2024-07-02 01:44:16,826:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-07-02 01:44:16,826:DEBUG:certbot._internal.main:Arguments: [] 2024-07-02 01:44:16,827:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-07-02 01:44:17,786:DEBUG:certbot._internal.log:Root logging level set at 20 2024-07-02 01:44:17,786:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-07-02 01:44:17,828:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-07-02 01:44:17,873:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 01:44:18,057:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 01:44:18,059:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2024-07-02 01:44:18,063:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2024-07-02 01:44:18,074:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:12 UTC. 2024-07-02 01:44:18,074:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 01:44:18,074:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 01:44:18,081:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-02 01:44:18,081:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-02 01:44:18,081:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-02 01:44:18,089:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-02 01:44:18,090:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-02 01:44:18,093:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-02 01:44:18,577:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-02 01:44:18,578:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:44:17 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "9TOVmzM9b5Q": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-02 01:44:18,579:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-02 01:44:24,599:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8105_key-certbot.pem 2024-07-02 01:44:30,536:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8103_csr-certbot.pem 2024-07-02 01:44:30,537:DEBUG:acme.client:Requesting fresh nonce 2024-07-02 01:44:30,537:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-02 01:44:30,699:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-02 01:44:30,699:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:44:30 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6Ck4LdW_vNw9AiIh7z2yBY8U6X9AdezC6iHy2VYJTcJbUU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-02 01:44:30,699:DEBUG:acme.client:Storing nonce: qqMiT6Ck4LdW_vNw9AiIh7z2yBY8U6X9AdezC6iHy2VYJTcJbUU 2024-07-02 01:44:30,699:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-07-02 01:44:30,706:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2s0TGRXX3ZOdzlBaUloN3oyeUJZOFU2WDlBZGV6QzZpSHkyVllKVGNKYlVVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "W7K0E2ilF_EVlS2UKY0IhYYIqGfVhbwXiO0U1uFrLc8T3AG-7IchBvapoxkOM44Vds0bucyH1pTApu3QEOD7qxHEc8Q1U29yOxyams_ns-Q_B-AcnRbJTyUlrPTnqrJEOQAoUwf_BnJmycRVOCgnmRWeeEXbZhmirh44xybTZsOFZd0KVyxYF6URhwR-Pn_JFooQo2UOQmeaKHLUu5vyxfGbystCQmy5E1CkBwZGtnyHocST88i6oX5-DWsgQVG0pqnFWeq-FCBfHFNF8a1td4UF0m6u3p5M6gGZlD2RetHvf5qM4rbKb-pxibHU6GP8affRb3nH418vZakB7l2S2Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-02 01:44:30,882:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-07-02 01:44:30,883:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 01 Jul 2024 23:44:30 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824128037 Replay-Nonce: jqVAJFJ0ucU7QEcAGKoGnmgUo0Bv5Dc6ioPsRnK0KgYtqgHP5dM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:00:50Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985446737" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824128037" } 2024-07-02 01:44:30,883:DEBUG:acme.client:Storing nonce: jqVAJFJ0ucU7QEcAGKoGnmgUo0Bv5Dc6ioPsRnK0KgYtqgHP5dM 2024-07-02 01:44:30,883:DEBUG:acme.client:JWS payload: b'' 2024-07-02 01:44:30,890:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985446737: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjB1Y1U3UUVjQUdLb0dubWdVbzBCdjVEYzZpb1BzUm5LMEtnWXRxZ0hQNWRNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU0NDY3MzcifQ", "signature": "A_Geup4TCK00Wggn0hQb3zOqMN9sLn8uU7kB_5jTwOS5ygZ3K2PgRR-ZhsOFR3V0pBh0Z0obEga_ZoWw9WZjB02luWMIzPrK_W9YXUY1-mQxfj69YM54WRKCRI5whdUMnPww0DHjkGBCOf73pqNcmAKoCdIUGSKTJgTxLruTQMeJI7Yq-EEML4d8eyLrY-LE3Q-RPr3lbebhH7ftfyNlkP9VpPjbsUlcm1Gp7g4Nvi_TlyF-fYwRFthUrvzXgf-aqmYTZAAm04DBJjOqIO7_coKhGQ_tQfcLk4XkLA-k7BYBDZfAr44nKnHPdUXe9w4Z7wxsLArW2hn36ByfWXrd3g", "payload": "" } 2024-07-02 01:44:31,055:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985446737 HTTP/1.1" 200 810 2024-07-02 01:44:31,056:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:44:30 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6Ckd1va205JIH-9pf5jwKL5uV8N96Eq0qUOqY795fcg5Qg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:00:50Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/KAQe7Q", "status": "pending", "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/Sd6_7w", "status": "pending", "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/Ra3-nA", "status": "pending", "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ" } ] } 2024-07-02 01:44:31,056:DEBUG:acme.client:Storing nonce: qqMiT6Ckd1va205JIH-9pf5jwKL5uV8N96Eq0qUOqY795fcg5Qg 2024-07-02 01:44:31,057:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-02 01:44:31,057:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-07-02 01:44:31,057:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-02 01:44:31,058:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-02 01:44:31,061:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 01:44:31,061:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-02 01:44:31,061:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-02 01:44:31,062:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-02 01:44:31,068:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 01:44:31,108:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 01:44:31,310:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 01:44:31,311:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-02 01:44:31,312:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-02 01:44:31,317:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:26 UTC. 2024-07-02 01:44:31,317:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 01:44:31,317:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 01:44:31,325:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-02 01:44:31,325:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-02 01:44:31,326:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-02 01:44:31,341:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-02 01:44:31,342:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-02 01:44:31,344:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-02 01:44:31,793:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-02 01:44:31,793:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:44:31 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "qfoSdBewlkk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-02 01:44:31,794:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-02 01:44:37,247:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8106_key-certbot.pem 2024-07-02 01:44:42,153:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8104_csr-certbot.pem 2024-07-02 01:44:42,154:DEBUG:acme.client:Requesting fresh nonce 2024-07-02 01:44:42,154:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-02 01:44:42,303:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-02 01:44:42,304:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:44:41 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLClpQYwWpw4Ma-aZv1nBHaEDej9stH3FIkHQh8QJJX7Ig X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-02 01:44:42,304:DEBUG:acme.client:Storing nonce: B-hK_YLClpQYwWpw4Ma-aZv1nBHaEDej9stH3FIkHQh8QJJX7Ig 2024-07-02 01:44:42,305:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-07-02 01:44:42,311:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENscFFZd1dwdzRNYS1hWnYxbkJIYUVEZWo5c3RIM0ZJa0hRaDhRSkpYN0lnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "dCQOPoIsmHhHgaA5frFnAh5F1jfwF5qqp3NzLznG3QRTdCU3IC4F4v2FahuRc6SgurPJysB-I_6X2NVhLtApoh6QwubWrtd9phokoWFU3RJpNA2tBukW2z-O5Ww7L5-V_OPgITbHX-LYpEhD3miQwOk8liDC234PTVvRjbajZnaR0b_Oygnh3xCxo1uomnKI8TLCQ3LR72qZbO95IleWu1MipXrsjhtitwG-qcc_62u_nKePNDARmRdve982szd02hyXJpRc5nsNo6uXUIvZtTOvSYj0KZEYKneasI5vZ39BSgmLLGu237qOSYS8Xg0w3vCJQ1rbMyIg-DCHXbNRMw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-02 01:44:42,475:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-07-02 01:44:42,476:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 01 Jul 2024 23:44:41 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824165847 Replay-Nonce: eF-2qMJ9BmGoEROfW8LJLLhccob2xcSgCdj9Cieo-MvH_TYO2U8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:01Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985503087" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824165847" } 2024-07-02 01:44:42,476:DEBUG:acme.client:Storing nonce: eF-2qMJ9BmGoEROfW8LJLLhccob2xcSgCdj9Cieo-MvH_TYO2U8 2024-07-02 01:44:42,476:DEBUG:acme.client:JWS payload: b'' 2024-07-02 01:44:42,481:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985503087: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlCbUdvRVJPZlc4TEpMTGhjY29iMnhjU2dDZGo5Q2llby1NdkhfVFlPMlU4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU1MDMwODcifQ", "signature": "ceFlDcAJ375B6J7862aj9XHsffcru4fiTqcjxgovAOsI9CgI76FV1PgZbzwEjB_6lXrOFDX3WUudWbmUeC_o1AlpJCBYrzm-IsS7VWYT0M-iqKPqiAS8geO0xWWFGOcmCyQj8xz17yVKMJSKi5x-Ab-2kW5xtZ-NPwAYWuIzin2BebrlRIrfZhFe9DScSNTS0-1dV1EE0LAW2qZCZfQaVC94F5FrqIyUGDQNu5vVfn_RyFQX1y2AOpV18UYm96jC4MPf3SAECQGBCHDkjo8JeyE4wB_FGP7iE4CpGgJJPh8JDVklZX40LUYG60vH1BBlrWOE9PE1GsKRaYrUeymXug", "payload": "" } 2024-07-02 01:44:42,651:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985503087 HTTP/1.1" 200 804 2024-07-02 01:44:42,651:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:44:42 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9GvIAaqYPCvpRT0hq2uP6IsNtc0cgBlsloCj1B62pGe0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:01Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/6TW65g", "status": "pending", "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/HbqBvA", "status": "pending", "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/f36r8w", "status": "pending", "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ" } ] } 2024-07-02 01:44:42,651:DEBUG:acme.client:Storing nonce: eF-2qMJ9GvIAaqYPCvpRT0hq2uP6IsNtc0cgBlsloCj1B62pGe0 2024-07-02 01:44:42,652:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-02 01:44:42,652:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-07-02 01:44:42,653:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-02 01:44:42,653:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-02 01:44:42,654:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 01:44:42,654:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-02 01:44:42,654:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-02 01:44:42,654:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-02 01:44:42,656:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 01:44:42,708:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 01:44:42,933:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 01:44:42,935:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-02 01:44:42,935:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-02 01:44:42,940:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:40 UTC. 2024-07-02 01:44:42,940:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 01:44:42,941:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 01:44:42,946:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-02 01:44:42,946:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-02 01:44:42,946:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-02 01:44:42,951:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-02 01:44:42,952:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-02 01:44:42,954:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-02 01:44:43,422:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-02 01:44:43,423:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:44:42 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Dpa0Tl4vlmA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-02 01:44:43,424:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-02 01:44:48,335:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8107_key-certbot.pem 2024-07-02 01:44:53,236:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8105_csr-certbot.pem 2024-07-02 01:44:53,237:DEBUG:acme.client:Requesting fresh nonce 2024-07-02 01:44:53,237:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-02 01:44:53,395:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-02 01:44:53,395:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:44:52 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0xOE4qII7zIiVQwT1mf2z8Bry5cmoELqJWmyKcrsZr6U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-02 01:44:53,395:DEBUG:acme.client:Storing nonce: jqVAJFJ0xOE4qII7zIiVQwT1mf2z8Bry5cmoELqJWmyKcrsZr6U 2024-07-02 01:44:53,396:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-07-02 01:44:53,402:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjB4T0U0cUlJN3pJaVZRd1QxbWYyejhCcnk1Y21vRUxxSldteUtjcnNacjZVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "WFIrN5kghurff_GMBn1YdI3GOuLSxIuM4ngyOec0dj8wl8rMf0fRZQ-d3CXCr6k33j5SK53Ug_JOjq2HUjJoJlp4cp79fq0lBqsjxj2CBUwLQiVKjtf9qEXixglYrHsb56-A7py9ft_LFxEADmwm_9wAKFsDd8PUesyNu9J4XKXxSx-kLP4t7TwLgk0myV8sOuosO8_DzIvPdcP9iLQOu_a0rjDM_gAzpsJEjApWJVN5YrnhUGlM_ENMk1jPihMD36PC34woEHioMOt9tKd_g_aWP8eO1ixV3T-xohgcqHwUeJiOjVzq8o4tDNR1rYiMWqKYPXcmyByp1SRPX122zg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-02 01:44:53,573:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-07-02 01:44:53,573:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 01 Jul 2024 23:44:52 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824216467 Replay-Nonce: jqVAJFJ0vPF_kE2-wK--MTFDyvKLwbZeFzGO4jLDAwsgcmDPjzY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:11Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985574177" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824216467" } 2024-07-02 01:44:53,573:DEBUG:acme.client:Storing nonce: jqVAJFJ0vPF_kE2-wK--MTFDyvKLwbZeFzGO4jLDAwsgcmDPjzY 2024-07-02 01:44:53,573:DEBUG:acme.client:JWS payload: b'' 2024-07-02 01:44:53,581:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985574177: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjB2UEZfa0UyLXdLLS1NVEZEeXZLTHdiWmVGekdPNGpMREF3c2djbURQanpZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU1NzQxNzcifQ", "signature": "TsB0kf8r7sPAtgIJJHpyYI9toS8TpQVRhec6eTsUp7n1ttyQR2_9UOeBlB5nI_j9XV4Z0PHoq0vZ7tvTKV_vZrDKjNvPWmP5pVyjFD7C8ip-dMPDECUeH1Jrpd7qJIG60wyZxzAsSZn9GcRis0lfY-10UR8_SmdwocpUMAb4yHFSwpgGBgp2juGIe1LQUXKBHzQyPYn_qC_GC2wlLVL5AP75wNeTvv8-GX8YOTdG6rtJqUn5NmwmKeweewl4yUPp8l9Aahpq-1dPl0JLyxh_OmA2UXjIq3Bb8lrTZgFsLW85dmkgfrB7nvXC5Lg9MAJHO-qae-9_utvX-oxLN83eQQ", "payload": "" } 2024-07-02 01:44:53,743:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985574177 HTTP/1.1" 200 807 2024-07-02 01:44:53,744:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:44:53 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0_USylR8MOyWCct0WsLVlTLQFWTOLdt_FOoTX-CUMOgU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:11Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/RO51fg", "status": "pending", "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/APGIHQ", "status": "pending", "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/4l4xCQ", "status": "pending", "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs" } ] } 2024-07-02 01:44:53,744:DEBUG:acme.client:Storing nonce: jqVAJFJ0_USylR8MOyWCct0WsLVlTLQFWTOLdt_FOoTX-CUMOgU 2024-07-02 01:44:53,745:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-02 01:44:53,745:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-07-02 01:44:53,746:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-02 01:44:53,746:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-02 01:44:53,747:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 01:44:53,747:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-02 01:44:53,747:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-02 01:44:53,748:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-02 01:44:53,749:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 01:44:53,797:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 01:44:54,018:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 01:44:54,019:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-02 01:44:54,020:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-02 01:44:54,025:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:54 UTC. 2024-07-02 01:44:54,025:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 01:44:54,026:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 01:44:54,031:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-02 01:44:54,031:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-02 01:44:54,031:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-02 01:44:54,036:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-02 01:44:54,037:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-02 01:44:54,040:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-02 01:44:54,523:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-02 01:44:54,523:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:44:53 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "6EiIzcZasZc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-02 01:44:54,524:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-02 01:44:59,409:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8108_key-certbot.pem 2024-07-02 01:45:04,429:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8106_csr-certbot.pem 2024-07-02 01:45:04,430:DEBUG:acme.client:Requesting fresh nonce 2024-07-02 01:45:04,430:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-02 01:45:04,591:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-02 01:45:04,591:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:45:03 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0k-ruuvaFm3axjd7eeqoRCGrjr9mjxRc8EBPVCS5mmOk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-02 01:45:04,591:DEBUG:acme.client:Storing nonce: jqVAJFJ0k-ruuvaFm3axjd7eeqoRCGrjr9mjxRc8EBPVCS5mmOk 2024-07-02 01:45:04,592:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-07-02 01:45:04,598:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBrLXJ1dXZhRm0zYXhqZDdlZXFvUkNHcmpyOW1qeFJjOEVCUFZDUzVtbU9rIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "khZCWiQA5HoD2qGGKCq2zxbn-OVVDRufRlA0Me2CX9HRl1q01sd2Xc51Qu8bKvHduA4QLhNvF3e9nHy-hBVzhlCZu7zadUqGgyx7AY2orKZlOa8_99koe0rQsE2SQ6wqTntGbgYJSHc8V-HWYvKiup7XWOhwgpDcwmMUvXQQkW2fk2GLsTCbhWmkTjTmYh3BfdgcxaHTFmPEeQgEFd9om9RGK6Edc1VPaja5If3g7FNOfiPBcsb02gQd5YwQ0tGbun7gzK1TUJQEtornjZhKrb3ieEvOiV7guP3vowzTwmhJ7ltkc2Ur8swdi-KCNqgXmuTBxPTWyKhPv2KMUF9C_g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-02 01:45:04,774:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-07-02 01:45:04,775:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 01 Jul 2024 23:45:04 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824261497 Replay-Nonce: jqVAJFJ0uMXro9cglHHSqkGSiCPbimxbNxn0UPXLlwZ3yyxvEkQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:21Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985640857" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824261497" } 2024-07-02 01:45:04,775:DEBUG:acme.client:Storing nonce: jqVAJFJ0uMXro9cglHHSqkGSiCPbimxbNxn0UPXLlwZ3yyxvEkQ 2024-07-02 01:45:04,775:DEBUG:acme.client:JWS payload: b'' 2024-07-02 01:45:04,782:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985640857: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjB1TVhybzljZ2xISFNxa0dTaUNQYmlteGJOeG4wVVBYTGx3WjN5eXh2RWtRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU2NDA4NTcifQ", "signature": "rb5T7a5bFIXU92HaqvcYKeIY2WvOpRCteeayhu0XoF752MmnNQTKtv8BZO9z3IiBsFhVVLsaP5kvkd9VHyx6PaHAU70exTV7JEbDSzboOu8HCcgOxnEpR0a3znY2-naxdFbidiv8W-_Z58dQvjXKoiWpbD299G9Pr14nnAPJlc2OO_TveMpU-9nJD8onLA6r8ZeLCZhrPoOccaPiKjR3ks6G30t8yBMR9AItyPYKNgUFGXHyi3HinFpxWdnwwfWBbZ8Q06M5OkGEJmUzOxxKZPURucMW3seSOhKdH5HsD3SvAPOveHQinwQgVnIiCb1UOV6NTUX6yGgk1K68ywYhiA", "payload": "" } 2024-07-02 01:45:04,948:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985640857 HTTP/1.1" 200 801 2024-07-02 01:45:04,948:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:45:04 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0_U4_4UD9lPPyj0kfsU9wzZ0C6PRe8yqRpHsJ_1TfGIA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:21Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/_W_uNw", "status": "pending", "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/1XcAQA", "status": "pending", "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/a1s51Q", "status": "pending", "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs" } ] } 2024-07-02 01:45:04,948:DEBUG:acme.client:Storing nonce: jqVAJFJ0_U4_4UD9lPPyj0kfsU9wzZ0C6PRe8yqRpHsJ_1TfGIA 2024-07-02 01:45:04,949:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-02 01:45:04,949:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-07-02 01:45:04,950:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-02 01:45:04,950:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-02 01:45:04,951:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 01:45:04,951:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-02 01:45:04,951:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-02 01:45:04,951:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-02 01:45:04,953:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 01:45:05,006:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 01:45:05,212:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 01:45:05,213:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-02 01:45:05,214:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-02 01:45:05,219:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:09 UTC. 2024-07-02 01:45:05,219:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 01:45:05,220:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 01:45:05,226:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-02 01:45:05,226:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-02 01:45:05,226:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-02 01:45:05,231:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-02 01:45:05,232:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-02 01:45:05,234:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-02 01:45:05,716:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-02 01:45:05,717:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:45:05 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "b7RNsePVS2c": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-02 01:45:05,717:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-02 01:45:11,195:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8109_key-certbot.pem 2024-07-02 01:45:15,998:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8107_csr-certbot.pem 2024-07-02 01:45:15,998:DEBUG:acme.client:Requesting fresh nonce 2024-07-02 01:45:15,998:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-02 01:45:16,159:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-02 01:45:16,160:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:45:15 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0-6nxQNucktHEbatx3v_uCaLg3mUy9onjEuVv1zXackM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-02 01:45:16,160:DEBUG:acme.client:Storing nonce: jqVAJFJ0-6nxQNucktHEbatx3v_uCaLg3mUy9onjEuVv1zXackM 2024-07-02 01:45:16,160:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-07-02 01:45:16,166:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjAtNm54UU51Y2t0SEViYXR4M3ZfdUNhTGczbVV5OW9uakV1VnYxelhhY2tNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "gOf4LAhvAKy6Q1bUEzWldmIwVYZUGd1MveCAUPZv0JBm1qdY13aMB6UUtlmfL9I7fCfBhQ0xEVYaNKzY6auufqstd2ffUS2AKp4qLryOwwio2o3SH9EIZl2kGaITjsTciY7Z7HpJm1yLZM4j1r0oB6Rvp1RxYWaaPfhU4mY_yXhHQcogGCqjF29daZkcLuzL7NhwXODbsyd6OaNw9_rKpjg9DFbfM8rrIRuG6IhnMbO8kyLoOxyxlqXKyfdBV8UHwqwrXLxWHuKh9i9pEwQgyi5hGCLdNp2KnH1FdYvVVVkpafTOox2-RByLkg6Zn4OhQmDxnwoy02hlbEnueo3wAw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-02 01:45:16,341:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-02 01:45:16,342:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 01 Jul 2024 23:45:15 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824300277 Replay-Nonce: qqMiT6CkvXaAEV5-jexNlGao9-Mb4NVgEdSp1i_69zxkjyr2QHQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:31Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985696127" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824300277" } 2024-07-02 01:45:16,342:DEBUG:acme.client:Storing nonce: qqMiT6CkvXaAEV5-jexNlGao9-Mb4NVgEdSp1i_69zxkjyr2QHQ 2024-07-02 01:45:16,342:DEBUG:acme.client:JWS payload: b'' 2024-07-02 01:45:16,349:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985696127: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2t2WGFBRVY1LWpleE5sR2FvOS1NYjROVmdFZFNwMWlfNjl6eGtqeXIyUUhRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU2OTYxMjcifQ", "signature": "TusOsKcMYCVkV3O5beg5r-IBUKuwH0Rh0JTdQqWwzeoQ42_LEz1K_KEFFdZfONRLuMyibbQ8GePkCubSxxhrDKUxI_q0HWe71e6oXW7pYcvImFn63zsWTAO1RN5KLTfVGdhgWZzWAnoULpg2EiigATW4cFcnL7n7GcP3T2evPW-nHGMjLi4ZFzPZ7LkILf81BHIK7ibYABVk3b8pq3VEGdH1kav3L0-iiXOPzpJFcXHJVHe0u0_QfqFKkSo-9EIg1dLeznVUxu3skA4eb7XnDofVwu6E0UbVS46NgmppPmedhOhd5ek7YxI9-JQjR4Pe25EkLwfnOrXq2tU6DzmnLg", "payload": "" } 2024-07-02 01:45:16,515:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985696127 HTTP/1.1" 200 805 2024-07-02 01:45:16,515:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:45:15 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6Ck1lA31sURhfGHshmTs0vPGVwbYClRTiFPSLXkhoNQO40 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:31Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/p3DiTg", "status": "pending", "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/dn4kZw", "status": "pending", "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/A2Vu8Q", "status": "pending", "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU" } ] } 2024-07-02 01:45:16,516:DEBUG:acme.client:Storing nonce: qqMiT6Ck1lA31sURhfGHshmTs0vPGVwbYClRTiFPSLXkhoNQO40 2024-07-02 01:45:16,516:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-02 01:45:16,517:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-07-02 01:45:16,517:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-02 01:45:16,518:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-02 01:45:16,518:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 01:45:16,519:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-02 01:45:16,519:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-02 01:45:16,519:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-02 01:45:16,520:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 01:45:16,564:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 01:45:16,775:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 01:45:16,776:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-02 01:45:16,777:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-02 01:45:16,782:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:26 UTC. 2024-07-02 01:45:16,782:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 01:45:16,782:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 01:45:16,787:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-02 01:45:16,788:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-02 01:45:16,788:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-02 01:45:16,804:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-02 01:45:16,805:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-02 01:45:16,807:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-02 01:45:17,287:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-02 01:45:17,288:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:45:16 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "IYvZfYYpdT4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-02 01:45:17,289:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-02 01:45:22,335:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8110_key-certbot.pem 2024-07-02 01:45:27,253:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8108_csr-certbot.pem 2024-07-02 01:45:27,254:DEBUG:acme.client:Requesting fresh nonce 2024-07-02 01:45:27,254:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-02 01:45:27,415:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-02 01:45:27,416:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:45:26 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6Ck095n2JUfoVmnkmaDNLNbqQp8qhSHiHNDEfukJ1jJTQs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-02 01:45:27,416:DEBUG:acme.client:Storing nonce: qqMiT6Ck095n2JUfoVmnkmaDNLNbqQp8qhSHiHNDEfukJ1jJTQs 2024-07-02 01:45:27,416:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-07-02 01:45:27,423:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2swOTVuMkpVZm9WbW5rbWFETkxOYnFRcDhxaFNIaUhOREVmdWtKMWpKVFFzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Z0qfsBbkI4li7Ye13SHzzdSJUmfGdmvVbxOorkr9fRiBXkyurPzTI5dIgFp3QwOTH9dUGYdE_IS53WOxarY7gouTxCkoGGNdZg7Qfdqde8B7XZgBofwMz3zu2C5rCV-jTKBFLyZP3uOP4e_ASC23Kx1J9QlZYiaW3AM6wcWAX9wqZGCjzWY_M3nIqnqwMcz9D2Yuii7P7CgKg3dPspe7bsXNIRmjpoNR4xJ501rhB-m0g4OEmRroqY1Cy0Ws823UTnItLqGMeRRN-i3zO0pooQGprgFGySPULb9nsy3auFMXHwTL9l2OjmAn9W6Y-FZ4elJnd55fhWEwVBBvkzCUFw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-02 01:45:27,607:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-07-02 01:45:27,608:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 01 Jul 2024 23:45:26 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824334367 Replay-Nonce: jqVAJFJ0T-IYBRaHZFGSnk1i8ntsRDowo3KAha2HE-uXefWtETI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:41Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985747117" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824334367" } 2024-07-02 01:45:27,608:DEBUG:acme.client:Storing nonce: jqVAJFJ0T-IYBRaHZFGSnk1i8ntsRDowo3KAha2HE-uXefWtETI 2024-07-02 01:45:27,609:DEBUG:acme.client:JWS payload: b'' 2024-07-02 01:45:27,615:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985747117: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBULUlZQlJhSFpGR1NuazFpOG50c1JEb3dvM0tBaGEySEUtdVhlZld0RVRJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU3NDcxMTcifQ", "signature": "nRgafc7ArhdPXTSUQmZPZw9QdQpaFTnP7eHmgtPIupyXTZgta92nJvwQbH7ohybWk5OBaPog3EQMXQN2uOPJWxmIr-8h_pBR_tmq9jKhIM_4jQtcVZNUx3SNTpz13te8BERLm8tdgFwPPhXe3tGZpWwNCasNvtDZqRq5sAfdPIw8lPdKL9tt8UBOzT4qUgDn3Pis_KOVOJSNMJJtKba_0elQyV4WM-8531GZsgcw1erMlhPmU4Vpvy3pHI7yCAJxhdLsbMW-wOU8z-923ordlib3YT5-cN8qAW_AmD2ukXsQDklBz-VXmt4fHukJAu3tjCgeXrOFQc0yL1wGKyocnA", "payload": "" } 2024-07-02 01:45:27,782:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985747117 HTTP/1.1" 200 809 2024-07-02 01:45:27,782:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:45:27 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6Ckr1I_PEHwvrgXSMmKv5iF44tWAdwoj15r3FxIdZXUwDs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:41Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/NIFDhg", "status": "pending", "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/1iYgbg", "status": "pending", "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/elhV3g", "status": "pending", "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY" } ] } 2024-07-02 01:45:27,782:DEBUG:acme.client:Storing nonce: qqMiT6Ckr1I_PEHwvrgXSMmKv5iF44tWAdwoj15r3FxIdZXUwDs 2024-07-02 01:45:27,783:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-02 01:45:27,783:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-07-02 01:45:27,784:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-02 01:45:27,785:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-02 01:45:27,785:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 01:45:27,786:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-02 01:45:27,786:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-02 01:45:27,786:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-02 01:45:27,788:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 01:45:27,847:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 01:45:28,262:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 01:45:28,263:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is signed by the certificate's issuer. 2024-07-02 01:45:28,264:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD 2024-07-02 01:45:28,268:INFO:certbot._internal.renewal:Cert not yet due for renewal 2024-07-02 01:45:28,272:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 01:45:28,324:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 01:45:28,543:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 01:45:28,544:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-02 01:45:28,546:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-02 01:45:28,551:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:40 UTC. 2024-07-02 01:45:28,551:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 01:45:28,551:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 01:45:28,557:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-02 01:45:28,557:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-02 01:45:28,557:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-02 01:45:28,561:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-02 01:45:28,562:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-02 01:45:28,564:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-02 01:45:28,997:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-02 01:45:28,997:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:45:28 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "L812hs3bfYo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-02 01:45:28,998:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-02 01:45:33,702:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8111_key-certbot.pem 2024-07-02 01:45:38,212:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8109_csr-certbot.pem 2024-07-02 01:45:38,212:DEBUG:acme.client:Requesting fresh nonce 2024-07-02 01:45:38,212:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-02 01:45:38,358:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-02 01:45:38,359:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:45:37 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLCqgoA0q2YWYDmQTmrvA747ybR9gJbdBLVv3BbJ0x1oBA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-02 01:45:38,359:DEBUG:acme.client:Storing nonce: B-hK_YLCqgoA0q2YWYDmQTmrvA747ybR9gJbdBLVv3BbJ0x1oBA 2024-07-02 01:45:38,360:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-07-02 01:45:38,365:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENxZ29BMHEyWVdZRG1RVG1ydkE3NDd5YlI5Z0piZEJMVnYzQmJKMHgxb0JBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "aiw_B8DjOniYMdNsCaE2OwtG3pjqUhgNvwx50qGjdQLLBLmHTCqUAqgB0yCMnQqF13RC4YOVfpz3uaiT7kDfuuTLcYh5N55u8-QxEalQbMMXNe-jxPLwzGmy56dd-nZNhXnHX1kdPtoZIcpaUPN8hc3pSo2h_u70RQtP4S_elOeVDLGrp8PFlnHfD7fqLXSOt5QGerxoPwJ3JEKkbJZEqcEJ837CBiOFe39GpOwe_GPXTKbL3ws9i73JW7RHQiIIdToAgdzTMsm8s__1Hp8TrCxHzbC172nk26ia7cFZmbHydFxK5z9Px3mOTkgHCZhCmnVyjOeD3J1a7UrFX0abRw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-02 01:45:38,529:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-07-02 01:45:38,529:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 01 Jul 2024 23:45:37 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824371297 Replay-Nonce: B-hK_YLCdE55LvRNp9WNJXt8LOWbZz5tpeBhHqNWgNFu6Qdy8Fo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:52Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985803767" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824371297" } 2024-07-02 01:45:38,529:DEBUG:acme.client:Storing nonce: B-hK_YLCdE55LvRNp9WNJXt8LOWbZz5tpeBhHqNWgNFu6Qdy8Fo 2024-07-02 01:45:38,530:DEBUG:acme.client:JWS payload: b'' 2024-07-02 01:45:38,536:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985803767: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENkRTU1THZSTnA5V05KWHQ4TE9XYlp6NXRwZUJoSHFOV2dORnU2UWR5OEZvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU4MDM3NjcifQ", "signature": "nsvSy6XgWeXEU0HoQofA50tX4u-fqCjSR569UilPROdVZFEgQ6_rtNOCQt8NY11DQw2Oy9sruLFskl5NB5P_4PcMkdYi4MkMq-_2pvpqY9WSMF0XMblX7GBxw0XZCesoxHybVDhXsL70n7ITuwrv9Y9_n4gNBjr7up-kHLKDic3r-E4QuYvtuJ6Qqw5-F_lQqc_eDTBsPVmwL9_xRmdxEH4pf-FVbFVE8wUPrw8WjFb4PueYDMRTBUypNGssdOEHYQZbaCD0rWrHxvhvARFHIGYZ6lOq0AX-ED-v4VL5hpReUeooE1Z8k4RCbtc9TMeeHa2Vb1L7M6QaoodQhohv7g", "payload": "" } 2024-07-02 01:45:38,690:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985803767 HTTP/1.1" 200 806 2024-07-02 01:45:38,691:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:45:38 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLCblqS0k9IvxXd0SuMnDzRQ3HlsrhnT-rzevPv-eFqvzA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:52Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/DP175w", "status": "pending", "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/kAzjPg", "status": "pending", "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/-Uec4A", "status": "pending", "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0" } ] } 2024-07-02 01:45:38,691:DEBUG:acme.client:Storing nonce: B-hK_YLCblqS0k9IvxXd0SuMnDzRQ3HlsrhnT-rzevPv-eFqvzA 2024-07-02 01:45:38,692:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-02 01:45:38,692:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-07-02 01:45:38,693:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-02 01:45:38,694:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-02 01:45:38,694:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 01:45:38,695:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-02 01:45:38,695:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-02 01:45:38,695:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-02 01:45:38,697:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 01:45:38,740:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-07-02 01:45:38,740:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 01:45:38,740:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-07-02 01:45:38,746:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-07-02 01:45:38,748:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-07-02 01:45:38,749:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-07-02 01:45:38,749:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-07-02 01:45:38,749:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-07-02 01:45:38,750:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-07-02 01:45:38,795:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 01:45:38,971:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 01:45:38,972:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-02 01:45:38,973:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-02 01:45:38,978:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:58 UTC. 2024-07-02 01:45:38,978:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 01:45:38,979:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 01:45:38,984:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-02 01:45:38,984:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-02 01:45:38,984:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-02 01:45:38,988:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-02 01:45:38,989:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-02 01:45:38,991:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-02 01:45:39,437:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-02 01:45:39,438:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:45:38 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "1zDQDVmPpLI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-02 01:45:39,438:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-02 01:45:44,373:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8112_key-certbot.pem 2024-07-02 01:45:49,186:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8110_csr-certbot.pem 2024-07-02 01:45:49,187:DEBUG:acme.client:Requesting fresh nonce 2024-07-02 01:45:49,187:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-02 01:45:49,338:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-02 01:45:49,339:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:45:48 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9CrDquQntRdBTfO34BRSzpM5zlnhNKOzf7hEU9LFv03I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-02 01:45:49,339:DEBUG:acme.client:Storing nonce: eF-2qMJ9CrDquQntRdBTfO34BRSzpM5zlnhNKOzf7hEU9LFv03I 2024-07-02 01:45:49,339:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-07-02 01:45:49,346:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlDckRxdVFudFJkQlRmTzM0QlJTenBNNXpsbmhOS096ZjdoRVU5TEZ2MDNJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "oe9TgKsRWLJBQzl6Fp0Nl_wwLCbiwN-DHgSBPHy_9nlkZBAJwtX_B4_7apXj-E77OfNaj_l7In1e1HPsSyaa3mO5VEb-1nB1RHNfucRAcBHK_XjmuCg4JCWm9qkPn9XowyB-cKofKAqvWu_qXBIGF8-zyI7MYUj454EPxE8_5-q3146MaQVuW6EtvXp-SxF_dOGbzjQkOS0gKhqxpUhQJuheskiP2GN_AaKmSqU58YLVIwYNlv0qSEejENnA_hIWYTo6bJS5bMg_QZuioCcix1wuKYAjlSORKPBBngOEQo3KKnIlE6CaOytFCrHhr8HqKQ7xLwubzXGIhPc-wThnUg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-02 01:45:49,509:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-07-02 01:45:49,510:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 01 Jul 2024 23:45:48 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824405187 Replay-Nonce: eF-2qMJ9u8jqo0eRNk4oe4BmWlA3Fzx5eSqyAGedUEhyBuAwdxc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:01Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985856047" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824405187" } 2024-07-02 01:45:49,510:DEBUG:acme.client:Storing nonce: eF-2qMJ9u8jqo0eRNk4oe4BmWlA3Fzx5eSqyAGedUEhyBuAwdxc 2024-07-02 01:45:49,510:DEBUG:acme.client:JWS payload: b'' 2024-07-02 01:45:49,516:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985856047: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjl1OGpxbzBlUk5rNG9lNEJtV2xBM0Z6eDVlU3F5QUdlZFVFaHlCdUF3ZHhjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU4NTYwNDcifQ", "signature": "LVMTe_fuFR19vh-0oP6r7wkVjYXytSV9wkGDp0KGmbmsu7fPMghLhYBD5vscmeN7_vC840fSSQ3OI1o4L4JHpR7OTshctpv22_OwVEl6-qvR9wZCk5fwNAK6XnYJBA_ruZehs71ghfc2LCFRnF0hhIIBHDzX43NGoi2XbZqaOi4cFqNcCPOEdAfxq56pRHneJfVW4h1qnhUvPOcMgtyYRD7GWf0l1SQ657da0CpV65oT-T-VwF6kDNlC9LDZrT6QYL-i-DGM2kQz6oCZGed2uBb7oxPa1mSKeUHidhM-FMAuDULx83riD32rwD0E3meXHAK66HzrywqO-OmYfwTilA", "payload": "" } 2024-07-02 01:45:49,671:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985856047 HTTP/1.1" 200 811 2024-07-02 01:45:49,672:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:45:49 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLCzeAxiI69zS8J3L5iE5rL4qyrMltvcDAyjKGlBrqHLZc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:01Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/ZygfgQ", "status": "pending", "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/f5kJqg", "status": "pending", "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/OgjqNA", "status": "pending", "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s" } ] } 2024-07-02 01:45:49,672:DEBUG:acme.client:Storing nonce: B-hK_YLCzeAxiI69zS8J3L5iE5rL4qyrMltvcDAyjKGlBrqHLZc 2024-07-02 01:45:49,672:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-02 01:45:49,673:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-07-02 01:45:49,674:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-02 01:45:49,674:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-02 01:45:49,675:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 01:45:49,675:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-02 01:45:49,675:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-02 01:45:49,676:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-02 01:45:49,677:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 01:45:49,724:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 01:45:49,986:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 01:45:49,987:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-02 01:45:49,988:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-02 01:45:49,992:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:15 UTC. 2024-07-02 01:45:49,992:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 01:45:49,993:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 01:45:49,998:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-02 01:45:49,998:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-02 01:45:49,998:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-02 01:45:50,003:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-02 01:45:50,003:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-02 01:45:50,006:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-02 01:45:50,486:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-02 01:45:50,487:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:45:49 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "mXtgjSw_Rjw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-02 01:45:50,487:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-02 01:45:55,649:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8113_key-certbot.pem 2024-07-02 01:46:00,332:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8111_csr-certbot.pem 2024-07-02 01:46:00,333:DEBUG:acme.client:Requesting fresh nonce 2024-07-02 01:46:00,333:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-02 01:46:00,488:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-02 01:46:00,489:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:45:59 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0f2R409DZmLI81ySA3K5vVnDTCcPS3RGlpGFtqySbv4Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-02 01:46:00,489:DEBUG:acme.client:Storing nonce: jqVAJFJ0f2R409DZmLI81ySA3K5vVnDTCcPS3RGlpGFtqySbv4Q 2024-07-02 01:46:00,490:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-07-02 01:46:00,496:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBmMlI0MDlEWm1MSTgxeVNBM0s1dlZuRFRDY1BTM1JHbHBHRnRxeVNidjRRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "w05RoVUcsFQar1ID_yv2qShiK5gp8zIOFPSpHHojMfr44RXomSD4Iajh5vf96EW7bnkOlPb21LfvuPq57P9z2gCAzXcd71rTMG5IyivLHmSNdxFwgePI_kUKcnUTNuod-vnGFZZZ3uPY-Z0zqA81FcT6A7PcnEmkJODL6SySXyw9zqjKkzQLG3zlydhFg4pWVMx1Ohvpe-edwQzKUVSUk_ZbYvrEQlW5OeVg5CWLkAqtNwNfx3A5qjOQu5c02JqGIAD_xMTvduxd3WG4cIxZTAyjnLTqSEwDXngJ7ZdKQXW4U1hi5WtliqBae_f1sF1mWQI6g2WFyTB-AMk4PFMrHQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-02 01:46:00,660:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-07-02 01:46:00,661:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 01 Jul 2024 23:45:59 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824456717 Replay-Nonce: jqVAJFJ0TTz1wY4hIrjLQo1dSSFgUCjbbB-x6QoLIQuYlsmZnNM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:12Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985929937" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824456717" } 2024-07-02 01:46:00,661:DEBUG:acme.client:Storing nonce: jqVAJFJ0TTz1wY4hIrjLQo1dSSFgUCjbbB-x6QoLIQuYlsmZnNM 2024-07-02 01:46:00,661:DEBUG:acme.client:JWS payload: b'' 2024-07-02 01:46:00,667:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985929937: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBUVHoxd1k0aElyakxRbzFkU1NGZ1VDamJiQi14NlFvTElRdVlsc21abk5NIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU5Mjk5MzcifQ", "signature": "bcD7GnT93ckyDNT2ESt9wTl4RBrvXemTdrKgIjJglqFN-noFLvpc8ke7uuhyxTDCbMg8cV7kd_lZcDvUX3hHnKlH0o749_0acBePEYsxmVxDYCqBaecX_8bP_JtXUH4u6-poLcdabtKXhf-uDT1H0dO9QmAifR112xd0zmXwO62VXzAdZDI-0fvvOV5lEPwy9KdHkcHprUx5vQ5j226yNln9dR8-k74Gu98L4BhFo_aKup4Y7it7mk31iboh-V6yrK2f_s22FumRpYKbikMIB0CZ_d_F_VeHEoHp6ShB8Gokgv-X6OAOD0UfsKvbRwhgFimzC3qYffAFxv7VA-00sA", "payload": "" } 2024-07-02 01:46:00,827:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985929937 HTTP/1.1" 200 810 2024-07-02 01:46:00,828:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:46:00 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6Ck4nY7koamx6Dt-LGiIwMAxSAnqxgnuAwg9WoGnPqCsI4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:12Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/gXwyeA", "status": "pending", "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/K4XtOg", "status": "pending", "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/NX0yhA", "status": "pending", "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY" } ] } 2024-07-02 01:46:00,828:DEBUG:acme.client:Storing nonce: qqMiT6Ck4nY7koamx6Dt-LGiIwMAxSAnqxgnuAwg9WoGnPqCsI4 2024-07-02 01:46:00,829:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-02 01:46:00,829:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-07-02 01:46:00,830:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-02 01:46:00,830:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-02 01:46:00,831:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 01:46:00,831:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-02 01:46:00,831:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-02 01:46:00,831:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-02 01:46:00,833:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 01:46:00,885:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 01:46:01,087:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 01:46:01,089:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-07-02 01:46:01,090:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-07-02 01:46:01,096:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:29 UTC. 2024-07-02 01:46:01,096:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 01:46:01,096:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 01:46:01,101:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-02 01:46:01,102:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-02 01:46:01,102:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-02 01:46:01,107:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-02 01:46:01,108:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-02 01:46:01,110:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-02 01:46:01,592:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-02 01:46:01,593:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:46:00 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "ienIJVDYY1Q": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-02 01:46:01,593:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-02 01:46:06,249:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8114_key-certbot.pem 2024-07-02 01:46:10,770:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8112_csr-certbot.pem 2024-07-02 01:46:10,771:DEBUG:acme.client:Requesting fresh nonce 2024-07-02 01:46:10,771:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-02 01:46:10,936:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-02 01:46:10,936:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:46:10 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6Ckh9MCP_HrsRSe0BYttvIdIto5TBHhL0trCsG9or1blQ8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-02 01:46:10,937:DEBUG:acme.client:Storing nonce: qqMiT6Ckh9MCP_HrsRSe0BYttvIdIto5TBHhL0trCsG9or1blQ8 2024-07-02 01:46:10,937:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-07-02 01:46:10,943:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2toOU1DUF9IcnNSU2UwQll0dHZJZEl0bzVUQkhoTDB0ckNzRzlvcjFibFE4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "cVuN0ZYKAwf5mNg6UuRhOMHp46aZZ9G0SafMVIcHhNpWAy1tWqRhSAmUtXcTluAgn5BDvDKZn7vUCLhO7L2-51HOMCOtcxxI986_sEdwf2ePL05Bx6Gh34_FVNxpQi9fkbVtGnnNJkvMa6EZu6zFl1L4sYc8-QlINxs108qkH_0OYsgbCSszQ4Q0nisM8xgdGwHIYWqEN2UOra7G3HlK02OXJksdb8yVdV2tnzDjvrjvr9hxV0aI0kl6CcT2Ogx-df8sWd3LK-mO7aTbiTUrvc4xHKQ-U_sVQ3LUvbHBSEKBkM5ZkwB3lt39JO-8zlEXz_s1eK_NNzIjbAx1u3ireQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-02 01:46:11,120:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-07-02 01:46:11,120:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 01 Jul 2024 23:46:10 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824496987 Replay-Nonce: qqMiT6CkpJgk8reNJa30ZuRVGDCBxxdy3TzZzma_UM3cofTsAUA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:22Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985989517" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824496987" } 2024-07-02 01:46:11,121:DEBUG:acme.client:Storing nonce: qqMiT6CkpJgk8reNJa30ZuRVGDCBxxdy3TzZzma_UM3cofTsAUA 2024-07-02 01:46:11,121:DEBUG:acme.client:JWS payload: b'' 2024-07-02 01:46:11,127:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985989517: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2twSmdrOHJlTkphMzBadVJWR0RDQnh4ZHkzVHpaem1hX1VNM2NvZlRzQVVBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU5ODk1MTcifQ", "signature": "JtG15KA0MKqDArL--gh77pw779vV_SyUFdw-SYzcna4TlcryjQTSpV6rjHpmQpBHl6rh050pxB0A-gIV0juL_EGmBKljMxg7A4ytie4u6EN0-MR6gxL8__WWMpqz_g3PqWyrOF8zxElqNpA8659uOD3dd92QMa-ghsYy7Ro9npz7junbNZp9VRY_FiPeGU0M9ZtGHKNw15zXNWXlSBtG0SkefqyG6kgv22TIqFMAFKvjC0lw8g2OlScdi0ItzNsTST_d7lwnRfCUUbfUV3Uwtq5S5ynVN6_MrHirirC5JvMNGzO9km07DABBtrjS3wP6l_346mS9ZyVOpbK6aCTCaA", "payload": "" } 2024-07-02 01:46:11,291:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985989517 HTTP/1.1" 200 809 2024-07-02 01:46:11,292:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:46:10 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0wEkqjV0g9Qa0Yhgt0cTCHQW3tHBwSSKiH4mMBJR6cQk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:22Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/ebl14A", "status": "pending", "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/-PFYBw", "status": "pending", "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/LKEO7w", "status": "pending", "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0" } ] } 2024-07-02 01:46:11,292:DEBUG:acme.client:Storing nonce: jqVAJFJ0wEkqjV0g9Qa0Yhgt0cTCHQW3tHBwSSKiH4mMBJR6cQk 2024-07-02 01:46:11,293:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-02 01:46:11,293:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-07-02 01:46:11,293:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-02 01:46:11,294:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-02 01:46:11,294:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 01:46:11,295:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-02 01:46:11,295:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-02 01:46:11,295:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-02 01:46:11,296:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 01:46:11,343:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 01:46:11,598:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 01:46:11,599:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-07-02 01:46:11,600:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-07-02 01:46:11,604:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:53 UTC. 2024-07-02 01:46:11,604:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 01:46:11,605:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 01:46:11,610:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-02 01:46:11,610:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-02 01:46:11,611:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-02 01:46:11,616:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-02 01:46:11,617:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-02 01:46:11,619:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-02 01:46:12,098:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-02 01:46:12,098:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:46:11 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "64_Y-k4rx2E": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-02 01:46:12,099:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-02 01:46:16,872:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8115_key-certbot.pem 2024-07-02 01:46:21,493:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8113_csr-certbot.pem 2024-07-02 01:46:21,494:DEBUG:acme.client:Requesting fresh nonce 2024-07-02 01:46:21,494:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-02 01:46:21,654:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-02 01:46:21,655:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:46:21 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6CkwBmuh-Pk5YV2iQ0-PfGbo_l9yG5MOEkA62j1gjswy-4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-02 01:46:21,655:DEBUG:acme.client:Storing nonce: qqMiT6CkwBmuh-Pk5YV2iQ0-PfGbo_l9yG5MOEkA62j1gjswy-4 2024-07-02 01:46:21,655:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-07-02 01:46:21,663:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2t3Qm11aC1QazVZVjJpUTAtUGZHYm9fbDl5RzVNT0VrQTYyajFnanN3eS00IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "HMXbGpyp4jZIHWho6D4KNoMjO_RS0ycvIT498dLdfpXFUdAoH5zhsDT_PpVMP9VgCQ4nH8HXwqFfdpSHrowcbT_snoWKw4JDLf5-4AL6Z37HJZkWIKraHUw9ln4RIQ1PL1dUFppR7UaC0epFzuAYx1qpmcJHTwTMsc6Yj-iUZYXVSWQPODY2uJ5Z9vY7TROkx_MGeAkeWG62Mf_cmtW9tUAQcM9_R8SWcHe4JTawavCgUcH_9IiXzFZ7q0WBhxAL7bkTg3PliqTX_hpfFvJQ8-QGMoMQk2FBaWelJ1MnqVZxmaoI5a6c39pdgWOG2JFu5hLVv3rw03gWWHKys6FgAw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-02 01:46:21,832:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-02 01:46:21,833:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 01 Jul 2024 23:46:21 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824533727 Replay-Nonce: jqVAJFJ0lGlDSNtW5S_8RJNWoYRZ1U915Dis-uvUY0sqaerAXUs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:32Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986047927" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824533727" } 2024-07-02 01:46:21,833:DEBUG:acme.client:Storing nonce: jqVAJFJ0lGlDSNtW5S_8RJNWoYRZ1U915Dis-uvUY0sqaerAXUs 2024-07-02 01:46:21,833:DEBUG:acme.client:JWS payload: b'' 2024-07-02 01:46:21,840:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986047927: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBsR2xEU050VzVTXzhSSk5Xb1lSWjFVOTE1RGlzLXV2VVkwc3FhZXJBWFVzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYwNDc5MjcifQ", "signature": "DaI-qpx1Jhfkz2dL_996UX4p2l6XbczwUOk7FTGZ5Yw7ZkUW3NY26BiWI4TNm1WJNO8AlVGQr4fBwtpfPNcOpum1OP3EFO_a5ILUfiltbd8urNXQmSdmnX1mwl0az8qlPUG-8XzFIPPIDE7z96CwZqwwpqFBTfewLM9ztKYi2Vfw5YCYSLVOFUvgEGsN3SEeYWtoYbpZsa8haRIYmZWwSa6-JD39h08yvh4laTugYeI4Bx5WGXoRmkSUvrzELHanCfeB0D1mwPGb5zj8Zpr-ZFn9eE09QMX1jE_UoFfB9jeul6-vWrIykTSvuGFRKxj-eH7eyz89zDAuSAW-ob6bww", "payload": "" } 2024-07-02 01:46:22,004:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986047927 HTTP/1.1" 200 805 2024-07-02 01:46:22,005:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:46:21 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6CksWdkWn_e2RtKreddcDBEw_vy0FxBt9llz-msWg2vLGA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:32Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/a7aI1Q", "status": "pending", "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/Rqj-2Q", "status": "pending", "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/4mVq6w", "status": "pending", "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0" } ] } 2024-07-02 01:46:22,005:DEBUG:acme.client:Storing nonce: qqMiT6CksWdkWn_e2RtKreddcDBEw_vy0FxBt9llz-msWg2vLGA 2024-07-02 01:46:22,006:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-02 01:46:22,006:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-07-02 01:46:22,007:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-02 01:46:22,008:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-02 01:46:22,008:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 01:46:22,009:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-02 01:46:22,009:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-02 01:46:22,009:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-02 01:46:22,011:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 01:46:22,061:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 01:46:22,279:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 01:46:22,281:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-02 01:46:22,281:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-02 01:46:22,287:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:19 UTC. 2024-07-02 01:46:22,287:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 01:46:22,287:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 01:46:22,292:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-02 01:46:22,293:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-02 01:46:22,293:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-02 01:46:22,298:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-02 01:46:22,299:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-02 01:46:22,301:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-02 01:46:22,781:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-02 01:46:22,782:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:46:22 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Q6H6ezqjArY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-02 01:46:22,783:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-02 01:46:27,599:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8116_key-certbot.pem 2024-07-02 01:46:32,459:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8114_csr-certbot.pem 2024-07-02 01:46:32,459:DEBUG:acme.client:Requesting fresh nonce 2024-07-02 01:46:32,459:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-02 01:46:32,622:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-02 01:46:32,623:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:46:31 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6CkwplhQLLlCiQRNVHZa72aAqSTCvuqS1CoST45QREXZJQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-02 01:46:32,623:DEBUG:acme.client:Storing nonce: qqMiT6CkwplhQLLlCiQRNVHZa72aAqSTCvuqS1CoST45QREXZJQ 2024-07-02 01:46:32,623:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-07-02 01:46:32,630:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2t3cGxoUUxMbENpUVJOVkhaYTcyYUFxU1RDdnVxUzFDb1NUNDVRUkVYWkpRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Vq8CdFqsjQefuhGhSSbaklY17Kcvn32PC07pM1Vpivs0J5u0_K9Oh1IZkV07abJnINh26qLu23Q5PEaw2uwc9eFkvE1u7EmEVB8NU5luzxXe3EWCLa3DDa0UGxp6KD5HkSIpC05t2cfhvUZMobCVmRAIjXXrb-sHVCqO2_LxZiwp4QLdcUOokK0tBfhlAS__3uhx90VQFm2IusYmvXg9iLhPvi6bURqecCld1QYvzI4xeBrNlSOzcSIoAXSaSFAweXCPbHlBHTR9aTFFdeJZg_8SDAPl4WTi2-ydTNaGOUZeYWblSp7vPurMEi2hQQHd7zD0qOR80QMpcxBNv7-1Mg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-02 01:46:32,803:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-02 01:46:32,804:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 01 Jul 2024 23:46:32 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824568847 Replay-Nonce: qqMiT6CkY-9sLIhIIdL2IqXOlqb2_ubAwMWgA76pUfXB8VffK3E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:42Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986101167" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824568847" } 2024-07-02 01:46:32,804:DEBUG:acme.client:Storing nonce: qqMiT6CkY-9sLIhIIdL2IqXOlqb2_ubAwMWgA76pUfXB8VffK3E 2024-07-02 01:46:32,804:DEBUG:acme.client:JWS payload: b'' 2024-07-02 01:46:32,810:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986101167: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tZLTlzTEloSUlkTDJJcVhPbHFiMl91YkF3TVdnQTc2cFVmWEI4VmZmSzNFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYxMDExNjcifQ", "signature": "ZQLzC9VQmvdBmwHKbIlOC-8m8Z5qfxDozCq9zsUIhRsTbIaJ0JbZbT4W6FxUJDnTidqRvvjVljFoxASk1t6oC1v42f5PeM46iD6KhRhO_r5FX5T62ViMO2iy22qbnXMlAR92lvDyOunnsISP6VPYFPPe3ZvCjkPjR7LM1ui4aHp1MybbAPSunVxpqs7uQLNVCQudVg2Dwchd77Y28O9rNDdvzZR21_fPYoclofF11udxHsVnGYKtBFedlOwoczHOP8YMkhajU-pBkRd9_LjOFdJKPUVuCDDUdaZOGKGF2Q_gtAFxIIAmLxnVgfAyco_gcuIPOGmf0of0YPy3rnoUUw", "payload": "" } 2024-07-02 01:46:32,976:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986101167 HTTP/1.1" 200 805 2024-07-02 01:46:32,977:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:46:32 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0gIYvJflgkVoQhDmb8VkkQ0StXVhV50gLAOuc4OrWDl4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:42Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/nlLFxg", "status": "pending", "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/mOuqMg", "status": "pending", "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/b0ZrJg", "status": "pending", "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q" } ] } 2024-07-02 01:46:32,977:DEBUG:acme.client:Storing nonce: jqVAJFJ0gIYvJflgkVoQhDmb8VkkQ0StXVhV50gLAOuc4OrWDl4 2024-07-02 01:46:32,978:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-02 01:46:32,978:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-07-02 01:46:32,979:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-02 01:46:32,979:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-02 01:46:32,980:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 01:46:32,980:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-02 01:46:32,980:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-02 01:46:32,981:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-02 01:46:32,984:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 01:46:33,035:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-02 01:46:33,208:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-02 01:46:33,209:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-02 01:46:33,210:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-02 01:46:33,215:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:37 UTC. 2024-07-02 01:46:33,215:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-02 01:46:33,216:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-02 01:46:33,222:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-07-02 01:46:33,222:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-07-02 01:46:33,222:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-02 01:46:33,228:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-07-02 01:46:33,229:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-02 01:46:33,231:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-02 01:46:33,712:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-02 01:46:33,712:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:46:33 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "4yEtmMHCYcY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-02 01:46:33,713:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-02 01:46:38,472:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8117_key-certbot.pem 2024-07-02 01:46:43,912:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8115_csr-certbot.pem 2024-07-02 01:46:43,913:DEBUG:acme.client:Requesting fresh nonce 2024-07-02 01:46:43,913:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-02 01:46:44,076:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-02 01:46:44,077:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:46:43 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0y0jo58dffnEOhzrsy-lbaB0JDh7IYQYGnSZGTIJOIA8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-02 01:46:44,077:DEBUG:acme.client:Storing nonce: jqVAJFJ0y0jo58dffnEOhzrsy-lbaB0JDh7IYQYGnSZGTIJOIA8 2024-07-02 01:46:44,078:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-07-02 01:46:44,084:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjB5MGpvNThkZmZuRU9oenJzeS1sYmFCMEpEaDdJWVFZR25TWkdUSUpPSUE4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "MQoHfSTwGBaDKKNg7wsmkraaizzcpVyfYre9kD_1yolXmGjVThPvV6DKM3fvWOqQAiMDRW9bu87kUMyllcavH-UiEZKgKrDsCZ4YlVzT_d9QZytjSLepVBAygvcBUfpXtP3ZZ8sIc3aO1ytXDmT9vC-VrXbgXqpQ_3yzoKkkk_-2SA92PlOcrnMXKdPvQrGNcTOu-LWJ3iC9oQVphQL1BndXcWZdJ7YSHyMMZph6BuyEskLt2KPYBkfB7nmfpZLLHHGadtXC_PC4uRmLuvZeTzBz-jS4HjgeNa-WnZLXiBKZy0huUasEjW5B8GzFQpH-vKgzLu6ruU2f5bHvA2Ys4Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-02 01:46:44,272:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-02 01:46:44,273:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 01 Jul 2024 23:46:43 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824603047 Replay-Nonce: qqMiT6Cke76lBK85USfaS8YXRecY7I2mhKPzhn2db8CPf-KoB3o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:53Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986156647" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824603047" } 2024-07-02 01:46:44,273:DEBUG:acme.client:Storing nonce: qqMiT6Cke76lBK85USfaS8YXRecY7I2mhKPzhn2db8CPf-KoB3o 2024-07-02 01:46:44,274:DEBUG:acme.client:JWS payload: b'' 2024-07-02 01:46:44,281:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986156647: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tlNzZsQks4NVVTZmFTOFlYUmVjWTdJMm1oS1B6aG4yZGI4Q1BmLUtvQjNvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYxNTY2NDcifQ", "signature": "xDSW-vqlCQ59F6zCY6cca_rnAKw37xytZbjPozPE-BrrD7GRJUSxTOaQDs_D28ahzI2zZC6-EL51Qbmy4ziYF1SCOIaKh-hAdqcSr-xuBKnOO5VFBFZilak7V12Os9NZLlZ9ablA2SpC7TcauT1XnvXblgTfNrqEku7Cv3a0FrFP27jDGsXAdLoO5B7pCqZrtZlugpS-UeT5wic-gyHDrVthbpmMLxQ6uWTwc2wHGQ_DvmbQItHv0CjBJ8zN90FgqU4GLkATxmtILFUgbs1DbS-3-j_OLWO86CJato6olNaVz7seifpA1i8HZXVWSLKexPT2bTxQklL_4FXvlGTpXQ", "payload": "" } 2024-07-02 01:46:44,447:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986156647 HTTP/1.1" 200 805 2024-07-02 01:46:44,448:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 01 Jul 2024 23:46:43 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0Vs0ACBikC9TXOiJn1bi5o6-8PuTqCTQsrdOHt-C3I2k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:53Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/B3rfNg", "status": "pending", "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/ZEHm3Q", "status": "pending", "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/xivawQ", "status": "pending", "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk" } ] } 2024-07-02 01:46:44,448:DEBUG:acme.client:Storing nonce: jqVAJFJ0Vs0ACBikC9TXOiJn1bi5o6-8PuTqCTQsrdOHt-C3I2k 2024-07-02 01:46:44,449:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-02 01:46:44,449:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-07-02 01:46:44,450:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-02 01:46:44,450:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-02 01:46:44,452:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 01:46:44,452:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-02 01:46:44,452:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-02 01:46:44,453:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-02 01:46:44,455:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-02 01:46:44,455:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-07-02 01:46:44,455:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-07-02 01:46:44,458:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-07-02 01:46:44,460:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)