2024-07-02 22:10:04,666:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-07-02 22:10:04,666:DEBUG:certbot._internal.main:Arguments: [] 2024-07-02 22:10:04,666:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-07-02 22:10:05,555:DEBUG:certbot._internal.log:Root logging level set at 20 2024-07-02 22:10:05,556:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-07-02 22:10:05,593:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-07-02 22:10:05,633:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 22:10:05,907:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 22:10:05,910:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2024-07-02 22:10:05,915:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2024-07-02 22:10:05,924:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:12 UTC. 2024-07-02 22:10:05,924:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 22:10:05,925:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 22:10:05,930:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-02 22:10:05,933:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-02 22:10:05,933:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-02 22:10:05,940:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-02 22:10:05,942:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-02 22:10:05,945:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-02 22:10:06,414:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-02 22:10:06,415:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:10:05 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "IKlGG6hxzKo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-02 22:10:06,416:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-02 22:10:11,823:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8118_key-certbot.pem 2024-07-02 22:10:16,682:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8116_csr-certbot.pem 2024-07-02 22:10:16,682:DEBUG:acme.client:Requesting fresh nonce 2024-07-02 22:10:16,682:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-02 22:10:16,832:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-02 22:10:16,832:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:10:15 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9sLcoJo53QNGps8O_xg69g-uLwHovzT-UyzhQHxRTsNE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-02 22:10:16,832:DEBUG:acme.client:Storing nonce: eF-2qMJ9sLcoJo53QNGps8O_xg69g-uLwHovzT-UyzhQHxRTsNE 2024-07-02 22:10:16,833:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-07-02 22:10:16,839:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlzTGNvSm81M1FOR3BzOE9feGc2OWctdUx3SG92elQtVXl6aFFIeFJUc05FIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "xzw-0h9ibds92D4cLBr_Xe96VCw64QVGhD1I5KxNJ8FeRC9SX57l44S4QsOqw8Je0xs1BnM32gD1RgfyEPsfvAQRK2pegYKvZEH7riNy-iIdQ228kA-rUqpZTPMOwfGeNU-adB_5ZehTAxbLGjgWd0AudwQViPwtYGsDvmdTrL8ua5ttlNK2LVhjQikXC6xfbOBfiB9LTtnhuiDGXfsnKXCMSM-wR2_SmzE3wkUCdP0qCZLqul_C0GTRQQpqdS7Wmo-yy7iHiK5y7u5R-acxH2uE-MGPZjIjzaoPp6g1ILTB0_LsvMPoLR6Txf8vJsNXP8kY7asiwSdM2dEd8kGE7Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-02 22:10:17,008:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-07-02 22:10:17,009:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 02 Jul 2024 20:10:15 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824128037 Replay-Nonce: B-hK_YLCRr6i1WfPtRCbGNq1mVM_1059LaAe5TzzeHB1p_5Lap4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:00:50Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985446737" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824128037" } 2024-07-02 22:10:17,009:DEBUG:acme.client:Storing nonce: B-hK_YLCRr6i1WfPtRCbGNq1mVM_1059LaAe5TzzeHB1p_5Lap4 2024-07-02 22:10:17,009:DEBUG:acme.client:JWS payload: b'' 2024-07-02 22:10:17,016:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985446737: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENScjZpMVdmUHRSQ2JHTnExbVZNXzEwNTlMYUFlNVR6emVIQjFwXzVMYXA0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU0NDY3MzcifQ", "signature": "PiurBFXDuEhna8KC-hcipb2kFv-_yc2ab-sQu4fuQoto8SOO19zB49oNPyMv7z8cEDnZwB5d8TBrYoEUC8bh2Dllw74rSf70WSPAfkN07GxdXwIA_KMYrCvQyAP3OfeoWMw1goUaYRVPWyF3m5jXVEWLw3HFuL9coIvS4UfomQqWv8T2s4pmCkuAGHDRUuJN7UNdXwrScjqT4tsdbyYWtwBFLvDm5TCyYfisFj4qrv5HyVO8swPl6c3Uf8LyH0Yr_tHIGIQyIq-ASGouDgZBq-mfiPMtq5uGhI3vuxQak-Dprz_ISLq23TLGUbZt0FNJ9sWZC_2DRgsdeA7UQ3C2jg", "payload": "" } 2024-07-02 22:10:17,218:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985446737 HTTP/1.1" 200 810 2024-07-02 22:10:17,219:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:10:15 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLC2zXdmi8duCLJEqLZbsi3kaFuls-wl3PEPqNlhqzdtxY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:00:50Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/KAQe7Q", "status": "pending", "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/Sd6_7w", "status": "pending", "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/Ra3-nA", "status": "pending", "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ" } ] } 2024-07-02 22:10:17,219:DEBUG:acme.client:Storing nonce: B-hK_YLC2zXdmi8duCLJEqLZbsi3kaFuls-wl3PEPqNlhqzdtxY 2024-07-02 22:10:17,220:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-02 22:10:17,220:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-07-02 22:10:17,220:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-02 22:10:17,221:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-02 22:10:17,234:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 22:10:17,235:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-02 22:10:17,235:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-02 22:10:17,235:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-02 22:10:17,241:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 22:10:17,285:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 22:10:17,467:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 22:10:17,468:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-02 22:10:17,469:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-02 22:10:17,473:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:26 UTC. 2024-07-02 22:10:17,474:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 22:10:17,474:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 22:10:17,479:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-02 22:10:17,479:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-02 22:10:17,479:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-02 22:10:17,483:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-02 22:10:17,484:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-02 22:10:17,486:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-02 22:10:17,934:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-02 22:10:17,934:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:10:16 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "4XZeU_3pEjY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-02 22:10:17,935:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-02 22:10:23,095:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8119_key-certbot.pem 2024-07-02 22:10:27,551:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8117_csr-certbot.pem 2024-07-02 22:10:27,552:DEBUG:acme.client:Requesting fresh nonce 2024-07-02 22:10:27,552:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-02 22:10:27,704:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-02 22:10:27,704:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:10:26 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9OgoUjK0G5J1_Ev3eqr4jDNV2itzYv0r6qlKQZSlaGS4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-02 22:10:27,705:DEBUG:acme.client:Storing nonce: eF-2qMJ9OgoUjK0G5J1_Ev3eqr4jDNV2itzYv0r6qlKQZSlaGS4 2024-07-02 22:10:27,705:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-07-02 22:10:27,711:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlPZ29VakswRzVKMV9FdjNlcXI0akROVjJpdHpZdjByNnFsS1FaU2xhR1M0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "psGI0rDpgIrkqUge2oC9JMGVvNWBXbpu5A8ivo45f26MmGqQnQIlXsqGXhFg7cRGuhzfSAYNOpFpt1g24fDZtLYRNO978Nf32g_6uFfOknv9PUgIusn2nKe928wQd92JjiN2dU64KvX2Yxnq5EU3HJus089lLUo1UfBHeht9JGbfXNoGGoQaP4Adg9hBfTqw4UH6aLuS-0K2robXcB14ByxH4aAJuEzulUZq6Hybse8SNNuZCtj7K9nGZtOHWkY_ZwUO-V3ayBAnFgT4O7VrFFHSH4H-MX1_iaolzXFoFyVIsQ3xtJCiAANZopM36nNzHVBF2W6V4hh2m08m1dreCQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-02 22:10:27,873:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-07-02 22:10:27,874:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 02 Jul 2024 20:10:26 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824165847 Replay-Nonce: eF-2qMJ9fcAy7MEoBNmFFbVU_QuzZ_JdctnP19OPjQDYTUxDhU4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:01Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985503087" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824165847" } 2024-07-02 22:10:27,874:DEBUG:acme.client:Storing nonce: eF-2qMJ9fcAy7MEoBNmFFbVU_QuzZ_JdctnP19OPjQDYTUxDhU4 2024-07-02 22:10:27,874:DEBUG:acme.client:JWS payload: b'' 2024-07-02 22:10:27,880:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985503087: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlmY0F5N01Fb0JObUZGYlZVX1F1elpfSmRjdG5QMTlPUGpRRFlUVXhEaFU0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU1MDMwODcifQ", "signature": "f3AjSlCuX370eiBI1IkgPRFlw_v9ciNFer9vJbL4I_7tnWQYMk-k9MHBN41YHEXR8gqLhyQwXAG888EvU5bpsrBgWrbrI6o5YvcXLQLA-WeXkSdRrSE0OJKD4AOToZCgR6djNDd2xb9dT90qYL-Ev2kAdZu4K_rtnZwVQsiBVB5xppV8R4Lii4afLRNRJm03qWK8W1xklMKQRuREanjmba7LLL0HYx13_sUqwm9XKR6sPyfLAhgoC9wShp6shnEg0-uCRGQNC5IeATBKcKXqZsxK03ImB_dLVCiZUBGeQGFYSElf-xhHOPhlfeG0YqAbrBD_mHStArrl_SPHMe9MsQ", "payload": "" } 2024-07-02 22:10:28,037:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985503087 HTTP/1.1" 200 804 2024-07-02 22:10:28,038:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:10:26 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9hzZqc8Wc3rEV8VOkzWbu8ZAot3gBsB4MLzSj3kbm3fM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:01Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/6TW65g", "status": "pending", "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/HbqBvA", "status": "pending", "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/f36r8w", "status": "pending", "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ" } ] } 2024-07-02 22:10:28,038:DEBUG:acme.client:Storing nonce: eF-2qMJ9hzZqc8Wc3rEV8VOkzWbu8ZAot3gBsB4MLzSj3kbm3fM 2024-07-02 22:10:28,038:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-02 22:10:28,039:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-07-02 22:10:28,039:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-02 22:10:28,039:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-02 22:10:28,040:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 22:10:28,040:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-02 22:10:28,040:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-02 22:10:28,041:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-02 22:10:28,042:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 22:10:28,082:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 22:10:28,273:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 22:10:28,274:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-02 22:10:28,275:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-02 22:10:28,280:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:40 UTC. 2024-07-02 22:10:28,280:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 22:10:28,281:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 22:10:28,286:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-02 22:10:28,286:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-02 22:10:28,286:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-02 22:10:28,299:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-02 22:10:28,300:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-02 22:10:28,301:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-02 22:10:28,793:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-02 22:10:28,794:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:10:27 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "AWI4pdJzw2A": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-02 22:10:28,794:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-02 22:10:33,882:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8120_key-certbot.pem 2024-07-02 22:10:38,421:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8118_csr-certbot.pem 2024-07-02 22:10:38,422:DEBUG:acme.client:Requesting fresh nonce 2024-07-02 22:10:38,422:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-02 22:10:38,586:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-02 22:10:38,586:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:10:37 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6CkPXOLsZZSMp38QwCiYsIfBOynIKV54SEUsz8tR2y4y_c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-02 22:10:38,586:DEBUG:acme.client:Storing nonce: qqMiT6CkPXOLsZZSMp38QwCiYsIfBOynIKV54SEUsz8tR2y4y_c 2024-07-02 22:10:38,587:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-07-02 22:10:38,593:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tQWE9Mc1paU01wMzhRd0NpWXNJZkJPeW5JS1Y1NFNFVXN6OHRSMnk0eV9jIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "GOQlXOH9OVcYRZJGHgNJo8pmvrovgbb-brHQIxwKYXJqOV-ikffUNApTeQee2UoBaDsItNK9gAdtC30Aj18CZEuJ2nZKB8MSXJjjNF7koPjQ33aX6pfNM3W6Otbof0LolJHwb5gyydCpjZWRfbwQp3J5a2oYpUA9Ca25V2g046nAHHd-EW0IohJ2SPEVuNQrTqUSUhZc5JZizFQE6ToziiGUvtEIP3Ixx-HPQHqckPtWTcj9QbZ8JxUlHgqNuJ4NIGA-x4JIyCfVhC027BNmZcz2OZEbv3MS9R3mE1CXn1VmyWrt6BUKmO-6CwVduCrvZrWJdFvQo_wPrIzsLMARRA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-02 22:10:38,767:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-07-02 22:10:38,767:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 02 Jul 2024 20:10:37 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824216467 Replay-Nonce: qqMiT6CkjT1tVH6uGMgGHrF6jR-rXAW7i7ccCyPZrLkFZsxPke4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:11Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985574177" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824216467" } 2024-07-02 22:10:38,768:DEBUG:acme.client:Storing nonce: qqMiT6CkjT1tVH6uGMgGHrF6jR-rXAW7i7ccCyPZrLkFZsxPke4 2024-07-02 22:10:38,768:DEBUG:acme.client:JWS payload: b'' 2024-07-02 22:10:38,774:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985574177: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tqVDF0Vkg2dUdNZ0dIckY2alItclhBVzdpN2NjQ3lQWnJMa0Zac3hQa2U0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU1NzQxNzcifQ", "signature": "ntONOgqP6O9Pp0ll8roqr4rIElzxM1MBHECZjCQgKGb5A5bZ7AbX3ymUZ7RM94AqYeLmNJCo8FrER9CYItzsU40eakE2OX3VU4QZkkiS-SqgBWCq_8LpzN-0xmbkdMvDPavDDfdvfCfs65Wu90YO-JbfFKFwmLBJ94ft6wjIS6rDoUHSHv5avBWgdLjFPcalJtWs2vTa1PKMdxbIv0a8x-aqWNHx1EtlbyOWGjkDjUBo7Sb04pVsJBDvep5s0HxANhbvjzjULeQOd1TTuoLI3MqFJPXTzXNIexl_WFrothxHH_fTCzwMoZJd9iiLXIWBQYqfTfwtucQMva8ivA4JHg", "payload": "" } 2024-07-02 22:10:38,944:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985574177 HTTP/1.1" 200 807 2024-07-02 22:10:38,945:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:10:37 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0AJqt4kaKzicr5eDsDnynWnCyZxoknmM67Q9tYSA48LU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:11Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/RO51fg", "status": "pending", "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/APGIHQ", "status": "pending", "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/4l4xCQ", "status": "pending", "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs" } ] } 2024-07-02 22:10:38,945:DEBUG:acme.client:Storing nonce: jqVAJFJ0AJqt4kaKzicr5eDsDnynWnCyZxoknmM67Q9tYSA48LU 2024-07-02 22:10:38,945:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-02 22:10:38,946:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-07-02 22:10:38,946:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-02 22:10:38,946:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-02 22:10:38,947:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 22:10:38,947:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-02 22:10:38,947:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-02 22:10:38,948:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-02 22:10:38,949:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 22:10:39,004:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 22:10:39,186:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 22:10:39,188:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-02 22:10:39,188:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-02 22:10:39,193:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:54 UTC. 2024-07-02 22:10:39,193:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 22:10:39,194:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 22:10:39,199:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-02 22:10:39,199:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-02 22:10:39,200:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-02 22:10:39,205:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-02 22:10:39,205:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-02 22:10:39,208:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-02 22:10:39,680:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-02 22:10:39,681:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:10:38 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "RcnJfu-FzfU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-02 22:10:39,682:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-02 22:10:44,235:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8121_key-certbot.pem 2024-07-02 22:10:48,661:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8119_csr-certbot.pem 2024-07-02 22:10:48,661:DEBUG:acme.client:Requesting fresh nonce 2024-07-02 22:10:48,662:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-02 22:10:48,818:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-02 22:10:48,818:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:10:47 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0mZ-QkuoGvIlrLSklrsUQPlTOWXaOkpNF_6TKW5TCwOE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-02 22:10:48,819:DEBUG:acme.client:Storing nonce: jqVAJFJ0mZ-QkuoGvIlrLSklrsUQPlTOWXaOkpNF_6TKW5TCwOE 2024-07-02 22:10:48,819:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-07-02 22:10:48,825:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBtWi1Ra3VvR3ZJbHJMU2tscnNVUVBsVE9XWGFPa3BORl82VEtXNVRDd09FIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "gcUXwk3aiZL-7ENzhnSECT_5GzsJ9gQ6dv3BemVKjq3lBTiWQbRwsJs1BPWI_xXIg77u3YFow7Pv0Gnw1XDp0ASIzsEMztB55iNblKrKjkHAmIA5hJIpEuZzKE5sZ7jM-__UdapiolFbZBaKFFvSqNL1xSOIevHr7NlOgQGKaJfv852yquYZwJCXfvsLGIz7QJ7xoHr9dW9pqypJWwRbfE72uDsN0C5fN8UBegavJJDEUriqX9G27S2_PhNXmJxiE1ffKqxhy_NCsFVCTrfQIpUyyXL2xXcM2xx4FIvK7z6t3RFuVVd7unqU5vbXc_PtStIITzy9dGS-_nQTozMIZA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-02 22:10:48,999:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-07-02 22:10:49,000:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 02 Jul 2024 20:10:47 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824261497 Replay-Nonce: qqMiT6CkRhnNoWuQB2fXX-m8IaolIXRPlf2l62CWsQV3tae7ufs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:21Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985640857" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824261497" } 2024-07-02 22:10:49,000:DEBUG:acme.client:Storing nonce: qqMiT6CkRhnNoWuQB2fXX-m8IaolIXRPlf2l62CWsQV3tae7ufs 2024-07-02 22:10:49,001:DEBUG:acme.client:JWS payload: b'' 2024-07-02 22:10:49,007:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985640857: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tSaG5Ob1d1UUIyZlhYLW04SWFvbElYUlBsZjJsNjJDV3NRVjN0YWU3dWZzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU2NDA4NTcifQ", "signature": "bop1oGcg8T-lPhyLvc3LBw15jUgqUAM9EBDRARhMQrb2I9cklSBHtpf2zc1qLQ_Jq0iirDhKFoBAce_W6aiZBEhO3ztm0Cv1UXIQWhMDJlChNznxETC6smWR8OxLjeOZnTdaL0nTXbToLh5eVnKwyPBmJwn6ok-3GWWlG7yn7ldiO-FRpQP4Z3QOQiy-ON6_W9MIvsmXLtJVoeJT20OnHutN41k1H5yc0AMyZ8EvEE4fHZfhtOrwL3p5IsTHZospy35DkTdwWNr-nJR4xn10L66-yXnrgPs0cOIrl6Xul5_97Uiv-MlEk-o_PDrrj9kOckd6mWxaQ9w9Qp0akmf1zA", "payload": "" } 2024-07-02 22:10:49,169:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985640857 HTTP/1.1" 200 801 2024-07-02 22:10:49,170:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:10:47 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0C0W-RsLbiQCr3QuA_R5qtz7mrF-a46bsRHW0yZOGoUY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:21Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/_W_uNw", "status": "pending", "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/1XcAQA", "status": "pending", "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/a1s51Q", "status": "pending", "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs" } ] } 2024-07-02 22:10:49,170:DEBUG:acme.client:Storing nonce: jqVAJFJ0C0W-RsLbiQCr3QuA_R5qtz7mrF-a46bsRHW0yZOGoUY 2024-07-02 22:10:49,171:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-02 22:10:49,171:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-07-02 22:10:49,171:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-02 22:10:49,172:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-02 22:10:49,172:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 22:10:49,173:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-02 22:10:49,173:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-02 22:10:49,173:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-02 22:10:49,174:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 22:10:49,216:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 22:10:49,446:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 22:10:49,447:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-02 22:10:49,448:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-02 22:10:49,453:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:09 UTC. 2024-07-02 22:10:49,453:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 22:10:49,454:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 22:10:49,459:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-02 22:10:49,459:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-02 22:10:49,459:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-02 22:10:49,464:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-02 22:10:49,465:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-02 22:10:49,467:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-02 22:10:49,919:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-02 22:10:49,919:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:10:48 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "cOuhTHLaMas": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-02 22:10:49,919:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-02 22:10:54,705:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8122_key-certbot.pem 2024-07-02 22:10:58,975:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8120_csr-certbot.pem 2024-07-02 22:10:58,976:DEBUG:acme.client:Requesting fresh nonce 2024-07-02 22:10:58,976:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-02 22:10:59,127:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-02 22:10:59,127:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:10:57 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9I968qRlVYYlciQZgjribyek64XLzE2olro4torP4Umk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-02 22:10:59,128:DEBUG:acme.client:Storing nonce: eF-2qMJ9I968qRlVYYlciQZgjribyek64XLzE2olro4torP4Umk 2024-07-02 22:10:59,128:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-07-02 22:10:59,135:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlJOTY4cVJsVllZbGNpUVpnanJpYnllazY0WEx6RTJvbHJvNHRvclA0VW1rIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "vFhAtQI8eHhaMf7r3VW0DhCGy-lxqL5sCJwYTjBSTllk0lTdr8X7E1Jg4YsSarqQ_gr_Bwq_LkeaOPN5c8GsUzo0WCAq9NVvGKC7SPKxHrRl-MWY_uJXxlrVJdp1YniMKLT0KLFHThSFFj83_BgXRNbXLkSEromZ7x5bCamvGZQ4XiLZ2tFelyeEvgbxv1etFIUWYTeJJBJEjy6MTLjzY6HBdOS4S2WES2NseBNWRJ32sgoToIWAi5y28aXtQ_pdKW19uOpIj08bSdwQfbaCT7jt-thjViEJ9hZkBYbMfZMunf1oJ7qy2mG-F2PmA0EBaL06dAWj4H66Ic9V5BIVMg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-02 22:10:59,297:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-02 22:10:59,298:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 02 Jul 2024 20:10:58 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824300277 Replay-Nonce: B-hK_YLCDn_YlKhVCfymQxnVm70BAEfI_AQIhsdOh003NwEgNLc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:31Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985696127" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824300277" } 2024-07-02 22:10:59,298:DEBUG:acme.client:Storing nonce: B-hK_YLCDn_YlKhVCfymQxnVm70BAEfI_AQIhsdOh003NwEgNLc 2024-07-02 22:10:59,299:DEBUG:acme.client:JWS payload: b'' 2024-07-02 22:10:59,305:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985696127: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENEbl9ZbEtoVkNmeW1ReG5WbTcwQkFFZklfQVFJaHNkT2gwMDNOd0VnTkxjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU2OTYxMjcifQ", "signature": "HBe0qyIU8R95RUPJcZcabVCsynrrkoR43LONkdKOKzoMrUL6YZCk7VwLyqR7c-kgKSciCkfaeaP3d5_BinUTk0m0LgPzBR3qDu5MBIMH6ikCQCMzJPl6TOA-qz8kNiU_4L320PqVUH-Ha8JqXQJ6Lb_7VARzSuk_T11W982MBcqNqRpFy925Y5Bjhc8XvU73BVtuP1jDdJCR0rGh_B2BeZnJGFel6Xj7Lvm8wjvlOQ3FKu2fMumbDUwCY7p0M5Uo08WfCYjeTs_UiEMiS7hRcs2UdAaicrEzHah1kI47ls2bWh16_DAUa_d1ionMrm28gvXCXSS3q0juZrMcPkI2pQ", "payload": "" } 2024-07-02 22:10:59,464:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985696127 HTTP/1.1" 200 805 2024-07-02 22:10:59,465:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:10:58 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9iN7e_VbdnQsvegToiV21oLoxVs47K96TdbtQ55yqVS4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:31Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/p3DiTg", "status": "pending", "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/dn4kZw", "status": "pending", "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/A2Vu8Q", "status": "pending", "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU" } ] } 2024-07-02 22:10:59,466:DEBUG:acme.client:Storing nonce: eF-2qMJ9iN7e_VbdnQsvegToiV21oLoxVs47K96TdbtQ55yqVS4 2024-07-02 22:10:59,466:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-02 22:10:59,467:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-07-02 22:10:59,467:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-02 22:10:59,467:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-02 22:10:59,468:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 22:10:59,468:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-02 22:10:59,469:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-02 22:10:59,469:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-02 22:10:59,470:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 22:10:59,511:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 22:10:59,690:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 22:10:59,691:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-02 22:10:59,692:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-02 22:10:59,697:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:26 UTC. 2024-07-02 22:10:59,697:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 22:10:59,698:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 22:10:59,702:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-02 22:10:59,702:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-02 22:10:59,702:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-02 22:10:59,707:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-02 22:10:59,708:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-02 22:10:59,710:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-02 22:11:00,142:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-02 22:11:00,142:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:10:58 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "8kXFWd8FAq0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-02 22:11:00,143:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-02 22:11:04,763:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8123_key-certbot.pem 2024-07-02 22:11:09,028:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8121_csr-certbot.pem 2024-07-02 22:11:09,028:DEBUG:acme.client:Requesting fresh nonce 2024-07-02 22:11:09,028:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-02 22:11:09,176:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-02 22:11:09,178:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:11:07 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLCHRb4rfiAjS8_VPwsd0YQt3naFlQOdcE52DLpWoF9e-Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-02 22:11:09,178:DEBUG:acme.client:Storing nonce: B-hK_YLCHRb4rfiAjS8_VPwsd0YQt3naFlQOdcE52DLpWoF9e-Y 2024-07-02 22:11:09,179:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-07-02 22:11:09,191:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENIUmI0cmZpQWpTOF9WUHdzZDBZUXQzbmFGbFFPZGNFNTJETHBXb0Y5ZS1ZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "fxNiJSYPSw_geAH4lzoClvHWx-rct9eGPSl2YZAxKmunzX2Eh7TxbZ8GERaqWgH5CZCvQirDh2Qy84Ejgnj-WTJM3Jq875zS3_N_l8xv7feFOg-hB6W0bAzoNRtRvJ2IoTKylgrT5a-6Swwzrl3fd4276JwDzGxkMDa06UQwMAL48lNTmvvF7_EG4ar8DjX7Rp2xVHflaqeaMKltysmNBSzwFqfHcQUjf8MGnjFp0pi64I0ij8mJaWF3T-zp7qEG3GxyP0ERDguLrpTZPwKBIHb-ucRniDC0gp9MltE8TLXhRAW3N4AJZVDhTBtc5GxCLZEELprSuMbgEL9w81O9Wg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-02 22:11:09,351:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-07-02 22:11:09,351:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 02 Jul 2024 20:11:08 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824334367 Replay-Nonce: eF-2qMJ97dEbUspJ-GQkuPey0STY_gCt5D3haIAHjLtcNt9fdq0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:41Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985747117" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824334367" } 2024-07-02 22:11:09,352:DEBUG:acme.client:Storing nonce: eF-2qMJ97dEbUspJ-GQkuPey0STY_gCt5D3haIAHjLtcNt9fdq0 2024-07-02 22:11:09,352:DEBUG:acme.client:JWS payload: b'' 2024-07-02 22:11:09,358:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985747117: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjk3ZEViVXNwSi1HUWt1UGV5MFNUWV9nQ3Q1RDNoYUlBSGpMdGNOdDlmZHEwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU3NDcxMTcifQ", "signature": "GclQQkK7qRERbl-Z86O9AwdeJsl5FzFyp2s9pzryWw4qQKFPrdU_7g2sSpBIckMCUTK0A3OrG5BUY9G4UmsYEHJmgbpskHz-gqgzDyp5uIf_MDv2yDbU3yUHXssVzzlaUmWHDhdl9aiuR-2i033R-rJeRGt2y_mJReo9j8hbu0VDwhzLOOaWBO2pkAIvdujFkLaO6x2CIE_CfOSDhE77Mcj8egoFD3cuzCM5UkON64UuhuzFnQuGLketuP8daydwOEesGKEvqQlvqyyR8qzZyxVyj7C69-lJtvfy6kTCfgZ92hkwgvltYa_BfV_W5cEHX4BxYqH_Pz476CytA0TUyA", "payload": "" } 2024-07-02 22:11:09,512:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985747117 HTTP/1.1" 200 809 2024-07-02 22:11:09,514:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:11:08 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLCLyt5NcHyCjOIxunzJ7fqC4rV7KIhDm9S7bEJ2On-CNU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:41Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/NIFDhg", "status": "pending", "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/1iYgbg", "status": "pending", "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/elhV3g", "status": "pending", "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY" } ] } 2024-07-02 22:11:09,514:DEBUG:acme.client:Storing nonce: B-hK_YLCLyt5NcHyCjOIxunzJ7fqC4rV7KIhDm9S7bEJ2On-CNU 2024-07-02 22:11:09,515:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-02 22:11:09,516:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-07-02 22:11:09,517:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-02 22:11:09,517:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-02 22:11:09,519:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 22:11:09,519:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-02 22:11:09,520:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-02 22:11:09,521:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-02 22:11:09,522:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 22:11:09,563:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 22:11:09,743:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 22:11:09,744:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is signed by the certificate's issuer. 2024-07-02 22:11:09,745:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD 2024-07-02 22:11:09,748:INFO:certbot._internal.renewal:Cert not yet due for renewal 2024-07-02 22:11:09,752:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 22:11:09,792:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 22:11:09,960:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 22:11:09,961:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-02 22:11:09,961:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-02 22:11:09,966:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:40 UTC. 2024-07-02 22:11:09,967:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 22:11:09,967:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 22:11:09,972:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-02 22:11:09,973:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-02 22:11:09,973:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-02 22:11:09,977:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-02 22:11:09,978:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-02 22:11:09,981:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-02 22:11:10,432:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-02 22:11:10,433:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:11:09 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "L22MOdSS1b8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-02 22:11:10,434:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-02 22:11:14,979:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8124_key-certbot.pem 2024-07-02 22:11:19,424:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8122_csr-certbot.pem 2024-07-02 22:11:19,425:DEBUG:acme.client:Requesting fresh nonce 2024-07-02 22:11:19,425:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-02 22:11:19,577:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-02 22:11:19,579:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:11:18 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLCuot3kN9doRfp3741S1h0CHS-Hurb2SPAA5RHbWdDeoo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-02 22:11:19,579:DEBUG:acme.client:Storing nonce: B-hK_YLCuot3kN9doRfp3741S1h0CHS-Hurb2SPAA5RHbWdDeoo 2024-07-02 22:11:19,580:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-07-02 22:11:19,588:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTEN1b3Qza045ZG9SZnAzNzQxUzFoMENIUy1IdXJiMlNQQUE1UkhiV2REZW9vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "DnXeeSB6tcf6-WHSJqUoMW3ajbEHcnjwsxhIpWu3yrEV10ZpPEZ_5lS0foA8jUCiGT_ZsxlZguPxIwaufXbVtMbwY988q743gJHG0XVAjJS7AjPSYnWLYbfmA6Kt-rWak6KzHqcG_xbIC6lmV1Jg1NKAZ73C-zbKBEyHYDJaxJjtNLnAAiXvEAgpGr7E7XsUAUfGO7-6zZBr1TBBMsPVhdaTebKKvymAc4dwM5_WbgI7qw3Lir5xksm1RxQDdCCq9intysBp70TGXLGFMPVLYCm1NT1el7dYg2-RCOuC5kMWKXU9nT3glk4jNTIbkEneyJmzhlJOoc_1W_cP-fYq2A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-02 22:11:19,763:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-07-02 22:11:19,764:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 02 Jul 2024 20:11:18 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824371297 Replay-Nonce: B-hK_YLC-VvP6v82gY7ZvGjkcIwX-fa6lqxs1aehZakmcRNY5xs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:52Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985803767" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824371297" } 2024-07-02 22:11:19,764:DEBUG:acme.client:Storing nonce: B-hK_YLC-VvP6v82gY7ZvGjkcIwX-fa6lqxs1aehZakmcRNY5xs 2024-07-02 22:11:19,764:DEBUG:acme.client:JWS payload: b'' 2024-07-02 22:11:19,770:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985803767: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTEMtVnZQNnY4MmdZN1p2R2prY0l3WC1mYTZscXhzMWFlaFpha21jUk5ZNXhzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU4MDM3NjcifQ", "signature": "t6Q333h4YcBK-BVFmviYnnqjrZrBmxe14968KngAPKNX1pF5u7Y1vVYelYL4w5ieaAUwcGbQhZ4v2uPC5LNHHjYHb2Pzjm23phqHpTdg3bnodRI19QUqZ0FO0czOXsEsyfZyjr_J5Yn9pkQRIO10YOv632jFFTpMjx-mIPWCduV-W1d3zzSueXjGuKYlxk7jampB76Aq1neesM8WbXx87lbQa4HpFR4c2_vAXmuHARUTlwSrIF2bvFY8MZPoRFA3Sb7jLRRCN2Her8oTlx0qZwU74-PDAuMoEQBKN0MLKcukCov47WTlNj3HzS1DNHMJpjjbLhAqfBUasn0LRw9IDQ", "payload": "" } 2024-07-02 22:11:19,926:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985803767 HTTP/1.1" 200 806 2024-07-02 22:11:19,926:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:11:18 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9LQ4CUnoLq0zyNdgQUuoAvvPkcXRQHcUXIBcklxchgvU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:52Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/DP175w", "status": "pending", "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/kAzjPg", "status": "pending", "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/-Uec4A", "status": "pending", "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0" } ] } 2024-07-02 22:11:19,926:DEBUG:acme.client:Storing nonce: eF-2qMJ9LQ4CUnoLq0zyNdgQUuoAvvPkcXRQHcUXIBcklxchgvU 2024-07-02 22:11:19,927:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-02 22:11:19,927:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-07-02 22:11:19,927:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-02 22:11:19,927:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-02 22:11:19,928:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 22:11:19,928:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-02 22:11:19,928:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-02 22:11:19,929:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-02 22:11:19,930:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 22:11:19,980:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-07-02 22:11:19,980:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 22:11:19,981:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-07-02 22:11:19,987:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-07-02 22:11:19,989:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-07-02 22:11:19,989:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-07-02 22:11:19,989:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-07-02 22:11:19,990:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-07-02 22:11:19,991:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-07-02 22:11:20,031:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 22:11:20,235:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 22:11:20,236:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-02 22:11:20,237:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-02 22:11:20,242:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:58 UTC. 2024-07-02 22:11:20,242:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 22:11:20,242:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 22:11:20,248:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-02 22:11:20,248:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-02 22:11:20,248:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-02 22:11:20,253:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-02 22:11:20,254:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-02 22:11:20,256:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-02 22:11:20,734:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-02 22:11:20,735:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:11:19 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "IgmPznmm3LQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-02 22:11:20,736:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-02 22:11:25,492:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8125_key-certbot.pem 2024-07-02 22:11:29,919:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8123_csr-certbot.pem 2024-07-02 22:11:29,919:DEBUG:acme.client:Requesting fresh nonce 2024-07-02 22:11:29,919:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-02 22:11:30,080:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-02 22:11:30,081:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:11:28 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6Ck6vJio1GlAUk7LNinGPvwIddimxbgErSqKxoOdCTxaf8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-02 22:11:30,081:DEBUG:acme.client:Storing nonce: qqMiT6Ck6vJio1GlAUk7LNinGPvwIddimxbgErSqKxoOdCTxaf8 2024-07-02 22:11:30,081:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-07-02 22:11:30,087:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2s2dkppbzFHbEFVazdMTmluR1B2d0lkZGlteGJnRXJTcUt4b09kQ1R4YWY4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "pyJkv0rxNj0jcaf_AaKK8wZfuBPQ6M2my2n7ucSwrqJPVSyHAw0vsHdjiClHk7quhvyDSoC0pWBhtU1FE3A4_JWY_9Htk5tR-k5qS6TyrhMPAI1Pm8m12GSNPX0WbaYiuzeeZCn__axnjqdyvXU0-TUSA-SU6kC0vGpXE3eUi075Bftg4Nt3MQ8YERTnAkOB7SyzvGUDnicR2B_AOJLcv2P5y8ZOWbuFj8cFiFnRe-yTgjrgz_rCruUJm5sAchqnQFuVOd4YLg2sVgoqUfWuHML_45SopzyOTmzCIS6RrdOdbkTcf9oZOCFHeuoAjI5KrBpyUpnVTTSxfvNSKpp_9Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-02 22:11:30,273:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-07-02 22:11:30,273:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 02 Jul 2024 20:11:29 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824405187 Replay-Nonce: qqMiT6CkvRlX72Xsq9rdZrquU97k_RcSh-TbalqS3lWByLEXk10 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:01Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985856047" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824405187" } 2024-07-02 22:11:30,274:DEBUG:acme.client:Storing nonce: qqMiT6CkvRlX72Xsq9rdZrquU97k_RcSh-TbalqS3lWByLEXk10 2024-07-02 22:11:30,274:DEBUG:acme.client:JWS payload: b'' 2024-07-02 22:11:30,279:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985856047: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2t2UmxYNzJYc3E5cmRacnF1VTk3a19SY1NoLVRiYWxxUzNsV0J5TEVYazEwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU4NTYwNDcifQ", "signature": "jVBHdlHtV36GmXDHhWm4Y4zPMAWJsJ8UQQvw91sXP981WPwAPvARg0djWyom944dnQFO4jVlcACSJFmQmW1T4SGKbuAWDDWJiLyZrLovB5HW74Pa-wSQq5g-8wS5P_W0_Sh-OXX4SsfgO9WUu7oguajRxHYNUZ2ax-edIB_bRV-vPheIcuODGTFhIrtTphFqecBRYhJEYYlW68RduQrZpgKaXCshGGNqMv5P-sJ2TCkRoMw4SvA6jGmjPlQwLhCr16MnMt3BwyexH2L8MpDNY8N_kv3vMBgQt5D2tyPXTzSSEDYtmvT0sY3b52vGKt6iH_RlXY9UKYwJtmn8_tgg6g", "payload": "" } 2024-07-02 22:11:30,446:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985856047 HTTP/1.1" 200 811 2024-07-02 22:11:30,446:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:11:29 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0aG2Zb3vHETacYdpQvk89i89brcVobsSe-rPdbKld3KA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:01Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/ZygfgQ", "status": "pending", "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/f5kJqg", "status": "pending", "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/OgjqNA", "status": "pending", "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s" } ] } 2024-07-02 22:11:30,446:DEBUG:acme.client:Storing nonce: jqVAJFJ0aG2Zb3vHETacYdpQvk89i89brcVobsSe-rPdbKld3KA 2024-07-02 22:11:30,447:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-02 22:11:30,447:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-07-02 22:11:30,448:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-02 22:11:30,448:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-02 22:11:30,449:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 22:11:30,449:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-02 22:11:30,449:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-02 22:11:30,450:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-02 22:11:30,450:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 22:11:30,501:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 22:11:30,717:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 22:11:30,718:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-02 22:11:30,719:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-02 22:11:30,724:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:15 UTC. 2024-07-02 22:11:30,724:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 22:11:30,724:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 22:11:30,730:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-02 22:11:30,730:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-02 22:11:30,730:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-02 22:11:30,736:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-02 22:11:30,736:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-02 22:11:30,739:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-02 22:11:31,225:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-02 22:11:31,226:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:11:29 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "8Z-s1OlcQic": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-02 22:11:31,226:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-02 22:11:36,072:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8126_key-certbot.pem 2024-07-02 22:11:40,549:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8124_csr-certbot.pem 2024-07-02 22:11:40,549:DEBUG:acme.client:Requesting fresh nonce 2024-07-02 22:11:40,549:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-02 22:11:40,718:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-02 22:11:40,718:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:11:39 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6CkVL0RdK9kFc2Lomamu6NmTA34wN3KLc1sFSrCZ6G6s9I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-02 22:11:40,718:DEBUG:acme.client:Storing nonce: qqMiT6CkVL0RdK9kFc2Lomamu6NmTA34wN3KLc1sFSrCZ6G6s9I 2024-07-02 22:11:40,719:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-07-02 22:11:40,726:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tWTDBSZEs5a0ZjMkxvbWFtdTZObVRBMzR3TjNLTGMxc0ZTckNaNkc2czlJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "cbfBCvr9GB0o5x3Rt93VIloO1GDO_tD9EOkk84UqH-skA5XlB_N8qEaFqnM7Z52_yTcUpTE9FhH2s8wYpeGuiQCYstH01RstHsVAU5mkC5R03_nxRqFKAWgzLQom7BhP46Adkk-SIuA0ak13WivTbinIGIyRk89OiesNh_MLcrGqRI9Fns5qOq9pEODPtnavVE2gh2nGrEf1SCIA56PNoGGd-fi8uQz2cYxTDTAcc-JE1quQDWzZXud83JAXyoyHsfu-G9GF1_JyblR7TM7vZHbrDYJeazUqmKjizzRxvLVkyo1261BN4xNVFjljN5s4AyOzKmEhok3CkAarxXMYWw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-02 22:11:40,896:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-07-02 22:11:40,897:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 02 Jul 2024 20:11:39 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824456717 Replay-Nonce: qqMiT6CkgneGVq75DgDZmZU2cs7Bh7yr1wUGsBecQy1OejUGgFY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:12Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985929937" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824456717" } 2024-07-02 22:11:40,897:DEBUG:acme.client:Storing nonce: qqMiT6CkgneGVq75DgDZmZU2cs7Bh7yr1wUGsBecQy1OejUGgFY 2024-07-02 22:11:40,897:DEBUG:acme.client:JWS payload: b'' 2024-07-02 22:11:40,904:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985929937: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tnbmVHVnE3NURnRFptWlUyY3M3Qmg3eXIxd1VHc0JlY1F5MU9lalVHZ0ZZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU5Mjk5MzcifQ", "signature": "jvsEJhxM-3cQXZai3DGEDpb3rZSibWXEIOiwwXnghYKuCCk0FKp9GYhHqQ3WHsmaduG0ngVf-jFRyeGJ4IPIuHfSyXgQ92O31rkXaqT3pQP-aUsG2wE-vs6_bpeFaq4T6syisebRU_KkjGYcQrJ7E5ZiKYnQ760XkbtkQwGcypmDJIH5noQ9WNGh3OSbM1QM2_2YUUR7NKPKa_zvnBdFcVbt8X2odgAZrS9hDXjrYn9GoxHMqZDGtZQlMY2BsuG6FM_LR-2_93KW2rkANhl9Re74QiS_vYpKY5E2VzQkgeoP5RFwD_Y78mCdA1qkvnBjfY0dVCn4t4dyjakpGEm-jQ", "payload": "" } 2024-07-02 22:11:41,070:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985929937 HTTP/1.1" 200 810 2024-07-02 22:11:41,071:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:11:39 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0cEuun5jN5sHllSeLBiYez4G7N-NZUQg4WaAZTBS0TdY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:12Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/gXwyeA", "status": "pending", "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/K4XtOg", "status": "pending", "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/NX0yhA", "status": "pending", "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY" } ] } 2024-07-02 22:11:41,071:DEBUG:acme.client:Storing nonce: jqVAJFJ0cEuun5jN5sHllSeLBiYez4G7N-NZUQg4WaAZTBS0TdY 2024-07-02 22:11:41,072:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-02 22:11:41,072:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-07-02 22:11:41,073:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-02 22:11:41,073:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-02 22:11:41,074:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 22:11:41,074:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-02 22:11:41,074:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-02 22:11:41,074:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-02 22:11:41,075:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 22:11:41,126:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 22:11:41,346:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 22:11:41,348:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-07-02 22:11:41,348:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-07-02 22:11:41,353:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:29 UTC. 2024-07-02 22:11:41,353:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 22:11:41,354:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 22:11:41,359:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-02 22:11:41,359:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-02 22:11:41,359:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-02 22:11:41,374:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-02 22:11:41,375:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-02 22:11:41,378:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-02 22:11:41,817:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-02 22:11:41,817:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:11:40 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "HcrumSHo4vQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-02 22:11:41,818:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-02 22:11:46,473:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8127_key-certbot.pem 2024-07-02 22:11:50,933:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8125_csr-certbot.pem 2024-07-02 22:11:50,934:DEBUG:acme.client:Requesting fresh nonce 2024-07-02 22:11:50,934:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-02 22:11:51,081:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-02 22:11:51,082:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:11:49 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9nWsyvoVnyR_Wl_RhbWcYGWMirZyTG5QQhbFpOTmnjwU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-02 22:11:51,082:DEBUG:acme.client:Storing nonce: eF-2qMJ9nWsyvoVnyR_Wl_RhbWcYGWMirZyTG5QQhbFpOTmnjwU 2024-07-02 22:11:51,082:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-07-02 22:11:51,088:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjluV3N5dm9WbnlSX1dsX1JoYldjWUdXTWlyWnlURzVRUWhiRnBPVG1uandVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "f9wAt0Jy8OgGlRUwjOHNxaTykq2xFRGw1rskB30GrQAB3W5lh23n34fY1Lap-OZLApxELSVqdt-EAvHM0g94G2GD4DvRkB2Wo8E-hJgbCTJf_va-v5w19iBjnDB-j9j2FUMZOdo2OEnIfTZeL5gzo_p3laREq4c-JaEIubDU69e0zGsOUYhEYEFlUs_66Wr557Bd7lKMeCgVCpP_Wu5Q0kdU3ZemeZ2T-_11y0Bzh1OGLTWOO-BMLnyzhj3-YGKm_aihQH5dMs80u102birqKLGAS6Iho4e2rjFuj5HkjjjZRVeJIIjLB7XqfegZRIsNWrpGurvx-gdVXhPVTefq0g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-02 22:11:51,250:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-07-02 22:11:51,251:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 02 Jul 2024 20:11:50 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824496987 Replay-Nonce: eF-2qMJ9JnmOD9koWr3bAxefPRzLePhH1WXArAYE7_ERBUIjMgw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:22Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985989517" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824496987" } 2024-07-02 22:11:51,251:DEBUG:acme.client:Storing nonce: eF-2qMJ9JnmOD9koWr3bAxefPRzLePhH1WXArAYE7_ERBUIjMgw 2024-07-02 22:11:51,251:DEBUG:acme.client:JWS payload: b'' 2024-07-02 22:11:51,257:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985989517: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlKbm1PRDlrb1dyM2JBeGVmUFJ6TGVQaEgxV1hBckFZRTdfRVJCVUlqTWd3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU5ODk1MTcifQ", "signature": "iQwZzTHmdQhHlaya2fHkUOekfXcAkKNccrUMK_FAuUmT7P438zrTCESpZQi4rRl3M_waVE580bBuRFGwQQ8dyQEGQ5qBXUl-H2F4VsBJOH_biO3ZYq-WXey7jmNv2tdz65zOSTi8m-rqytldt1_3kjIT-D7nqvrzi-R42pyuu-ACr6GQvd1OTRXqib9YTPk9eRnYVPuA-7onGm_fFxShS_874WAgB04eRqhrS17zG6YZ2Kw-WHo6zA41Bo9uHAJDWB3cSYGImXcXjeoP6XPsNOQRqbnLSf7m2Y1azqHm5oZYrtZ3WV-CJGZtg17gejAIZTKarSxEHN8RO1bovozALQ", "payload": "" } 2024-07-02 22:11:51,407:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985989517 HTTP/1.1" 200 809 2024-07-02 22:11:51,408:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:11:50 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLCYnSMYvc2S0cRhZupV_R9OejI5oMUW06yzCPyIhQjzig X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:22Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/ebl14A", "status": "pending", "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/-PFYBw", "status": "pending", "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/LKEO7w", "status": "pending", "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0" } ] } 2024-07-02 22:11:51,408:DEBUG:acme.client:Storing nonce: B-hK_YLCYnSMYvc2S0cRhZupV_R9OejI5oMUW06yzCPyIhQjzig 2024-07-02 22:11:51,409:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-02 22:11:51,409:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-07-02 22:11:51,410:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-02 22:11:51,410:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-02 22:11:51,411:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 22:11:51,411:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-02 22:11:51,411:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-02 22:11:51,412:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-02 22:11:51,413:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 22:11:51,466:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 22:11:51,688:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 22:11:51,690:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-07-02 22:11:51,690:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-07-02 22:11:51,695:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:53 UTC. 2024-07-02 22:11:51,696:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 22:11:51,696:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 22:11:51,700:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-02 22:11:51,700:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-02 22:11:51,700:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-02 22:11:51,723:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-02 22:11:51,724:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-02 22:11:51,726:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-02 22:11:52,160:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-02 22:11:52,161:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:11:50 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "ubPuaHZoby4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-02 22:11:52,161:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-02 22:11:56,849:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8128_key-certbot.pem 2024-07-02 22:12:01,414:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8126_csr-certbot.pem 2024-07-02 22:12:01,415:DEBUG:acme.client:Requesting fresh nonce 2024-07-02 22:12:01,415:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-02 22:12:01,559:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-02 22:12:01,560:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:12:00 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9kGwIVwu7Y_NS_W975DQ5pf5FT8-uxItyB-j7pAbsEOY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-02 22:12:01,560:DEBUG:acme.client:Storing nonce: eF-2qMJ9kGwIVwu7Y_NS_W975DQ5pf5FT8-uxItyB-j7pAbsEOY 2024-07-02 22:12:01,560:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-07-02 22:12:01,567:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlrR3dJVnd1N1lfTlNfVzk3NURRNXBmNUZUOC11eEl0eUItajdwQWJzRU9ZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "mIHjd7GP5StWvygn1vfWsmLelAIQoApSEFM3MRUrbW72f7hszLyyzUX7yXP1MFU3vfKigeR7tdInJcicFhAg5qEOcL_3kU9ihEhFHPMEpof2db5MKFntz789sWgLmqjkfWWSkPCXPE0h-kntY2jRQCKLSk-Rfs-qiDdXz1uMtcf8W5eIpL4s69f_RrivGKuTu7OPpNfM1S9-pF_n6NIyrDeu6cR29OH6yaZRqvsY-9vniFMsWFdqdADkR0FUJy44EvST8xCTiInVDGhuMdX-W71HZ9raiV9lvT041f3UNGp-4lIA36YVeuszcZq6NSiDQIw1MDnhlbAW1UR52ssyVA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-02 22:12:01,727:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-02 22:12:01,728:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 02 Jul 2024 20:12:00 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824533727 Replay-Nonce: eF-2qMJ9a4gnpOgDhOoYK0HZJDvk9ZSQ4hCr8cDZlCu_X-ryYRU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:32Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986047927" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824533727" } 2024-07-02 22:12:01,728:DEBUG:acme.client:Storing nonce: eF-2qMJ9a4gnpOgDhOoYK0HZJDvk9ZSQ4hCr8cDZlCu_X-ryYRU 2024-07-02 22:12:01,729:DEBUG:acme.client:JWS payload: b'' 2024-07-02 22:12:01,735:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986047927: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlhNGducE9nRGhPb1lLMEhaSkR2azlaU1E0aENyOGNEWmxDdV9YLXJ5WVJVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYwNDc5MjcifQ", "signature": "Uz0JyjpPZ7TOZijPQc2gea16EHWYLUFVlQG3Mk08y3ngk8psraPPhXstIx9WHh4emIy3pfQ67DY3UD5WLv7rB-rAudp1b359rE-juK9UjGpK36P3pgQQtnufFb8LKl5RNxGS96yO6XP9lhM7H2UYQDSUzyr8acX0wLAuTYGnPEjKsx0V4fXWVB5hePQRjycfHxso6bsuaiwwM1BU0jWC2FT2xM7Pz4MsyTI-6sQwrID5XLpB2qnInPE3ndWiITWejlUI9daQdY9XwQs0fw4ehMCXqgu8UTH2MnD3TEbe2WyjH8Q3dYq15RBOmgVqX-KfDyQ1AC0XnAtgOPVLEBSvEA", "payload": "" } 2024-07-02 22:12:01,892:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986047927 HTTP/1.1" 200 805 2024-07-02 22:12:01,892:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:12:00 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLCir8rbghnF5KjryxyUan9CIW1246L_hHRngFNDdJisH4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:32Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/a7aI1Q", "status": "pending", "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/Rqj-2Q", "status": "pending", "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/4mVq6w", "status": "pending", "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0" } ] } 2024-07-02 22:12:01,893:DEBUG:acme.client:Storing nonce: B-hK_YLCir8rbghnF5KjryxyUan9CIW1246L_hHRngFNDdJisH4 2024-07-02 22:12:01,893:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-02 22:12:01,894:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-07-02 22:12:01,894:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-02 22:12:01,894:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-02 22:12:01,895:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 22:12:01,896:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-02 22:12:01,896:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-02 22:12:01,896:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-02 22:12:01,897:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 22:12:01,949:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 22:12:02,168:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 22:12:02,169:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-02 22:12:02,170:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-02 22:12:02,174:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:19 UTC. 2024-07-02 22:12:02,174:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 22:12:02,175:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 22:12:02,181:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-02 22:12:02,181:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-02 22:12:02,181:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-02 22:12:02,187:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-02 22:12:02,188:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-02 22:12:02,190:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-02 22:12:02,635:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-02 22:12:02,636:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:12:01 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Aw21JouuQW4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-02 22:12:02,636:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-02 22:12:06,969:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8129_key-certbot.pem 2024-07-02 22:12:11,291:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8127_csr-certbot.pem 2024-07-02 22:12:11,292:DEBUG:acme.client:Requesting fresh nonce 2024-07-02 22:12:11,292:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-02 22:12:11,441:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-02 22:12:11,442:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:12:10 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9jG3QxkVnhXfh0hmECcTvukVPK-SyeB4dNKr7fZoYyBs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-02 22:12:11,442:DEBUG:acme.client:Storing nonce: eF-2qMJ9jG3QxkVnhXfh0hmECcTvukVPK-SyeB4dNKr7fZoYyBs 2024-07-02 22:12:11,442:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-07-02 22:12:11,450:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlqRzNReGtWbmhYZmgwaG1FQ2NUdnVrVlBLLVN5ZUI0ZE5LcjdmWm9ZeUJzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "heEFmC5G_DGFFaw10ckb6NRIHtBm-4vfXkg_KoJk_2CgP7oD87rr_793N6O-F4HbB0mVT6eqPAkGjN9oveQYV2Q2pbrULhRjVJg56Rtqh8BqVzCbxVIRIKRjmTWiiP56nvXNhXQXUkKQsuSJdoowhbsI5PLtEfF1cERs7aFo2mfy49Q6I0-7L-PKzB0DUig2wLFcEQprxzuOWwUPgnB8_CV4VOVSQJzcs8KqlCLubk8Rbz0n4caowhpAwUiSRh328uX3W9fpdbr9HFiMRsAnzr0xfjSzjQgmChHwtyYYfN5SxICzHdHDJFCZFuQWOf-dHeBBOCiM0bPiaPUyypDZhg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-02 22:12:11,614:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-02 22:12:11,615:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 02 Jul 2024 20:12:10 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824568847 Replay-Nonce: eF-2qMJ9OVqVLovSUvC6YgOZ-zr3iNnBuzCrM0ywB8LnnVxLO0E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:42Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986101167" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824568847" } 2024-07-02 22:12:11,615:DEBUG:acme.client:Storing nonce: eF-2qMJ9OVqVLovSUvC6YgOZ-zr3iNnBuzCrM0ywB8LnnVxLO0E 2024-07-02 22:12:11,615:DEBUG:acme.client:JWS payload: b'' 2024-07-02 22:12:11,621:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986101167: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlPVnFWTG92U1V2QzZZZ09aLXpyM2lObkJ1ekNyTTB5d0I4TG5uVnhMTzBFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYxMDExNjcifQ", "signature": "uLjcihjKW6Ei35VlX3yRp-itmyqfJrQf3hCIvM3kcqpG1eghvEurS12t3qco80v6MrA9BtF0bqZW-D6oA6Cy-gZ1n21gFBaeLgM9qL0BryFsjXui8yguL2CajXd88zjNt8J9fkZQX4c0Cq9BoQmS1LYCquq0FmJwCx07F4igX6GkLaZ3bxH9-bDNEYaASsAJwZ2ACO4XlGh9dt81MM6wVqNMOdf7EsY5FU10bvo-tyPnRNltcNQcBXXeiCAfsmcrPGVbh9o82FaTq6mc8NW1gspX8m515Q8zl8eYQiWT-Cou3S6oMRPRAJcYjKhvZPq4eInJ4UaxcGD2jYyPDbuEoQ", "payload": "" } 2024-07-02 22:12:11,775:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986101167 HTTP/1.1" 200 805 2024-07-02 22:12:11,776:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:12:10 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLCcXfbNvJJdusJdoG0yiTcFQM8O9E7NUTQ8WZmxwzL8hI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:42Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/nlLFxg", "status": "pending", "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/mOuqMg", "status": "pending", "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/b0ZrJg", "status": "pending", "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q" } ] } 2024-07-02 22:12:11,776:DEBUG:acme.client:Storing nonce: B-hK_YLCcXfbNvJJdusJdoG0yiTcFQM8O9E7NUTQ8WZmxwzL8hI 2024-07-02 22:12:11,777:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-02 22:12:11,777:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-07-02 22:12:11,777:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-02 22:12:11,778:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-02 22:12:11,779:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 22:12:11,779:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-02 22:12:11,779:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-02 22:12:11,779:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-02 22:12:11,781:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 22:12:11,834:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 22:12:12,050:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 22:12:12,051:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-02 22:12:12,052:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-02 22:12:12,057:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:37 UTC. 2024-07-02 22:12:12,057:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 22:12:12,057:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 22:12:12,062:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-02 22:12:12,062:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-02 22:12:12,063:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-02 22:12:12,067:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-02 22:12:12,068:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-02 22:12:12,070:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-02 22:12:12,509:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-02 22:12:12,510:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:12:11 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "9r-un4xcQN8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-02 22:12:12,510:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-02 22:12:16,854:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8130_key-certbot.pem 2024-07-02 22:12:21,168:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8128_csr-certbot.pem 2024-07-02 22:12:21,169:DEBUG:acme.client:Requesting fresh nonce 2024-07-02 22:12:21,169:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-02 22:12:21,313:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-02 22:12:21,314:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:12:20 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLC1lXTQs8g3K3JD4mKfa297c2tcX38GN9xC2yFuVUmHVI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-02 22:12:21,314:DEBUG:acme.client:Storing nonce: B-hK_YLC1lXTQs8g3K3JD4mKfa297c2tcX38GN9xC2yFuVUmHVI 2024-07-02 22:12:21,314:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-07-02 22:12:21,320:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTEMxbFhUUXM4ZzNLM0pENG1LZmEyOTdjMnRjWDM4R045eEMyeUZ1VlVtSFZJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "pppj-GWE1Vy1pVM6omHWJMgMi-folGkw5fx4HcXTATK4jq5DFqm9vHKwZ3iBmefPZwYEefDIlGUCV8OHDI7KFaH_gr138aYEhKO3dR_IOcX4AcMk5SKtwXrhdXV2jn8hLWoZFYWxIMg6V9sj_ZI9jLg0znsBsnn0w5m_y3YSZ7l06Z05dN0xWrAggZmKR2wOU1wJ2iFm4ESvWFwt1x-ODRFcDnjbveCIbYm4qkr4hZ2MZ4-FxQ8tFHMLv2FAcV4xTMkbbUVqlMhuEO8plihgoAQW6LtjqD0YpJRvToRl0sMzunFBmlDwBffD2K0P6KEzaWHJaCskSA-qkGWzyOoMMA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-02 22:12:21,481:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-02 22:12:21,481:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 02 Jul 2024 20:12:20 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824603047 Replay-Nonce: eF-2qMJ97PxaiGsVkymLx4KG1xTLhHxci_euaXnycZ1Y5wMW0Y4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:53Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986156647" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824603047" } 2024-07-02 22:12:21,481:DEBUG:acme.client:Storing nonce: eF-2qMJ97PxaiGsVkymLx4KG1xTLhHxci_euaXnycZ1Y5wMW0Y4 2024-07-02 22:12:21,482:DEBUG:acme.client:JWS payload: b'' 2024-07-02 22:12:21,488:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986156647: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjk3UHhhaUdzVmt5bUx4NEtHMXhUTGhIeGNpX2V1YVhueWNaMVk1d01XMFk0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYxNTY2NDcifQ", "signature": "DrdLxYP988I1JvoniFn3RuZ7WnFqeh8Df5n7_k-QilJZLOgIClEb_zGwqq9EdNnntWF01C0qC8Ccq-hd_U054KVx2wg0yyKkzwouTHRCHxkRuK_wMMVvQhDAejZl5QGtHnVOrAx1W3tmyTtOGJjk0pPWbo2Fvz8SQ_SNhKt6_ukA_3yzqYN9VQijzvDkCUISQgYeeC404Jd8kON0Yz0O-ZYZfp15nKVyXjjOLdE0ATbganM5XaMyeBnoOhd-m7ssx2cHJVnjYU59gFv8TVHGiLAoSvxtZWXODtBHig3quswZO9zSXf_5_FWzJZKXjQSSR3wnNy_ZxwHrqBcc4rPyog", "payload": "" } 2024-07-02 22:12:21,644:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986156647 HTTP/1.1" 200 805 2024-07-02 22:12:21,644:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 02 Jul 2024 20:12:20 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLCXgRGpUr2SdtAto_hHztZALrHHZ9SApapor9ZMhVPzKg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:53Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/B3rfNg", "status": "pending", "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/ZEHm3Q", "status": "pending", "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/xivawQ", "status": "pending", "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk" } ] } 2024-07-02 22:12:21,645:DEBUG:acme.client:Storing nonce: B-hK_YLCXgRGpUr2SdtAto_hHztZALrHHZ9SApapor9ZMhVPzKg 2024-07-02 22:12:21,645:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-02 22:12:21,645:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-07-02 22:12:21,645:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-02 22:12:21,645:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-02 22:12:21,646:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 22:12:21,646:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-02 22:12:21,646:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-02 22:12:21,647:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-02 22:12:21,648:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 22:12:21,648:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-07-02 22:12:21,648:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-07-02 22:12:21,649:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-07-02 22:12:21,651:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)