2024-07-04 10:56:56,919:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-07-04 10:56:56,919:DEBUG:certbot._internal.main:Arguments: [] 2024-07-04 10:56:56,920:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-07-04 10:56:57,815:DEBUG:certbot._internal.log:Root logging level set at 20 2024-07-04 10:56:57,815:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-07-04 10:56:57,858:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-07-04 10:56:57,911:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-04 10:56:58,220:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-04 10:56:58,222:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2024-07-04 10:56:58,237:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2024-07-04 10:56:58,246:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:12 UTC. 2024-07-04 10:56:58,247:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-04 10:56:58,247:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-04 10:56:58,252:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-04 10:56:58,253:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-04 10:56:58,253:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-04 10:56:58,259:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-04 10:56:58,260:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-04 10:56:58,262:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-04 10:56:58,744:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-04 10:56:58,744:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:56:57 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "ZMIStrTp9D0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-04 10:56:58,745:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-04 10:57:04,307:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8157_key-certbot.pem 2024-07-04 10:57:09,332:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8155_csr-certbot.pem 2024-07-04 10:57:09,333:DEBUG:acme.client:Requesting fresh nonce 2024-07-04 10:57:09,333:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-04 10:57:09,489:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-04 10:57:09,489:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:57:08 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6Ck8piy8qSJucw7UTORJyUD3M1uJwh3Oh2zNhMgEaZ4NeU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-04 10:57:09,490:DEBUG:acme.client:Storing nonce: qqMiT6Ck8piy8qSJucw7UTORJyUD3M1uJwh3Oh2zNhMgEaZ4NeU 2024-07-04 10:57:09,490:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-07-04 10:57:09,496:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2s4cGl5OHFTSnVjdzdVVE9SSnlVRDNNMXVKd2gzT2gyek5oTWdFYVo0TmVVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "kIwnnzS2D_7dpSQuQtX4DcFTWKMRj7ae4CZJK24XEjzgWMhfR6h_r0mm45fM2CFoc-t3qPpFy8NW5MH3-dI8GADrdIYrVCFq4weqp63MhSOnhJOzxE4KsLUQAwboQmweRgLC3P5Y4kZLz2_yawvB-MvXkV8YDjl6FGomStzs2064KmCBQDpqe3hERRsIzE-hhrfvPP0Zf-QjonFtHb0oms_OWMYghg8JlU8bIuSeSa2k7Vu0TlPs3ar_RxAdljTUMAEJpWMTvAu8cmtj2cdksfdF0eR0QmP9wLmV_H_Ec1bL6ePhZ6dCTnPxTjVWP3dkQdNh1wPtrIXyUxYHYhNplg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-04 10:57:09,664:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-07-04 10:57:09,665:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 04 Jul 2024 08:57:08 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963066047 Replay-Nonce: qqMiT6CktD7gIQCD5AkhE8ols9VK1Yt2Y2vX5tsp162xbdljpys X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:05Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123065917" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963066047" } 2024-07-04 10:57:09,665:DEBUG:acme.client:Storing nonce: qqMiT6CktD7gIQCD5AkhE8ols9VK1Yt2Y2vX5tsp162xbdljpys 2024-07-04 10:57:09,666:DEBUG:acme.client:JWS payload: b'' 2024-07-04 10:57:09,672:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123065917: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2t0RDdnSVFDRDVBa2hFOG9sczlWSzFZdDJZMnZYNXRzcDE2MnhiZGxqcHlzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMwNjU5MTcifQ", "signature": "qQFMKgyw1B5D7jhwj6H8cWjunSZUpWK6v5YlDylpTu0yeuKHzMPxZOBGEHRiXqOg4JEKOezxJ4Z8_wNAK6XBGCIkJfzIh9Xrhk3MfeIR22WtllZqTy5gqirahylp8S0m6cu_7dXKhORkePcX9-ShjrQLodTF7hoV3c4pEdP7RQJuC6WnFWwSBsCJ_HqUuroni1GTrS_3JsYl7-zU1IAPgu8valJfYEOhSVJlUgCciZZ7ugokZsZ_x0DHY3IgDD82KkO8Bt91ItP73dfDmPiNXViH9Gh4-33Y9MhuQPBDzVzBEpfwUKe-yZ4qOfQMKOQwAiorZgGjFzHKHgWMYPLqkA", "payload": "" } 2024-07-04 10:57:09,834:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123065917 HTTP/1.1" 200 810 2024-07-04 10:57:09,834:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:57:08 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0R1W5_bq22ivkAwfi3S3ozLBJI1Ysk5b5ZthO3YrVKkg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:05Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123065917/AopFCQ", "status": "pending", "token": "oZ9G6xAwEwS4CZiIJPgbxKNne0b9jdSOw26Q3r8jqQ4" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123065917/xbrZjg", "status": "pending", "token": "oZ9G6xAwEwS4CZiIJPgbxKNne0b9jdSOw26Q3r8jqQ4" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123065917/2pJhlw", "status": "pending", "token": "oZ9G6xAwEwS4CZiIJPgbxKNne0b9jdSOw26Q3r8jqQ4" } ] } 2024-07-04 10:57:09,834:DEBUG:acme.client:Storing nonce: jqVAJFJ0R1W5_bq22ivkAwfi3S3ozLBJI1Ysk5b5ZthO3YrVKkg 2024-07-04 10:57:09,835:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-04 10:57:09,835:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-07-04 10:57:09,836:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-04 10:57:09,836:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-04 10:57:09,851:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-04 10:57:09,851:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-04 10:57:09,851:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-04 10:57:09,852:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-04 10:57:09,857:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-04 10:57:09,902:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-04 10:57:10,137:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-04 10:57:10,138:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-04 10:57:10,139:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-04 10:57:10,144:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:26 UTC. 2024-07-04 10:57:10,145:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-04 10:57:10,145:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-04 10:57:10,150:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-04 10:57:10,150:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-04 10:57:10,151:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-04 10:57:10,166:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-04 10:57:10,167:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-04 10:57:10,168:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-04 10:57:10,663:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-04 10:57:10,664:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:57:09 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "z1hnnhTBJfc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-04 10:57:10,665:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-04 10:57:15,511:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8158_key-certbot.pem 2024-07-04 10:57:19,968:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8156_csr-certbot.pem 2024-07-04 10:57:19,968:DEBUG:acme.client:Requesting fresh nonce 2024-07-04 10:57:19,969:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-04 10:57:20,130:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-04 10:57:20,131:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:57:19 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ01JYlJf3OB8C3kgqseZgnU_DpSn8z7HWqFOL8thwaxKs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-04 10:57:20,131:DEBUG:acme.client:Storing nonce: jqVAJFJ01JYlJf3OB8C3kgqseZgnU_DpSn8z7HWqFOL8thwaxKs 2024-07-04 10:57:20,131:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-07-04 10:57:20,137:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjAxSllsSmYzT0I4QzNrZ3FzZVpnblVfRHBTbjh6N0hXcUZPTDh0aHdheEtzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "khYI1-hwqANKs-08nWcJc38jmSLKI7hsI3c2N0Ne-_j5_VwLaOcutaIJySlWfeCRZvjAHd15TALAVGMZ18rT9eBHfKq6uu322eCbiu-yNtCnACLc_rmq3j8atk5B2fd_njHSvo9BUmbVIIM01g_xdJ4JGSaJoXZ9B4VlSKBa4CZWBo4Gp6LTzevatt9L4IuOnH6zqgDk18gU5OSWxfxjbtLoZkRSJ1AWnIFJincXPob5CDFv6AvIev1NRrJUau7jMeOkf4hJ8H22G3CCNJ1Stg7r3N7Gd6XA7Pdc7jlBPhE7-_sDH_m6cUtBoZ1x_EeUogYMC9dVEhfROvTh1eR9nQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-04 10:57:20,308:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-07-04 10:57:20,309:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 04 Jul 2024 08:57:19 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963103477 Replay-Nonce: jqVAJFJ0pRa3gvMyqbyYVvU5RafGITLKpnWg6uteHyr-eJx9dJ8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:16Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123121967" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963103477" } 2024-07-04 10:57:20,309:DEBUG:acme.client:Storing nonce: jqVAJFJ0pRa3gvMyqbyYVvU5RafGITLKpnWg6uteHyr-eJx9dJ8 2024-07-04 10:57:20,309:DEBUG:acme.client:JWS payload: b'' 2024-07-04 10:57:20,315:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123121967: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBwUmEzZ3ZNeXFieVlWdlU1UmFmR0lUTEtwbldnNnV0ZUh5ci1lSng5ZEo4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMxMjE5NjcifQ", "signature": "yhd6Te894EQjZWu9pYHeK4qRgyTtooV8ICzyl07rBGoSJ9r0k698JWpNlgZ5l-NfDS_gPXDGkQ_BoTaGo6Ia23lV9GDtQCZpK67pF6LQY9Af-mKk-YWWwE0reVODS-CAYd7vVWMcdGLfRSlvqMqA7xxvaPgAswQ0OQFL4DDh_uDjFWA3cQ9fxVGeSz1RSavyC3PnVrOr-gWVWSPkM3OjaJjya2YU8GzpkjMnxagh_Tguh_jZuqSHPQMEKOMy_12ADJaN_z5oCwhRysOfYQGoyxcj4tO39iqquVSuSQ1WTd-lGbUOKJsLf3KEggmKDLE-RLrGMQG8IZILZ9OYQI3Yow", "payload": "" } 2024-07-04 10:57:20,481:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123121967 HTTP/1.1" 200 804 2024-07-04 10:57:20,482:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:57:19 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6CkibZE4wCBIqOcZIAYlhMhnpjLX7PkjELZWj3Ey7tRiYY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:16Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123121967/Ag883A", "status": "pending", "token": "92rAkg4FmWXDWDjFdZUukAMT34AdSrJ47Vp7Q_ZZoW0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123121967/g4f58w", "status": "pending", "token": "92rAkg4FmWXDWDjFdZUukAMT34AdSrJ47Vp7Q_ZZoW0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123121967/s77iUg", "status": "pending", "token": "92rAkg4FmWXDWDjFdZUukAMT34AdSrJ47Vp7Q_ZZoW0" } ] } 2024-07-04 10:57:20,482:DEBUG:acme.client:Storing nonce: qqMiT6CkibZE4wCBIqOcZIAYlhMhnpjLX7PkjELZWj3Ey7tRiYY 2024-07-04 10:57:20,483:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-04 10:57:20,483:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-07-04 10:57:20,483:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-04 10:57:20,484:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-04 10:57:20,484:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-04 10:57:20,485:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-04 10:57:20,485:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-04 10:57:20,485:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-04 10:57:20,486:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-04 10:57:20,529:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-04 10:57:20,763:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-04 10:57:20,765:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-04 10:57:20,765:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-04 10:57:20,770:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:40 UTC. 2024-07-04 10:57:20,770:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-04 10:57:20,771:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-04 10:57:20,776:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-04 10:57:20,776:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-04 10:57:20,776:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-04 10:57:20,781:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-04 10:57:20,782:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-04 10:57:20,784:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-04 10:57:21,267:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-04 10:57:21,268:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:57:20 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "FmaU3SQo8i8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-04 10:57:21,268:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-04 10:57:25,649:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8159_key-certbot.pem 2024-07-04 10:57:30,163:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8157_csr-certbot.pem 2024-07-04 10:57:30,164:DEBUG:acme.client:Requesting fresh nonce 2024-07-04 10:57:30,164:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-04 10:57:30,325:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-04 10:57:30,326:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:57:29 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ02rBcsuKZFOZVzGXCgsMS4vHlDtUsiw-t-c65FDED93w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-04 10:57:30,326:DEBUG:acme.client:Storing nonce: jqVAJFJ02rBcsuKZFOZVzGXCgsMS4vHlDtUsiw-t-c65FDED93w 2024-07-04 10:57:30,326:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-07-04 10:57:30,332:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjAyckJjc3VLWkZPWlZ6R1hDZ3NNUzR2SGxEdFVzaXctdC1jNjVGREVEOTN3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "WHsgwGHmObw7bjLDnQZnWwkRxDf_VAiDlryqijrVKM5o3unvF6Sb60p9sFjtHEdz0Tp-HSN8sTTFH9q0ur4FcJsvMV9WW0PyKbIFtm1ZX2JSH-A3Q5z7fFJI59Ka1-ssdBa3d0v7yozLQjHC78N4Ny7V8MBM9oxmHr1_hGHZB--_5Eo5DYIlnP8iEVfIxVMkTPMc2VH4-d4W8Eg9uzHXeG3KyKSytQmpiiC9GGFbFOmKoSZ7g7W_o5CDGjelXZ-h4-WzltrCrzl31x6RbCySIBLEzXs4IYaCUBaWYXvq-Quekxr0kKAmkHYvX3qJiJqSfN2FbqOQuXFQFYmueoEeVQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-04 10:57:30,504:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-07-04 10:57:30,505:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 04 Jul 2024 08:57:29 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963135847 Replay-Nonce: jqVAJFJ0JFAG85jceU9xwvri113aWXo41iyitwmMhaCRiw59luo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:27Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123171097" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963135847" } 2024-07-04 10:57:30,505:DEBUG:acme.client:Storing nonce: jqVAJFJ0JFAG85jceU9xwvri113aWXo41iyitwmMhaCRiw59luo 2024-07-04 10:57:30,506:DEBUG:acme.client:JWS payload: b'' 2024-07-04 10:57:30,513:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123171097: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBKRkFHODVqY2VVOXh3dnJpMTEzYVdYbzQxaXlpdHdtTWhhQ1JpdzU5bHVvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMxNzEwOTcifQ", "signature": "IbziLiaRSUvhVjTiNooHXqMdza8F2606J8mTyhaw_EB2QM_WwL8J2y8A_PcEBzaoK-ktSzfcqJgAzc7irSKeR5cKjHypeieO6yY9xuN6wRlIFrcZZPSePqk-DmH5HN_bA0O9DutSrbrwr4je02ffTgvbjlnLlb16JUs4beuAVXDb1x8UwExI5vx1ZI3FAdpYwy4Oe_OonieIoHC1hl-v5twkI2O6CGhV3QKG1BYqwww2oBEKCVeadC-iibXTVZ7C-PBsge1JH5ZlIu7bd9y7OwoU-hdC9T2poouIlQSLgEWyvCTA-dNjSc1H9wAyNJc1iCugRz3ghYVPH2zDMI8M3Q", "payload": "" } 2024-07-04 10:57:30,681:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123171097 HTTP/1.1" 200 807 2024-07-04 10:57:30,681:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:57:29 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6CklXLaHtnT7resHnQ_1zSkCQ2DB-Px8-jDkSR24xWyp54 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:27Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123171097/vQZynA", "status": "pending", "token": "gy1F1Yd4iDVgUOSDLa4rYsr2nxTIYkDwl8IuhC7mDPo" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123171097/XD91Zg", "status": "pending", "token": "gy1F1Yd4iDVgUOSDLa4rYsr2nxTIYkDwl8IuhC7mDPo" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123171097/qlRt6w", "status": "pending", "token": "gy1F1Yd4iDVgUOSDLa4rYsr2nxTIYkDwl8IuhC7mDPo" } ] } 2024-07-04 10:57:30,681:DEBUG:acme.client:Storing nonce: qqMiT6CklXLaHtnT7resHnQ_1zSkCQ2DB-Px8-jDkSR24xWyp54 2024-07-04 10:57:30,682:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-04 10:57:30,682:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-07-04 10:57:30,683:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-04 10:57:30,683:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-04 10:57:30,684:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-04 10:57:30,684:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-04 10:57:30,684:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-04 10:57:30,684:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-04 10:57:30,686:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-04 10:57:30,727:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-04 10:57:30,928:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-04 10:57:30,929:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-04 10:57:30,930:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-04 10:57:30,935:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:54 UTC. 2024-07-04 10:57:30,935:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-04 10:57:30,936:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-04 10:57:30,941:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-04 10:57:30,941:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-04 10:57:30,941:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-04 10:57:30,956:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-04 10:57:30,957:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-04 10:57:30,959:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-04 10:57:31,413:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-04 10:57:31,413:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:57:30 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "z_ncGRRnF1s": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-04 10:57:31,414:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-04 10:57:36,224:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8160_key-certbot.pem 2024-07-04 10:57:40,792:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8158_csr-certbot.pem 2024-07-04 10:57:40,793:DEBUG:acme.client:Requesting fresh nonce 2024-07-04 10:57:40,793:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-04 10:57:40,942:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-04 10:57:40,943:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:57:39 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9ieQrnlLOrwM97aWIvyuz10BlQzUgd0eVBYZmuMZgpLA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-04 10:57:40,944:DEBUG:acme.client:Storing nonce: eF-2qMJ9ieQrnlLOrwM97aWIvyuz10BlQzUgd0eVBYZmuMZgpLA 2024-07-04 10:57:40,944:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-07-04 10:57:40,952:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlpZVFybmxMT3J3TTk3YVdJdnl1ejEwQmxRelVnZDBlVkJZWm11TVpncExBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "LGR5o64i9V2s4m83p5j_C0Pp1-u9joT0zYIhfRqE54nmh3WmiPP_jwkNAyJllVFndOg6x3VI9W2bR98ATc5N6X1iFb0vGITAN4cEflgDdy2xSdcVhlnkec_1Xr21eIHOogHjPANe0GAg4sMd5-wLuNdSv65f-YAHt_9HBJbZs1zKeLZ1sfCn4wJolrYszVLdWjXkpefpscbe4F4gdZ1fUPy-XG9FJz5msUvmNmwyUK1ZunGNKxaIFD-IbDAHZDjvDR3GzYM9s1WEshuclHViHMAh6kaipcqerom26RmSqYK4bsK65KZJ9yPk3QlKGGjNrRIjMgYBVIbl3rHCIN7fxg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-04 10:57:41,113:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-07-04 10:57:41,113:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 04 Jul 2024 08:57:40 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963164787 Replay-Nonce: B-hK_YLC5O_CCGgTYxUrjyfQnfLtJGL0U1U5gfn_441NSiF8r94 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:38Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123214537" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963164787" } 2024-07-04 10:57:41,113:DEBUG:acme.client:Storing nonce: B-hK_YLC5O_CCGgTYxUrjyfQnfLtJGL0U1U5gfn_441NSiF8r94 2024-07-04 10:57:41,114:DEBUG:acme.client:JWS payload: b'' 2024-07-04 10:57:41,120:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123214537: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTEM1T19DQ0dnVFl4VXJqeWZRbmZMdEpHTDBVMVU1Z2ZuXzQ0MU5TaUY4cjk0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMyMTQ1MzcifQ", "signature": "uZFQcPKkLKf7IpHcoexAdch6LeD8r_GPT0LR5kY3nu8aduewnzMskfHncCwADhB9S48t5YSV4BZtyZxWXFR3RnMbsWFJ_7Bxawqcj8lzIwSUgvPnI04ts4sqTYpSSstVX90RvxlS36HoCRQF0ffUfl6gcSxCGklvJk4HBU_-m-9bXCREF5Zwj4QJHmKORMDqN9DAI8wK9y13paLWQi4QGX2XDup4xu8vO2qU8DbNeYbG12nogTjZn_Txi_FUBlDNLeUZLf17Mxcc9XfF7SGHkXsFzQbI3M4_yw7lZoC_uk0rpceA6PUhrBI5qNALia2l4Q-laEETCcxCUq26ZPjNWQ", "payload": "" } 2024-07-04 10:57:41,286:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123214537 HTTP/1.1" 200 801 2024-07-04 10:57:41,287:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:57:40 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLCKlWYAwHdaB8J-qx17Y7-qIuB87J31HFWPs5CpmxH8sE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:38Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123214537/FMZRsw", "status": "pending", "token": "4A-GU-gmUb8V_U_TFgjrqWrIQIHWSTkyvrB5EuDMS3A" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123214537/6lpfOw", "status": "pending", "token": "4A-GU-gmUb8V_U_TFgjrqWrIQIHWSTkyvrB5EuDMS3A" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123214537/gp7pwg", "status": "pending", "token": "4A-GU-gmUb8V_U_TFgjrqWrIQIHWSTkyvrB5EuDMS3A" } ] } 2024-07-04 10:57:41,287:DEBUG:acme.client:Storing nonce: B-hK_YLCKlWYAwHdaB8J-qx17Y7-qIuB87J31HFWPs5CpmxH8sE 2024-07-04 10:57:41,288:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-04 10:57:41,288:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-07-04 10:57:41,289:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-04 10:57:41,289:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-04 10:57:41,290:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-04 10:57:41,290:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-04 10:57:41,290:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-04 10:57:41,291:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-04 10:57:41,292:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-04 10:57:41,344:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-04 10:57:41,536:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-04 10:57:41,538:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-04 10:57:41,538:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-04 10:57:41,543:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:09 UTC. 2024-07-04 10:57:41,543:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-04 10:57:41,544:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-04 10:57:41,549:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-04 10:57:41,550:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-04 10:57:41,550:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-04 10:57:41,554:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-04 10:57:41,555:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-04 10:57:41,557:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-04 10:57:41,993:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-04 10:57:41,993:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:57:40 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "CswLnu4WZCg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-04 10:57:41,994:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-04 10:57:47,200:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8161_key-certbot.pem 2024-07-04 10:57:51,793:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8159_csr-certbot.pem 2024-07-04 10:57:51,794:DEBUG:acme.client:Requesting fresh nonce 2024-07-04 10:57:51,794:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-04 10:57:51,940:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-04 10:57:51,941:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:57:50 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9tzPFKG1goBG_wzoEko6ZwukzhyEqG92lbvnzi8k6pXQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-04 10:57:51,941:DEBUG:acme.client:Storing nonce: eF-2qMJ9tzPFKG1goBG_wzoEko6ZwukzhyEqG92lbvnzi8k6pXQ 2024-07-04 10:57:51,941:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-07-04 10:57:51,947:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjl0elBGS0cxZ29CR193em9Fa282Wnd1a3poeUVxRzkybGJ2bnppOGs2cFhRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "c-W-AAAXCWtRk_GodV5lrAZhOnu3H63jDkJzFsoR60yHe86TQQjl1cfh_TuFv0ElLBq6IGlj7krgvHR-vx-oLqxCvYVgSsprSCzOjaLAPDq7P14jX3NT6ilRof5scdLYZexq3xxde3a70Hb0dRa5nF4CsLgIcVVSI7eAxVRKLUgRk6X6cPtLMfqPRv7qMMgARomuZENLxw1pkBZQts_4KHdbojVBzdjaWGvq0bXWE4EVKoygd7HYdNdXJn3GOKx6RVXpWgmrjECvQfjrlr4zmtpypnVtktgIjR-1458_phmH4ZLGvTpb5kXSUoCcmslOIK9sdkundCcq3QLCab2esg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-04 10:57:52,103:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-04 10:57:52,104:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 04 Jul 2024 08:57:51 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963193117 Replay-Nonce: eF-2qMJ98zL_1IndrXGRGF_ZwCmElJbiCmgmEGHUIyLovd-FKfE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:49Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123258277" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963193117" } 2024-07-04 10:57:52,104:DEBUG:acme.client:Storing nonce: eF-2qMJ98zL_1IndrXGRGF_ZwCmElJbiCmgmEGHUIyLovd-FKfE 2024-07-04 10:57:52,104:DEBUG:acme.client:JWS payload: b'' 2024-07-04 10:57:52,110:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123258277: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjk4ekxfMUluZHJYR1JHRl9ad0NtRWxKYmlDbWdtRUdIVUl5TG92ZC1GS2ZFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMyNTgyNzcifQ", "signature": "pazlWPpzuECIyexJob-OA4eWcDTC1PqHwLka-3pIdkdCNO9J5Wwk3J9Yw0zLsXj83BnHWMDn9KEvll0Xew_ibUo-DHGBKL0Pz3-mp4b_75V8Y1oGj_X2334NEp7_rDi_tT75joXrv5DU798Exm8Qc6cC94FjGOoV3ge9zjnh-jWkXYqfIpm3jjdhummFLDBD2149jBSVBYNt_Ks8C2vJlnkTyqdNLQ495cBy9mLtwjs8XgoxhDflECQuGVkaN_voxSZ9nI3Fry9sEOnvtUkfy1jE2aF7g8B_1J1TbZC420JZbMOFuTxmzH_YeQiB1W9hqYmzsx60PSN-wU_cdZU-fQ", "payload": "" } 2024-07-04 10:57:52,273:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123258277 HTTP/1.1" 200 805 2024-07-04 10:57:52,273:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:57:51 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9pgUTBkR-oklzNvK-OX2FrO7y22qom_gu9blVGe_5PFI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:49Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123258277/7Y8QQA", "status": "pending", "token": "ILZIh76BP24PmbX0hDnhyA52SUs2CCLrasbf1wWz400" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123258277/6IRQnQ", "status": "pending", "token": "ILZIh76BP24PmbX0hDnhyA52SUs2CCLrasbf1wWz400" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123258277/ZS_Kuw", "status": "pending", "token": "ILZIh76BP24PmbX0hDnhyA52SUs2CCLrasbf1wWz400" } ] } 2024-07-04 10:57:52,273:DEBUG:acme.client:Storing nonce: eF-2qMJ9pgUTBkR-oklzNvK-OX2FrO7y22qom_gu9blVGe_5PFI 2024-07-04 10:57:52,274:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-04 10:57:52,274:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-07-04 10:57:52,275:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-04 10:57:52,275:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-04 10:57:52,276:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-04 10:57:52,276:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-04 10:57:52,276:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-04 10:57:52,277:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-04 10:57:52,278:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-04 10:57:52,319:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-04 10:57:52,512:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-04 10:57:52,513:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-04 10:57:52,514:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-04 10:57:52,518:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:26 UTC. 2024-07-04 10:57:52,519:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-04 10:57:52,519:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-04 10:57:52,524:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-04 10:57:52,524:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-04 10:57:52,524:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-04 10:57:52,530:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-04 10:57:52,531:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-04 10:57:52,533:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-04 10:57:53,019:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-04 10:57:53,020:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:57:51 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "hZbBdsT6djk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-04 10:57:53,021:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-04 10:57:57,762:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8162_key-certbot.pem 2024-07-04 10:58:02,267:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8160_csr-certbot.pem 2024-07-04 10:58:02,267:DEBUG:acme.client:Requesting fresh nonce 2024-07-04 10:58:02,267:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-04 10:58:02,428:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-04 10:58:02,428:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:58:01 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0-Ct0lRndnRtWU5U2T73Usycsk7-a5aH3f3hwyVZSvfY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-04 10:58:02,429:DEBUG:acme.client:Storing nonce: jqVAJFJ0-Ct0lRndnRtWU5U2T73Usycsk7-a5aH3f3hwyVZSvfY 2024-07-04 10:58:02,429:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-07-04 10:58:02,435:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjAtQ3QwbFJuZG5SdFdVNVUyVDczVXN5Y3NrNy1hNWFIM2YzaHd5VlpTdmZZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "vKaNLliFATN-tku7eXwpp9i-TbVP6yjqNgebeOVACv9iGQ_7Y-E5eBBHIcUFi-pBystr-9-KeaSPjUwXbfhG2oqgPCNRqFYoRYBFf11kK79Wm5Fxq9Y6adSFagk4YjPE_emS0kdnR2UdDTMVa6AK7L32w7zdgEbXnzAuoCaJnObB0AlMIOV28e_pZCDkVcnz0HkY_JeQfZcYlkHHXuRQMksfkVwduQhe-xwx-jTup38d_Eu--3YTgJGy8TN9thaQB6Vb1RpXVVvSflWBC2rtX7m0wFnmZ9yB8esMX7OceAg-PWg26QSR-awif4m33GXgtmcO44P4OCil_HUBPiS-vQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-04 10:58:02,620:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-07-04 10:58:02,621:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 04 Jul 2024 08:58:01 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963222697 Replay-Nonce: qqMiT6CkFI5gIdaZd3QY9rO-CYe4EFVM5eF-tFXUokxdIQm1OpI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:17:59Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123301867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963222697" } 2024-07-04 10:58:02,621:DEBUG:acme.client:Storing nonce: qqMiT6CkFI5gIdaZd3QY9rO-CYe4EFVM5eF-tFXUokxdIQm1OpI 2024-07-04 10:58:02,622:DEBUG:acme.client:JWS payload: b'' 2024-07-04 10:58:02,628:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123301867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tGSTVnSWRhWmQzUVk5ck8tQ1llNEVGVk01ZUYtdEZYVW9reGRJUW0xT3BJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMzMDE4NjcifQ", "signature": "xx2wGmr2p06htS4hO5bLs5OTGAdGNEB9GUVoSQdxCoggw7xnm0HSJE9JQAdSNkOF-4WvB7zA-Ii0l2cnuoeBLECrXFIsWd6R_byezd-0KgpsseY3LN1V-eqHxwa2Xwcth5SlIskU7wUbM_sFAvdexYNXAwssmu0C0EOyd2hdPcBOzhpp2teAFhSLPqGDrGeWRBI9CnZjAl_D1ElfY6Q2O3P8ccieLlqyu--s406z751LmGl9atyNopoIp14K913KhbjjhYFA7PmSCtJuJh0w3IO5UDv8sXE21iMA_WhtE8QP4GIFMqaVf-S7SdCSV7sZ6QmgvQ2Ftn3Ybu5MbvECgg", "payload": "" } 2024-07-04 10:58:02,792:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123301867 HTTP/1.1" 200 809 2024-07-04 10:58:02,793:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:58:01 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0gN4Azy6aUlGzfd4x-hHoh2kj7N6xjNabstOt7ybJ6xs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:17:59Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123301867/VjMp2w", "status": "pending", "token": "36L88NDkWSNEPcDsROWIUpbt0tyBKr4cI-DFwT9ug94" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123301867/GGZVqQ", "status": "pending", "token": "36L88NDkWSNEPcDsROWIUpbt0tyBKr4cI-DFwT9ug94" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123301867/GI9X-A", "status": "pending", "token": "36L88NDkWSNEPcDsROWIUpbt0tyBKr4cI-DFwT9ug94" } ] } 2024-07-04 10:58:02,793:DEBUG:acme.client:Storing nonce: jqVAJFJ0gN4Azy6aUlGzfd4x-hHoh2kj7N6xjNabstOt7ybJ6xs 2024-07-04 10:58:02,794:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-04 10:58:02,794:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-07-04 10:58:02,795:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-04 10:58:02,795:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-04 10:58:02,796:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-04 10:58:02,796:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-04 10:58:02,796:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-04 10:58:02,797:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-04 10:58:02,798:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-04 10:58:02,841:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-04 10:58:03,027:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-04 10:58:03,028:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is signed by the certificate's issuer. 2024-07-04 10:58:03,029:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD 2024-07-04 10:58:03,033:INFO:certbot._internal.renewal:Cert not yet due for renewal 2024-07-04 10:58:03,038:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-04 10:58:03,079:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-04 10:58:03,298:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-04 10:58:03,299:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-04 10:58:03,300:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-04 10:58:03,305:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:40 UTC. 2024-07-04 10:58:03,305:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-04 10:58:03,305:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-04 10:58:03,310:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-04 10:58:03,310:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-04 10:58:03,311:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-04 10:58:03,316:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-04 10:58:03,317:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-04 10:58:03,318:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-04 10:58:03,763:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-04 10:58:03,764:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:58:02 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "RoXVYlvsHJk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-04 10:58:03,764:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-04 10:58:08,639:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8163_key-certbot.pem 2024-07-04 10:58:13,138:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8161_csr-certbot.pem 2024-07-04 10:58:13,138:DEBUG:acme.client:Requesting fresh nonce 2024-07-04 10:58:13,138:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-04 10:58:13,288:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-04 10:58:13,289:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:58:12 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9T-gznxjteb_7i3lMs7LZcQ8DoiGRFHub-B_w-fi_7GM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-04 10:58:13,289:DEBUG:acme.client:Storing nonce: eF-2qMJ9T-gznxjteb_7i3lMs7LZcQ8DoiGRFHub-B_w-fi_7GM 2024-07-04 10:58:13,289:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-07-04 10:58:13,296:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlULWd6bnhqdGViXzdpM2xNczdMWmNROERvaUdSRkh1Yi1CX3ctZmlfN0dNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "hTD7BF1GDtWPTQDUZJKb8Htrt2uVPJ0t7EQkRZzC14AbdQUfd-06cOn0UIWwq6IEN1WXOdCHFV8G-VOQuyStE2svxpOpr12g2Vm7CVriaEN-fCZV-g20a3XzTuTVGLqtXjQG6p0XnTNqOldkdjcwTtoW7GHJ_Z-06-0JRXS6duus2N8v-qZ5fXeYbyFysANcM44edOS2dHNAA1rB34DUbLuMS4Hs3AoxKi2aeGlG2w9mXdaw2O9LU3xX0sDK4Krpnidm6pjqALSpDH6BXu9AxaMAgnVUdZQIZai8DoOa9YWiIPjjULsU84KF-lVF7uMYGXTgyNl3Yc10dvAdiEhR-A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-04 10:58:13,461:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-07-04 10:58:13,462:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 04 Jul 2024 08:58:12 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963261767 Replay-Nonce: B-hK_YLCiYxzS6v0OqAjEnl-JHl9JIC48LeLLTJB2uBVBIgsksM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:18:10Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123357867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963261767" } 2024-07-04 10:58:13,462:DEBUG:acme.client:Storing nonce: B-hK_YLCiYxzS6v0OqAjEnl-JHl9JIC48LeLLTJB2uBVBIgsksM 2024-07-04 10:58:13,463:DEBUG:acme.client:JWS payload: b'' 2024-07-04 10:58:13,470:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123357867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENpWXh6UzZ2ME9xQWpFbmwtSkhsOUpJQzQ4TGVMTFRKQjJ1QlZCSWdza3NNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjMzNTc4NjcifQ", "signature": "I4dEurZDlGgrXoj4_PVFmxNxenvu77PWJH7earZHwb0NjolUtO0zFzj5MKajUY5fI_-mz5PN2ekciFG46jFOt8pqgfeEGtrOIIaTHyVHmfPFPuhaBmKtR1lVDrK7n85XeudnmkRThU6dSKckHoNgK0_gr0HNFMuUsyQpa09ElP5l2tkA6RBwf5kYw89KpdaMSW4nobSkxx79ug1zRekfXLTgiGe1mAg6dUlutJC2OTYHJxAfCByVswIvBhgOBAnOFIaIaJ4lxrBOGlCd3t5Pl21mOBzzbsaGRvUWe3w_b4GNyk4no4-944Jz-9Dp_2oBu0dXOLE_4GlHEQiUABmG9A", "payload": "" } 2024-07-04 10:58:13,636:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123357867 HTTP/1.1" 200 806 2024-07-04 10:58:13,637:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:58:12 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLCtCdcMeat5p8sstpsM2TJlaM_EWGFLGvp-s1jcxnx3-I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:18:10Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123357867/mRUn6w", "status": "pending", "token": "vR57CfJIiEzBkyxS5-OQeudZZpEMMl4X5XMNjQG9OUU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123357867/Flovww", "status": "pending", "token": "vR57CfJIiEzBkyxS5-OQeudZZpEMMl4X5XMNjQG9OUU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123357867/ejtuAg", "status": "pending", "token": "vR57CfJIiEzBkyxS5-OQeudZZpEMMl4X5XMNjQG9OUU" } ] } 2024-07-04 10:58:13,637:DEBUG:acme.client:Storing nonce: B-hK_YLCtCdcMeat5p8sstpsM2TJlaM_EWGFLGvp-s1jcxnx3-I 2024-07-04 10:58:13,637:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-04 10:58:13,638:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-07-04 10:58:13,638:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-04 10:58:13,639:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-04 10:58:13,639:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-04 10:58:13,640:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-04 10:58:13,640:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-04 10:58:13,640:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-04 10:58:13,642:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-04 10:58:13,692:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-07-04 10:58:13,692:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-04 10:58:13,693:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-07-04 10:58:13,699:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-07-04 10:58:13,702:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-07-04 10:58:13,702:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-07-04 10:58:13,702:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-07-04 10:58:13,703:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-07-04 10:58:13,704:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-07-04 10:58:13,746:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-04 10:58:13,945:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-04 10:58:13,945:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-04 10:58:13,946:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-04 10:58:13,951:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:58 UTC. 2024-07-04 10:58:13,951:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-04 10:58:13,952:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-04 10:58:13,957:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-04 10:58:13,957:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-04 10:58:13,957:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-04 10:58:13,973:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-04 10:58:13,974:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-04 10:58:13,976:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-04 10:58:14,415:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-04 10:58:14,416:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:58:13 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "9QUCDQZRjqA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-04 10:58:14,416:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-04 10:58:19,125:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8164_key-certbot.pem 2024-07-04 10:58:23,650:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8162_csr-certbot.pem 2024-07-04 10:58:23,650:DEBUG:acme.client:Requesting fresh nonce 2024-07-04 10:58:23,650:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-04 10:58:23,796:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-04 10:58:23,796:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:58:22 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ93cBbhGls9b9pxdKyojT5XcE8-SVDzED0zj_yGtYzVDQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-04 10:58:23,797:DEBUG:acme.client:Storing nonce: eF-2qMJ93cBbhGls9b9pxdKyojT5XcE8-SVDzED0zj_yGtYzVDQ 2024-07-04 10:58:23,797:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-07-04 10:58:23,803:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjkzY0JiaEdsczliOXB4ZEt5b2pUNVhjRTgtU1ZEekVEMHpqX3lHdFl6VkRRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "IB9-IBu1_UfALuI0qGdV5zPGs3jp28SI9QIiSnu_Srnhe0FwnF_3f8e_wlsduTcngRwC3jb_JZE7GyrunZYOjlKuHkVih-ZD7PpAHYvJk7J9ped2QQhMBKg-t2q9ShgR8Ti5xg1gGcPkL9lMxbjgMK61vA1Qyrh8seJTLVYfCi9ITHCPx94Xp8fh24WIVllc_EQabR-OVZpAf4jVdecQxYQyIEz8vMb-EDyLYBigChI3TIiJIeEewTCKDW-nSReZdqBXXU7oCERywD50SxnqXKJO7lrtgTSg2jQT91ykPwkPc-WESY27ToghiGWlJGFZDlfcDcT3yVrLUJDJybZlbA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-04 10:58:23,961:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-07-04 10:58:23,961:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 04 Jul 2024 08:58:22 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963292297 Replay-Nonce: eF-2qMJ9kgSAHbK25Nk_olsW_mk9W6UayE7XcbcxUYMiga7HQhs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:18:20Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123407597" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963292297" } 2024-07-04 10:58:23,962:DEBUG:acme.client:Storing nonce: eF-2qMJ9kgSAHbK25Nk_olsW_mk9W6UayE7XcbcxUYMiga7HQhs 2024-07-04 10:58:23,962:DEBUG:acme.client:JWS payload: b'' 2024-07-04 10:58:23,968:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123407597: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlrZ1NBSGJLMjVOa19vbHNXX21rOVc2VWF5RTdYY2JjeFVZTWlnYTdIUWhzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM0MDc1OTcifQ", "signature": "kCxgIJocLc8nojgMb3MbiwDqxoYIg3XmxyfVOaCsm43GGLsGA4awdetiGaDRXlnEMcPb47GVz_WoWM0dtaiDZqUo16fdUydSm2unOvJFjbvF3n4oaDeto4wCG_FXOi8BzQy9XMYJYTZBA-kqeQgcTJW9CQeLx8q918TGf1BxdRMUllTXWjQIXDb7Yxk1VMNGBpYdjE3UdPx8AoFpilWaMG9392z2hs_X9GfbgFJpDrt-yKkj1NQMozpsfnrzv50ZuQbmAmj2TlNVE9qKZNAVjc1QQNVSy7IxUbRsFK8AA02wJnk7zWioqv31VgpM_It1DpugAf5CoPvjoMCrh0nfHw", "payload": "" } 2024-07-04 10:58:24,131:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123407597 HTTP/1.1" 200 811 2024-07-04 10:58:24,132:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:58:23 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ96drFIvNNREKg58LU_ZtDtomDK3VTLx6jTBpj_9F2M-A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:18:20Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123407597/PlHedw", "status": "pending", "token": "c5NxYNQ8WjSBVHJ7l0AB7_0jPNRAMHulYIw8_gBxlCM" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123407597/IGmPMQ", "status": "pending", "token": "c5NxYNQ8WjSBVHJ7l0AB7_0jPNRAMHulYIw8_gBxlCM" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123407597/vPSuUg", "status": "pending", "token": "c5NxYNQ8WjSBVHJ7l0AB7_0jPNRAMHulYIw8_gBxlCM" } ] } 2024-07-04 10:58:24,132:DEBUG:acme.client:Storing nonce: eF-2qMJ96drFIvNNREKg58LU_ZtDtomDK3VTLx6jTBpj_9F2M-A 2024-07-04 10:58:24,132:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-04 10:58:24,133:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-07-04 10:58:24,133:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-04 10:58:24,133:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-04 10:58:24,134:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-04 10:58:24,134:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-04 10:58:24,135:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-04 10:58:24,135:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-04 10:58:24,136:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-04 10:58:24,189:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-04 10:58:24,401:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-04 10:58:24,402:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-04 10:58:24,403:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-04 10:58:24,408:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:15 UTC. 2024-07-04 10:58:24,408:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-04 10:58:24,408:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-04 10:58:24,413:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-04 10:58:24,414:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-04 10:58:24,414:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-04 10:58:24,429:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-04 10:58:24,430:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-04 10:58:24,432:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-04 10:58:24,867:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-04 10:58:24,868:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:58:23 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "eVcyzhdajhs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-04 10:58:24,868:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-04 10:58:29,729:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8165_key-certbot.pem 2024-07-04 10:58:34,205:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8163_csr-certbot.pem 2024-07-04 10:58:34,205:DEBUG:acme.client:Requesting fresh nonce 2024-07-04 10:58:34,206:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-04 10:58:34,351:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-04 10:58:34,351:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:58:33 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ90JqlZcM1Uag0eE4yLn8wOzdPakR5LsJJv4IAo7538DU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-04 10:58:34,352:DEBUG:acme.client:Storing nonce: eF-2qMJ90JqlZcM1Uag0eE4yLn8wOzdPakR5LsJJv4IAo7538DU 2024-07-04 10:58:34,352:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-07-04 10:58:34,358:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjkwSnFsWmNNMVVhZzBlRTR5TG44d096ZFBha1I1THNKSnY0SUFvNzUzOERVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "tQQEVqgF4ToRIwwhtpofVIiKZpWbA6P2hNhrGyWRrQO3RghxiOcSUbrtKdRN_z9-9G3yUy2jxmPKEgfeSv_2V9ptNuoM-5TUR2eZQ_EtdNUNrdBRezduPCjeG5DHpRQsB6I0Rrgi0qr0RmqulmEG-sBzGfb3uF84wMNZnUtGWZyfmJ-7fD6AtAgg3dnqoJuvCu9gKRXALsAyOfaJwcbthke2LZKYc2nk8ibhiKy0pvbxaZ_bYDTcfDmtxEhbyesXEkYDwWJapc6ftCgC5fuDTFUKggxTiOFgc5MggbF6ju-DQb6u4DxndBGcTwWj2xItPQTajMzDguvB49TT7J7J_w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-04 10:58:34,527:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-07-04 10:58:34,528:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 04 Jul 2024 08:58:33 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963320687 Replay-Nonce: B-hK_YLCzDxehiB3WinpLjUZ8e1N9OgGhNOniy1KTuFbnVo49ew X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:18:30Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123452997" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963320687" } 2024-07-04 10:58:34,528:DEBUG:acme.client:Storing nonce: B-hK_YLCzDxehiB3WinpLjUZ8e1N9OgGhNOniy1KTuFbnVo49ew 2024-07-04 10:58:34,529:DEBUG:acme.client:JWS payload: b'' 2024-07-04 10:58:34,535:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123452997: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTEN6RHhlaGlCM1dpbnBMalVaOGUxTjlPZ0doTk9uaXkxS1R1RmJuVm80OWV3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM0NTI5OTcifQ", "signature": "o7Jt8FZmHFrpQ3gSdqeT3wSteHFCeUaV4i_XTmcdd8mloP62SihS-5Szw3XiIEw66o4e54nMmf0OBD5ThsraciYjZRJmpt0C5V3LVAPM4P-kizXoRHl0fGnjnXetjLjrto_xjAzmL7I-IF310GC4EjAMwrj0bRgbVzy_peVJoW2MH5Tho-9PBiznNJTkjezmymrTPArxyhU2UoD7Kfg4KxGWOsT2uqbmXRojOu8FGrqipDMuVToTLVx_USdpEeSZOdogTB_-Bgzky1_iFHyg_G2gNE0hfxSrG7RmfQ3lJs_d8PRtextIl98LgADZsIvDLIlinsP_7zfQylbXkpSPew", "payload": "" } 2024-07-04 10:58:34,685:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123452997 HTTP/1.1" 200 810 2024-07-04 10:58:34,685:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:58:33 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9u0gAfbC-8te3MQOXhg7BJgJMRMcT1OPhtpH6uYmF3so X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:18:30Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123452997/jVGASw", "status": "pending", "token": "MYOwzrR2RRKB5uTkD_qGd9O1ma1MnG7fQdor3OIAZ5A" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123452997/HCdluw", "status": "pending", "token": "MYOwzrR2RRKB5uTkD_qGd9O1ma1MnG7fQdor3OIAZ5A" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123452997/7JAHfA", "status": "pending", "token": "MYOwzrR2RRKB5uTkD_qGd9O1ma1MnG7fQdor3OIAZ5A" } ] } 2024-07-04 10:58:34,685:DEBUG:acme.client:Storing nonce: eF-2qMJ9u0gAfbC-8te3MQOXhg7BJgJMRMcT1OPhtpH6uYmF3so 2024-07-04 10:58:34,686:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-04 10:58:34,686:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-07-04 10:58:34,686:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-04 10:58:34,687:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-04 10:58:34,688:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-04 10:58:34,688:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-04 10:58:34,688:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-04 10:58:34,689:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-04 10:58:34,690:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-04 10:58:34,731:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-04 10:58:34,935:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-04 10:58:34,937:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-07-04 10:58:34,938:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-07-04 10:58:34,942:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:29 UTC. 2024-07-04 10:58:34,942:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-04 10:58:34,942:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-04 10:58:34,947:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-04 10:58:34,947:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-04 10:58:34,947:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-04 10:58:34,952:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-04 10:58:34,953:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-04 10:58:34,956:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-04 10:58:35,437:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-04 10:58:35,437:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:58:34 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "24S4b23A_HI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-04 10:58:35,438:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-04 10:58:40,899:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8166_key-certbot.pem 2024-07-04 10:58:45,399:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8164_csr-certbot.pem 2024-07-04 10:58:45,400:DEBUG:acme.client:Requesting fresh nonce 2024-07-04 10:58:45,400:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-04 10:58:45,562:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-04 10:58:45,562:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:58:44 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6Ck1rnUehm6-pjgGtbzyJUI4rHKzRCMH_y4eFw8UWJSIFQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-04 10:58:45,563:DEBUG:acme.client:Storing nonce: qqMiT6Ck1rnUehm6-pjgGtbzyJUI4rHKzRCMH_y4eFw8UWJSIFQ 2024-07-04 10:58:45,563:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-07-04 10:58:45,570:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2sxcm5VZWhtNi1wamdHdGJ6eUpVSTRySEt6UkNNSF95NGVGdzhVV0pTSUZRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "I_6eLuBngS3Exkn13SpiVUMsI4QXknrbJ-hYHJIVeAMoOgNHhGaalviMpXMK0sxdBfUf1-8kocwXblR1cN2ZObt4deE0kAHd9lqUwqFUbt44leU33YM4ufsrIqdqpfeLZJDqpZoZf07CMLIfZVxUzn13AyQgJw8VgU05qP_lU-awJRGHXpGdgV83PVvxzGqYHLn30JV5sZUotiGhkzlUxUt0Om4Svym89kHnRwZPTPtDV51K1K__--pbDJT_OGmXEX56-owa7GFyF-TOELdVMBrx9EDYNcbls0EWalAVTSfawLwKYUFYUJMtjF_b8ll9EmHO7j-a6CJArK5mo5WPWg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-04 10:58:45,741:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-07-04 10:58:45,742:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 04 Jul 2024 08:58:44 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963348157 Replay-Nonce: qqMiT6Ck5CdVEJyinboIquwc1yrUjOTVRQitZsx-C7EZ7nks_tQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:18:40Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123495577" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963348157" } 2024-07-04 10:58:45,742:DEBUG:acme.client:Storing nonce: qqMiT6Ck5CdVEJyinboIquwc1yrUjOTVRQitZsx-C7EZ7nks_tQ 2024-07-04 10:58:45,742:DEBUG:acme.client:JWS payload: b'' 2024-07-04 10:58:45,748:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123495577: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2s1Q2RWRUp5aW5ib0lxdXdjMXlyVWpPVFZSUWl0WnN4LUM3RVo3bmtzX3RRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM0OTU1NzcifQ", "signature": "I88QF3p09MYB-1oOR2jmp1LQb8vBwo3fxnanAxa0vtbWxisKW2-c47PI2GPcCDywn4oiId46srhA43x6gPFATobX4ZSnPZ4G_oaG49NA5KX1kg346gN2SaFdmiQ9qvxqcmJSRyWiv_5mE8UrEZO5kV4oKy9UPlvfGslOu8NaKwuYtg-ktyq7AsDMxC4U-xEv1tcvI0XtmVkd1ZECqlscmVWjzRj2-ip3SeFvQWgAWwpFfn_AH02bFtF67GsVSm9_K5Fz6ceXqpixt5iwnXPDGMAgOWUpto_JWsChP7_fIypqRqyHSC1M-JI73B79vaO86PgYOOuMYQj93tybMZ1F8Q", "payload": "" } 2024-07-04 10:58:45,915:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123495577 HTTP/1.1" 200 809 2024-07-04 10:58:45,915:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:58:44 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6CkpmiGdeQulXoShjp6_dDtutHV3QPPerK1teyZfrVfELY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:18:40Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123495577/CYYT4Q", "status": "pending", "token": "hH2ZlSVCjTVVXgA8Ah2DT5fxGcRpFcteegN4uH99PiA" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123495577/HlKjqg", "status": "pending", "token": "hH2ZlSVCjTVVXgA8Ah2DT5fxGcRpFcteegN4uH99PiA" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123495577/iwR44A", "status": "pending", "token": "hH2ZlSVCjTVVXgA8Ah2DT5fxGcRpFcteegN4uH99PiA" } ] } 2024-07-04 10:58:45,916:DEBUG:acme.client:Storing nonce: qqMiT6CkpmiGdeQulXoShjp6_dDtutHV3QPPerK1teyZfrVfELY 2024-07-04 10:58:45,916:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-04 10:58:45,917:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-07-04 10:58:45,917:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-04 10:58:45,917:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-04 10:58:45,918:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-04 10:58:45,918:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-04 10:58:45,918:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-04 10:58:45,918:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-04 10:58:45,919:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-04 10:58:45,967:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-04 10:58:46,157:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-04 10:58:46,158:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-07-04 10:58:46,159:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-07-04 10:58:46,163:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:53 UTC. 2024-07-04 10:58:46,163:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-04 10:58:46,164:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-04 10:58:46,169:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-04 10:58:46,169:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-04 10:58:46,170:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-04 10:58:46,174:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-04 10:58:46,175:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-04 10:58:46,177:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-04 10:58:46,623:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-04 10:58:46,624:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:58:45 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "rqP1K-NCD_k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-04 10:58:46,624:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-04 10:58:51,685:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8167_key-certbot.pem 2024-07-04 10:58:56,309:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8165_csr-certbot.pem 2024-07-04 10:58:56,309:DEBUG:acme.client:Requesting fresh nonce 2024-07-04 10:58:56,310:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-04 10:58:56,459:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-04 10:58:56,460:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:58:55 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLC1naUtmTUVH75zrliKzFAZdriYSqB-MxAW8uN6xA0kts X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-04 10:58:56,460:DEBUG:acme.client:Storing nonce: B-hK_YLC1naUtmTUVH75zrliKzFAZdriYSqB-MxAW8uN6xA0kts 2024-07-04 10:58:56,460:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-07-04 10:58:56,465:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTEMxbmFVdG1UVVZINzV6cmxpS3pGQVpkcmlZU3FCLU14QVc4dU42eEEwa3RzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "diwTUQ8d8TzsMmklSaCFtgSnGUMq6C8wffpiA4AAZmLI5zQZ4zBit3fRnIKQwl04STGLZyH6kBV5SCSaTpEAQUILJGiBxKiu8Z1jd9yfXsWfoGTfXyfKt01psGVebFrPH1zK3ARlqurUKRAeZVR3zSJ2yfBKOMlGKsEgADG34qnDlb5Ee0zgaVCZwWPyZzYT08lWaXHdUtFo8FOcf5Xn_FDlxCaKtAmArhEkoxhPXShGFbXevpIygir-7dMsmp1dJFixg5MKEwwhr1E52pBOgalyUk_7olgNqwhpHfU_muWc-dR1tDCVHW7JKsjsb3QwH02p-iKRYAVMb0wd9Uw3cA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-04 10:58:56,628:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-04 10:58:56,629:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 04 Jul 2024 08:58:55 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963374667 Replay-Nonce: B-hK_YLCXL_WHtMCRyccgtf5KnX4rguBwKJRfKnjfzRAjMoo87I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:18:51Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123535867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963374667" } 2024-07-04 10:58:56,629:DEBUG:acme.client:Storing nonce: B-hK_YLCXL_WHtMCRyccgtf5KnX4rguBwKJRfKnjfzRAjMoo87I 2024-07-04 10:58:56,630:DEBUG:acme.client:JWS payload: b'' 2024-07-04 10:58:56,635:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123535867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENYTF9XSHRNQ1J5Y2NndGY1S25YNHJndUJ3S0pSZktuamZ6UkFqTW9vODdJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM1MzU4NjcifQ", "signature": "Dn_J2JMZhzkz_ytu_fMkdN-CZbuMUj891i3X6lXcCAggzraH5KVdi4SqNNsSHE7Nbb_dd_Oi8M9kg8wkc5JqefIEm2GWJAEr6qD-uaMtOQwG-5-FcWvpGA3B5dqHysowBTv8pvXFI7VzZPLDd6w6viGItswsamubLZFvHZ3TFA79lVlX4NVk_XRls2N4zh8qUc7d1Z2LVJKpQTL-BhNDjjnZCTXO6kGkusDnDH1MWFGGsO7jY2CM4gR-tdMkJbwxJ6WawL1byyrQZZ7lPa0-shTIj1ZtrTU-KPUmSd71LX0C1EcZAyiOcUQCIp0vi1aoFDoe6_oFY5YJPDateEnQLA", "payload": "" } 2024-07-04 10:58:56,802:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123535867 HTTP/1.1" 200 805 2024-07-04 10:58:56,802:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:58:55 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLCYTuv8_BlLCogBDIxryjfDYXYe6E9z4W6NQ7BxuSoces X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:18:51Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123535867/7949-Q", "status": "pending", "token": "Ekt5G4sOXt2Ok7lxEhvWeLSKtYbzRE-Q7SXrZi_oLK8" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123535867/1xlmxg", "status": "pending", "token": "Ekt5G4sOXt2Ok7lxEhvWeLSKtYbzRE-Q7SXrZi_oLK8" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123535867/Gfn7VQ", "status": "pending", "token": "Ekt5G4sOXt2Ok7lxEhvWeLSKtYbzRE-Q7SXrZi_oLK8" } ] } 2024-07-04 10:58:56,802:DEBUG:acme.client:Storing nonce: B-hK_YLCYTuv8_BlLCogBDIxryjfDYXYe6E9z4W6NQ7BxuSoces 2024-07-04 10:58:56,803:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-04 10:58:56,804:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-07-04 10:58:56,804:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-04 10:58:56,804:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-04 10:58:56,805:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-04 10:58:56,805:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-04 10:58:56,805:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-04 10:58:56,806:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-04 10:58:56,806:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-04 10:58:56,858:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-04 10:58:57,063:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-04 10:58:57,063:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-04 10:58:57,064:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-04 10:58:57,069:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:19 UTC. 2024-07-04 10:58:57,069:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-04 10:58:57,070:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-04 10:58:57,075:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-04 10:58:57,075:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-04 10:58:57,075:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-04 10:58:57,091:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-04 10:58:57,092:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-04 10:58:57,094:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-04 10:58:57,574:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-04 10:58:57,574:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:58:56 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "glO2fAcboL0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-04 10:58:57,575:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-04 10:59:02,059:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8168_key-certbot.pem 2024-07-04 10:59:06,397:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8166_csr-certbot.pem 2024-07-04 10:59:06,398:DEBUG:acme.client:Requesting fresh nonce 2024-07-04 10:59:06,398:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-04 10:59:06,560:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-04 10:59:06,561:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:59:05 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6Ckvr2fmzd0nixm94gQEF7hHyTI9Rzrj1GvzpvpVJjvjuk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-04 10:59:06,561:DEBUG:acme.client:Storing nonce: qqMiT6Ckvr2fmzd0nixm94gQEF7hHyTI9Rzrj1GvzpvpVJjvjuk 2024-07-04 10:59:06,561:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-07-04 10:59:06,569:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2t2cjJmbXpkMG5peG05NGdRRUY3aEh5VEk5UnpyajFHdnpwdnBWSmp2anVrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "DH3BrOJczNRF1VyteBqSXRGwS9Kz7BgkeK8US13d_8zYOl8hGPLl5LN9CIWG_XpSQfP1S0DDVOmcWzw-AEc3MbCHGDTb0N2vlH0lwaB1pQKJQa2RuZYMEoiahinIMsT_zyhaU1wQbEYXdBQiyo_Mn-eNbGIaQpQN93aabOmV9T3XGXzY_ZvdJmmNs-g804PfK_mqe77IgHIqekDgRJthNtM6BlC1rOmxMXJgZoYXvSOo8tRfbOvLvFHtakuxNEbm1Z8ky8r3sx3z2kVzvUxqobiiNdMRBTee_odFRcGZe8-UwujAlcdDSj9qCURbDQs6FIr0YU_8n4MGHdhY3jLqNA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-04 10:59:06,751:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-04 10:59:06,752:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 04 Jul 2024 08:59:05 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963400877 Replay-Nonce: jqVAJFJ0PPd9o9wcGfrLvGPqZYdd974PAlWoKxTNKIrxG44o17w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:19:01Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123574347" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963400877" } 2024-07-04 10:59:06,752:DEBUG:acme.client:Storing nonce: jqVAJFJ0PPd9o9wcGfrLvGPqZYdd974PAlWoKxTNKIrxG44o17w 2024-07-04 10:59:06,752:DEBUG:acme.client:JWS payload: b'' 2024-07-04 10:59:06,758:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123574347: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBQUGQ5bzl3Y0dmckx2R1BxWllkZDk3NFBBbFdvS3hUTktJcnhHNDRvMTd3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM1NzQzNDcifQ", "signature": "LZAyDh1YQZGsf9S07566PNgRtycC2gbyV6MGbmVBkzhPvBmpu77nDPw-4hDtGTCcIXtogCzDOpt8vC35ssA4cvbesuSkojdYgT8fRKi4tT9FYg9z46MalNugKmQ_rVSU6lPzsowF86ZF51UWp1QIikx2lkyjCBcrcHziEwcC7Ap9Cup_HEqWo-Xhx8VTpP_5iI7WEjE3GKQF6Gnx3wM1VjHVR6C-vM3dHO9pvMWTxkvBNsc_ReFFeuzhQU2X5zgvQ9Akgyh0PucCe2gP18sSh5_NvpRNT2mSopEOqjIfwdKcgETTjfEn1k26nm8eoGVsVengC8_VYRz2qfjMhOsR6Q", "payload": "" } 2024-07-04 10:59:06,924:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123574347 HTTP/1.1" 200 805 2024-07-04 10:59:06,924:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:59:05 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ02zGbmO75wirMMUAzp600RP-XZGoGdMm4rUFG6_FhwBE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:19:01Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123574347/NeAJIw", "status": "pending", "token": "gEmc-Xtg1wVd_4T_7zo-9M-F8HiHOy4tsBmAS7699IU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123574347/4slvLA", "status": "pending", "token": "gEmc-Xtg1wVd_4T_7zo-9M-F8HiHOy4tsBmAS7699IU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123574347/_5WNoA", "status": "pending", "token": "gEmc-Xtg1wVd_4T_7zo-9M-F8HiHOy4tsBmAS7699IU" } ] } 2024-07-04 10:59:06,924:DEBUG:acme.client:Storing nonce: jqVAJFJ02zGbmO75wirMMUAzp600RP-XZGoGdMm4rUFG6_FhwBE 2024-07-04 10:59:06,925:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-04 10:59:06,925:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-07-04 10:59:06,926:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-04 10:59:06,926:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-04 10:59:06,927:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-04 10:59:06,927:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-04 10:59:06,927:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-04 10:59:06,928:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-04 10:59:06,929:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-04 10:59:06,982:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-04 10:59:07,170:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-04 10:59:07,171:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-04 10:59:07,172:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-04 10:59:07,176:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:37 UTC. 2024-07-04 10:59:07,176:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-04 10:59:07,177:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-04 10:59:07,182:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-04 10:59:07,182:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-04 10:59:07,182:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-04 10:59:07,187:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-04 10:59:07,188:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-04 10:59:07,190:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-04 10:59:07,636:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-04 10:59:07,637:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:59:06 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "ORLGCC6I5X0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-04 10:59:07,637:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-04 10:59:12,185:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8169_key-certbot.pem 2024-07-04 10:59:16,510:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8167_csr-certbot.pem 2024-07-04 10:59:16,511:DEBUG:acme.client:Requesting fresh nonce 2024-07-04 10:59:16,511:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-04 10:59:16,661:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-04 10:59:16,661:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:59:15 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9n-Wu-PIIfSQTuu6L49QC5vMjxjhF8LM9Ift8a_2gnwM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-04 10:59:16,662:DEBUG:acme.client:Storing nonce: eF-2qMJ9n-Wu-PIIfSQTuu6L49QC5vMjxjhF8LM9Ift8a_2gnwM 2024-07-04 10:59:16,662:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-07-04 10:59:16,667:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjluLVd1LVBJSWZTUVR1dTZMNDlRQzV2TWp4amhGOExNOUlmdDhhXzJnbndNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "pIWyKQFbo2UBSD_5BcQb_WxnaX-TR252bjjM9vvUp9CUgAyZFtQuAVdUQEj5XJHTcVerXlIiYEALe4cR8U1KE4hLYCnZxr7PY_xkLn87v1rMU3Zh-oWyP-mSgNLNDBpXyYW-XlARat1GpXfBesl-MTj-AucYlzApAYyJd7z-2YAP7tG6xTeeJhV4jWgMxsuqYw8rEPEtOCjkHSAgpyoMOKQZgWBQAtKbUX3HnQ5cS4F2zCLPydN0qYOBGrxdG3CuIVhV8MJaDOv6ARTcJ5Lcf4Vi4SWMTcg5gf9bqAaNd0pTivxeKwsmFDvxxqSA5RURrUFeMt8smLxSzUvx95zh6A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-04 10:59:16,833:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-04 10:59:16,834:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 04 Jul 2024 08:59:15 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/283963440917 Replay-Nonce: B-hK_YLCEQwoG10IjTU63rS5cc7k1qOxQTosIwKzaz2M9NfHApE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-10T11:19:11Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123633137" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/283963440917" } 2024-07-04 10:59:16,834:DEBUG:acme.client:Storing nonce: B-hK_YLCEQwoG10IjTU63rS5cc7k1qOxQTosIwKzaz2M9NfHApE 2024-07-04 10:59:16,834:DEBUG:acme.client:JWS payload: b'' 2024-07-04 10:59:16,839:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/372123633137: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENFUXdvRzEwSWpUVTYzclM1Y2M3azFxT3hRVG9zSXdLemF6Mk05TmZIQXBFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNzIxMjM2MzMxMzcifQ", "signature": "q82XRKdFlbcr_IS_Na8qMaf_PVakMExvheF2u6nCTtiClkqfqBVQEDimy94sadKAWOA8fdnxcdiTK_ygZ70_ix5djHU-tfWrmG7te-5NDxjEOlVUE3fH2YxmhxSmuz6ZTVY4bgRBUq8UKVQeU8Vz2q0P3NYjcoygiyT7MnNKzt-kc23s4us4jmrZaRC9iGH_m3JYnogWhnkJzT_g4b_hPURrUZytAy_BUY-UGiRxMtoqic8Hq7jRxJD5TAr3bE4juNtfqnnaXtJRX8S_HwqIr7Hcz-SpxnJ0BBvRNHkSxt5wYqKGLwxJ7DCplR2SEi7LW0kFldR5DGc58iUnG-ohkQ", "payload": "" } 2024-07-04 10:59:16,993:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/372123633137 HTTP/1.1" 200 805 2024-07-04 10:59:16,994:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 04 Jul 2024 08:59:15 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9PQzicwcyEtVABh04ONp6--SUNwo9iCjQpymbeIl8WEU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-10T11:19:11Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123633137/cKgBUw", "status": "pending", "token": "0WqyloOYpCn8UFv2gXPije6XsdJdrPcJjD8ZRYFv-2A" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123633137/fI1u_A", "status": "pending", "token": "0WqyloOYpCn8UFv2gXPije6XsdJdrPcJjD8ZRYFv-2A" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/372123633137/N6igCw", "status": "pending", "token": "0WqyloOYpCn8UFv2gXPije6XsdJdrPcJjD8ZRYFv-2A" } ] } 2024-07-04 10:59:16,994:DEBUG:acme.client:Storing nonce: eF-2qMJ9PQzicwcyEtVABh04ONp6--SUNwo9iCjQpymbeIl8WEU 2024-07-04 10:59:16,995:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-04 10:59:16,995:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-07-04 10:59:16,996:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-04 10:59:16,996:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-04 10:59:16,997:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-04 10:59:16,997:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-04 10:59:16,997:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-04 10:59:16,998:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-04 10:59:16,999:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-04 10:59:16,999:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-07-04 10:59:16,999:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-07-04 10:59:17,001:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-07-04 10:59:17,003:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)