zo-9M-F8HiHOy4tsBmAS7699IU" } ] } 2024-07-05 10:50:40,241:DEBUG:acme.client:Storing nonce: eF-2qMJ9MYm7vlX9Zl4HBvwThP_vFM5r7IPHSrat5t5ZpJBQAf8 2024-07-05 10:50:40,241:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-05 10:50:40,242:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-07-05 10:50:40,242:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-05 10:50:40,242:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-05 10:50:40,243:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 10:50:40,243:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-05 10:50:40,243:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-05 10:50:40,244:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-05 10:50:40,245:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 10:50:40,297:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-05 10:50:40,499:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-05 10:50:40,500:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-05 10:50:40,501:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-05 10:50:40,505:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:37 UTC. 2024-07-05 10:50:40,506:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-05 10:50:40,506:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-05 10:50:40,511:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x055857D0> Prep: True 2024-07-05 10:50:40,511:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x055857D0> and installer None 2024-07-05 10:50:40,512:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-05 10:50:40,527:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-07-05 10:50:40,528:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-05 10:50:40,531:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-05 10:50:41,015:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-05 10:50:41,016:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:50:39 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "krsbknTxgZA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-05 10:50:41,016:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-05 10:50:45,641:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8195_key-certbot.pem 2024-07-05 10:50:50,133:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8193_csr-certbot.pem 2024-07-05 10:50:50,134:DEBUG:acme.client:Requesting fresh nonce 2024-07-05 10:50:50,134:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-05 10:50:50,295:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-05 10:50:50,296:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:50:48 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: jqVAJFJ0b1W7Dn34hRyjfXfhs61dO3NjDEEAtYvvIFaVo-vMGOM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-05 10:50:50,296:DEBUG:acme.client:Storing nonce: jqVAJFJ0b1W7Dn34hRyjfXfhs61dO3NjDEEAtYvvIFaVo-vMGOM 2024-07-05 10:50:50,296:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-07-05 10:50:50,302:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBiMVc3RG4zNGhSeWpmWGZoczYxZE8zTmpERUVBdFl2dklGYVZvLXZNR09NIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "pwpZTnXHzWcQZorxqHHYNZrIBo-hIv6Tgm0Sbo9ZULvK94fDqsQbyUobs4npI5UreFyD0SopncwqwF_BYFKtXzVhR1W2IKp_PbrFm3MZbAytpG3Kpu4Z5cPHqzXieRRH_vEAOPd6UqzFr2_wRJmKtkck4pnc6wx9wWi7voRCMyF0I2Xm-lHp_TO1z6zEv9Lii6eZPrn9lNeTXyY85Hze82CFJs84qeeZWMZ8KGhKQ77l5MxlXt1JBWt5-2th9-SlVvE3cv6d99k5fLNW5hqV0GYN8CIXIDRqE0yyZrH0Low9v-5-lDLmqcSHxmoKpGc-eALyEu7THY85qD6eg7mxcQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-05 10:50:50,491:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-05 10:50:50,492:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 05 Jul 2024 08:50:48 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963440917 Replay-Nonce: jqVAJFJ0PpZXcolb0nGb5-5pBVs9WBAKSlNgDBvznu-DJMv3eQM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:19:11Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123633137" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963440917" } 2024-07-05 10:50:50,492:DEBUG:acme.client:Storing nonce: jqVAJFJ0PpZXcolb0nGb5-5pBVs9WBAKSlNgDBvznu-DJMv3eQM 2024-07-05 10:50:50,493:DEBUG:acme.client:JWS payload: b'' 2024-07-05 10:50:50,500:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123633137: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBQcFpYY29sYjBuR2I1LTVwQlZzOVdCQUtTbE5nREJ2em51LURKTXYzZVFNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM2MzMxMzcifQ", "signature": "G_r2Tlf_gXwsYUPvaTWEmBnZvqD7yBWD5vpA7WbmfHx_ahnxrNw1R8-EynPCTWQ2Wro443yi-vZK64T10qUKaEqMGUqafAg-Og3NOc-RQWQ_2uFZ75jKKZ02FJiFgrTRJJkvQKfy6ymIUFWh6J6J0xubs1CDLMiPGNGHO5PXgFdBx00aG2yjrNmx0oHaxEdRy0ByhywYasNcvAZlOVsYf3CkXB3J_LcF26T0SY6EEmpaMTAFz7HyeNdCwVoy0kgDf0261nUBZbMu4Cl9pL_cTJKkBn03WPMKBDINB3rXRoZvtDu3VzwUW0lmLGvzt7c1oOPMYDQIGWPRvNVnuZcnAA", "payload": "" } 2024-07-05 10:50:50,669:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123633137 HTTP/1.1" 200 805 2024-07-05 10:50:50,669:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 05 Jul 2024 08:50:48 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: qqMiT6Ckuc5xcV0lkTbH6DshtmpHynjXyH2bnpZkILkiFtNNrO0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:19:11Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123633137/cKgBUw", "status": "pending", "token": "0WqyloOYpCn8UFv2gXPije6XsdJdrPcJjD8ZRYFv-2A" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123633137/fI1u_A", "status": "pending", "token": "0WqyloOYpCn8UFv2gXPije6XsdJdrPcJjD8ZRYFv-2A" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123633137/N6igCw", "status": "pending", "token": "0WqyloOYpCn8UFv2gXPije6XsdJdrPcJjD8ZRYFv-2A" } ] } 2024-07-05 10:50:50,669:DEBUG:acme.client:Storing nonce: qqMiT6Ckuc5xcV0lkTbH6DshtmpHynjXyH2bnpZkILkiFtNNrO0 2024-07-05 10:50:50,670:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-05 10:50:50,670:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-07-05 10:50:50,671:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-05 10:50:50,671:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-05 10:50:50,672:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 10:50:50,672:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-05 10:50:50,672:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-05 10:50:50,673:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-05 10:50:50,674:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-05 10:50:50,674:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-07-05 10:50:50,674:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-07-05 10:50:50,675:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module> sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-07-05 10:50:50,677:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)