2024-06-28 00:41:47,829:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-06-28 00:41:47,830:DEBUG:certbot._internal.main:Arguments: [] 2024-06-28 00:41:47,830:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-06-28 00:41:48,756:DEBUG:certbot._internal.log:Root logging level set at 20 2024-06-28 00:41:48,757:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-06-28 00:41:48,799:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-06-28 00:41:48,846:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-28 00:41:49,076:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-28 00:41:49,078:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2024-06-28 00:41:49,082:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2024-06-28 00:41:49,091:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:12 UTC. 2024-06-28 00:41:49,092:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-28 00:41:49,092:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-28 00:41:49,098:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-28 00:41:49,099:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-28 00:41:49,099:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-28 00:41:49,105:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-28 00:41:49,106:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-28 00:41:49,108:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-28 00:41:49,625:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-28 00:41:49,626:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:41:48 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "OvPiJZqHkx8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-28 00:41:49,627:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-28 00:41:56,202:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8001_key-certbot.pem 2024-06-28 00:42:02,531:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7999_csr-certbot.pem 2024-06-28 00:42:02,531:DEBUG:acme.client:Requesting fresh nonce 2024-06-28 00:42:02,532:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-28 00:42:02,692:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-28 00:42:02,693:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:42:01 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6CkfUvT8nhAWY7Rg94OisVChhQ1blmWVg2iDb7N0CNal5U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-28 00:42:02,693:DEBUG:acme.client:Storing nonce: qqMiT6CkfUvT8nhAWY7Rg94OisVChhQ1blmWVg2iDb7N0CNal5U 2024-06-28 00:42:02,693:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-06-28 00:42:02,700:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tmVXZUOG5oQVdZN1JnOTRPaXNWQ2hoUTFibG1XVmcyaURiN04wQ05hbDVVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "GDkrKOaNKgJaQ9gy4b2rfX0xxO8Ln8cOtzsdHMCMHoStx9F5cLuTNHP2pPAlh1pMqk4-zMwIXThT7BsINkTA1k_fKl2vwKzDzuwCahLwBFCb12l16wWbFmjlvQm7GeM7pX9pwm7qiNQ6rZee-imjIDAo1Otzcu2ERMd8lZ0PjuCE3Hs2P27ZSDHigUkRv8Ntrrl6pgJAg4atYpWYeR1OrSuGUSMUqUzy96C3c3csc4aufI0CS-BaeJjmlCebQneAh9vxKLruOxM-63fk40-ARVRDI_Pg-WvZ4OcMyI6OEeWy09tmBd3C32EFAI1t4i1CHtvuvF9JRKrtWn9PdKwJ8g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-06-28 00:42:02,867:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-06-28 00:42:02,868:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 22:42:01 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824128037 Replay-Nonce: jqVAJFJ0PezFG6pPjU4ArIpg7L-qsWugomMJPe29Y2Gv0UO8nuM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:00:50Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985446737" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824128037" } 2024-06-28 00:42:02,868:DEBUG:acme.client:Storing nonce: jqVAJFJ0PezFG6pPjU4ArIpg7L-qsWugomMJPe29Y2Gv0UO8nuM 2024-06-28 00:42:02,868:DEBUG:acme.client:JWS payload: b'' 2024-06-28 00:42:02,875:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985446737: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBQZXpGRzZwUGpVNEFySXBnN0wtcXNXdWdvbU1KUGUyOVkyR3YwVU84bnVNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU0NDY3MzcifQ", "signature": "qfmjJTa1h1hp-j6QM_IYXqz8zgVsyBtARLkwCvkNTICkx43V5a_iF7VwpY3mzffqbUor1BHOi62ZmnBo4Z02RrfTY7MHJRsvUpnWkuT_aaX6paWh--DRg5k_yKc3MxR4jHc5n86W1KvcWIjzvJnzAtFo2EF9iRcyGMn5LscIl3IlyS6gZOwAvt9wb6-dUSID9H-l8jlHDA6O0K-4I3dK6O1MHBSpEgAMrzGqh2eGBpXWJ91ME3FxxZVpcE6gt9YQqIfblUL7qA6zNGTF2E4MjbuvGrgPjKCguM12s74EFiW5NkoEODPDg55TxtQzBLpQgIO6KnKgnbQGuzVMHd8sUA", "payload": "" } 2024-06-28 00:42:03,054:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985446737 HTTP/1.1" 200 810 2024-06-28 00:42:03,055:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:42:02 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6CkOm0qmfnp505GPA2OpVPtSbT8sGmVzSDPQJv79FOydEo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:00:50Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/KAQe7Q", "status": "pending", "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/Sd6_7w", "status": "pending", "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/Ra3-nA", "status": "pending", "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ" } ] } 2024-06-28 00:42:03,055:DEBUG:acme.client:Storing nonce: qqMiT6CkOm0qmfnp505GPA2OpVPtSbT8sGmVzSDPQJv79FOydEo 2024-06-28 00:42:03,056:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-28 00:42:03,056:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-06-28 00:42:03,056:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-28 00:42:03,057:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-28 00:42:03,060:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-28 00:42:03,061:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-28 00:42:03,061:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-28 00:42:03,061:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-28 00:42:03,065:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-28 00:42:03,109:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-28 00:42:03,145:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-28 00:42:03,147:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-28 00:42:03,147:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-28 00:42:03,153:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:26 UTC. 2024-06-28 00:42:03,153:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-28 00:42:03,153:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-28 00:42:03,159:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-28 00:42:03,159:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-28 00:42:03,159:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-28 00:42:03,165:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-28 00:42:03,166:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-28 00:42:03,168:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-28 00:42:03,637:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-28 00:42:03,639:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:42:02 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "uN4rtWSC2TA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-06-28 00:42:03,639:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-28 00:42:08,885:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8002_key-certbot.pem 2024-06-28 00:42:13,804:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8000_csr-certbot.pem 2024-06-28 00:42:13,805:DEBUG:acme.client:Requesting fresh nonce 2024-06-28 00:42:13,805:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-28 00:42:13,962:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-28 00:42:13,963:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:42:13 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ09338XIrlZmk91lZ2nbk9VCNtPvkZumQoEstgK9SUpVc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-28 00:42:13,963:DEBUG:acme.client:Storing nonce: jqVAJFJ09338XIrlZmk91lZ2nbk9VCNtPvkZumQoEstgK9SUpVc 2024-06-28 00:42:13,963:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-06-28 00:42:13,970:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjA5MzM4WElybFptazkxbFoybmJrOVZDTnRQdmtadW1Rb0VzdGdLOVNVcFZjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "cJ8QXu86z-g6zIc9TaJNuLAYTRgzshgEoAIhWc4ztWNZzWcTROt7USGs5W5w-79leefkLqBj9cZq58CMbfntCbXWclRQxu67iGs5uEEHmZEhB_HsQ1Ys0_pPLMhHT4r0SOMQnK37Z2yN9qhgue_LifRMKFmtVFCyfPwT8cDuYTMH3d3uk5EJMRB4J2iMiCgX-BrhD-ItXx3fHaLpVHxSVgnBJKd7coinWv057M2gcg4wkIy0cOOU22wX61SeNzBot94SHA3kRivfq98fJhotbZAoPAB8TDptI3XE13TxroDtaNSvKDo5l6yLhqrQLlYD9N0fhyZXi36dfjSl13pODQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-06-28 00:42:14,143:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-06-28 00:42:14,144:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 22:42:13 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824165847 Replay-Nonce: jqVAJFJ09r6vaqFfoVGBGI851hz1YXujP0x_1yinue3e2G8OS6A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:01Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985503087" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824165847" } 2024-06-28 00:42:14,144:DEBUG:acme.client:Storing nonce: jqVAJFJ09r6vaqFfoVGBGI851hz1YXujP0x_1yinue3e2G8OS6A 2024-06-28 00:42:14,144:DEBUG:acme.client:JWS payload: b'' 2024-06-28 00:42:14,154:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985503087: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjA5cjZ2YXFGZm9WR0JHSTg1MWh6MVlYdWpQMHhfMXlpbnVlM2UyRzhPUzZBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU1MDMwODcifQ", "signature": "JDJdVi2_XIs8Fkvbz9Kf7orJO87wbywParUJ7M3iehG-KymBc3Knc_cPa1LYx4UR9wgsiCF9fDR_3l2JPeSKmwem3TnEqIVjIpMCrH6-y4TKgiTJlHf5cDq7wm0KeIV8y5y4PH7J1wPlQnZ810F3LBukWR-EHgDQ4rd_K7hP6KIxnL5uawE2qBpzcadSwxyZzBDU5tRljpPB5h58J55NRFsgdR08NdgydOf5n2OWeGiTEVGgDujPQ1XKSqk5a317gQ-spPPouRN6eYadzG291yFEAlmRKZzc8g3mGyBOa-FEdxHSRvw8HGCq2NiX1ukbB0ZCHmjgS9eyf_3gxd9Drw", "payload": "" } 2024-06-28 00:42:14,321:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985503087 HTTP/1.1" 200 804 2024-06-28 00:42:14,322:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:42:13 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6CkHouTyfZRJ1RygoF22NRNtmp-xy_seh9Wn7EkQaS7Yhw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:01Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/6TW65g", "status": "pending", "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/HbqBvA", "status": "pending", "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/f36r8w", "status": "pending", "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ" } ] } 2024-06-28 00:42:14,322:DEBUG:acme.client:Storing nonce: qqMiT6CkHouTyfZRJ1RygoF22NRNtmp-xy_seh9Wn7EkQaS7Yhw 2024-06-28 00:42:14,323:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-28 00:42:14,323:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-06-28 00:42:14,324:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-28 00:42:14,324:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-28 00:42:14,325:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-28 00:42:14,326:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-28 00:42:14,326:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-28 00:42:14,326:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-28 00:42:14,327:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-28 00:42:14,384:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-28 00:42:14,405:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-28 00:42:14,406:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-06-28 00:42:14,408:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-06-28 00:42:14,413:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:40 UTC. 2024-06-28 00:42:14,413:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-28 00:42:14,413:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-28 00:42:14,419:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-28 00:42:14,420:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-28 00:42:14,420:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-28 00:42:14,426:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-28 00:42:14,427:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-28 00:42:14,430:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-28 00:42:14,877:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-28 00:42:14,877:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:42:13 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "UX9FShNfBJc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-28 00:42:14,878:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-28 00:42:19,821:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8003_key-certbot.pem 2024-06-28 00:42:24,427:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8001_csr-certbot.pem 2024-06-28 00:42:24,427:DEBUG:acme.client:Requesting fresh nonce 2024-06-28 00:42:24,428:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-28 00:42:24,577:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-28 00:42:24,578:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:42:23 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLCkCkpscX1-1KPHlaB1bK6_JDghlg45eQQoDHYFCUtIzI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-28 00:42:24,578:DEBUG:acme.client:Storing nonce: B-hK_YLCkCkpscX1-1KPHlaB1bK6_JDghlg45eQQoDHYFCUtIzI 2024-06-28 00:42:24,578:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-06-28 00:42:24,584:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENrQ2twc2NYMS0xS1BIbGFCMWJLNl9KRGdobGc0NWVRUW9ESFlGQ1V0SXpJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "NqO78ilq4AY8Nzu0P89EChb3d0QQyUrFyFv_vMzFkLuKHFBQHOrNFYyslZgD1FtDsU1ZS-s0XPJ3dGPzwJ8HQx5QvHodDH1i9yYRNquQOpof3iirWbHc6U386iN7l3ssbwdiaNe0rlgftw6UUCxuVvjtaKrHNqLcQkSCiWFtyj2UeiJg2r3JzKmlqIkUruotImB1am9bEmEFKGgZI41pTpWCaf8Vuu81mVvYEK03pINPFNwhFEXwwGHacCstECzjSc9GyPIFd3i9p62-zXDLV_ExPtfL7KAJilFs6a3Eco8yBUydHHNl3TBh2IGjb-f8QyJAGURhdmpIqO-bUAVYTA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-06-28 00:42:24,808:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-06-28 00:42:24,808:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 22:42:23 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824216467 Replay-Nonce: B-hK_YLClP0E6mpSmBJ5gu_KUoigsqYEvHjq6sIV3I8p8OxIq4A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:11Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985574177" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824216467" } 2024-06-28 00:42:24,809:DEBUG:acme.client:Storing nonce: B-hK_YLClP0E6mpSmBJ5gu_KUoigsqYEvHjq6sIV3I8p8OxIq4A 2024-06-28 00:42:24,809:DEBUG:acme.client:JWS payload: b'' 2024-06-28 00:42:24,815:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985574177: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENsUDBFNm1wU21CSjVndV9LVW9pZ3NxWUV2SGpxNnNJVjNJOHA4T3hJcTRBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU1NzQxNzcifQ", "signature": "VUEoHRmvmQgCeSrmMhDLpdvratw0CsnrVp-QrCj8KhOuYVjEW6TpA_7ZexxR8Aoo90_9BI8LGHGAIKD4Yeox8fQRRVeM-9mHkVgAE4XmU8ZfXJy-Shu62S7FksN93W7pyG_OA3ke9vuU7NOOnkdAoDhjbdb-hEdPoNuVJXRgGmx3vMXYP1j-Qgjd8k553rao3obzNGneXMkaxdxtg2I-qRRK2yRYCvzm3bofUeceF0eYXJYA8JxpNJxSWwWShnzXszoT_yMH3jC1Vj2jIXB6F2tT5XOv28BRvO3t_NLMz8W4t2Mk5W_A0Milv023AzclFfj2nw6U13MOhinzcYbp9g", "payload": "" } 2024-06-28 00:42:24,977:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985574177 HTTP/1.1" 200 807 2024-06-28 00:42:24,978:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:42:24 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLC_FYujhia0d92F5iECrp5Vzg9hxbrRx8jY06KXQtCf_4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:11Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/RO51fg", "status": "pending", "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/APGIHQ", "status": "pending", "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/4l4xCQ", "status": "pending", "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs" } ] } 2024-06-28 00:42:24,978:DEBUG:acme.client:Storing nonce: B-hK_YLC_FYujhia0d92F5iECrp5Vzg9hxbrRx8jY06KXQtCf_4 2024-06-28 00:42:24,979:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-28 00:42:24,979:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-06-28 00:42:24,980:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-28 00:42:24,980:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-28 00:42:24,981:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-28 00:42:24,981:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-28 00:42:24,981:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-28 00:42:24,981:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-28 00:42:24,982:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-28 00:42:25,034:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-28 00:42:25,270:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-28 00:42:25,271:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-28 00:42:25,272:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-28 00:42:25,277:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:54 UTC. 2024-06-28 00:42:25,277:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-28 00:42:25,277:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-28 00:42:25,282:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-28 00:42:25,283:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-28 00:42:25,283:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-28 00:42:25,286:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-28 00:42:25,287:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-28 00:42:25,289:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-28 00:42:25,766:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-28 00:42:25,768:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:42:24 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "dfFasc8Pels": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-28 00:42:25,768:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-28 00:42:30,663:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8004_key-certbot.pem 2024-06-28 00:42:35,408:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8002_csr-certbot.pem 2024-06-28 00:42:35,408:DEBUG:acme.client:Requesting fresh nonce 2024-06-28 00:42:35,409:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-28 00:42:35,566:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-28 00:42:35,567:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:42:34 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6CkSDJfgVypKfwE-yJy9LSMhP0L1kR0uv-3jjbVyCvgQ84 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-28 00:42:35,567:DEBUG:acme.client:Storing nonce: qqMiT6CkSDJfgVypKfwE-yJy9LSMhP0L1kR0uv-3jjbVyCvgQ84 2024-06-28 00:42:35,567:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-06-28 00:42:35,575:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tTREpmZ1Z5cEtmd0UteUp5OUxTTWhQMEwxa1IwdXYtM2pqYlZ5Q3ZnUTg0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "mHdLHO6znqSbhM7vWCS8yUZ3FhoRqZmG4abAJsN5Wb9yXlFjNATfZ_qs5yXj1exsdAefySo9q0wjkE7Gq7RKtzEbUUpdY8uxT0zo0yK5YrHd9brqxNuGE4TN7RTu27WRsTw7Jta_WIJdrVcbPyYVeb_b56h8OFRnh-m2UEEBkkZf94ccAJOii7kCsnGopZCTYM4QCswV6yp4HqRQRVfJRfaf51YHfn_kae_BQ5Mwht8f-EcbHrKV7mTTFcIVOE1OoYCkfHC60CqGuIjzci6-Mmh7juiDzjX0G5pMqgmDq7NAQFXopX8Ofqp_IZF-trLlsqAudbTsKNHQdCQ1jr-QjA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-06-28 00:42:35,746:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-06-28 00:42:35,747:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 22:42:34 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824261497 Replay-Nonce: qqMiT6CkCQRN-6mCv3ex1b4M02o7zXjCYCidon5MJ7fdm6jNUKk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:21Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985640857" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824261497" } 2024-06-28 00:42:35,747:DEBUG:acme.client:Storing nonce: qqMiT6CkCQRN-6mCv3ex1b4M02o7zXjCYCidon5MJ7fdm6jNUKk 2024-06-28 00:42:35,748:DEBUG:acme.client:JWS payload: b'' 2024-06-28 00:42:35,754:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985640857: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tDUVJOLTZtQ3YzZXgxYjRNMDJvN3pYakNZQ2lkb241TUo3ZmRtNmpOVUtrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU2NDA4NTcifQ", "signature": "cgtKOjbRE-4GJRrLl5DDQ7FDlUjDpOwL_ztrixegxNDW3avDerc9sp_RxXlWnDPh73_j3Be8TAm_qJ-z_BPVdIZJ3cHDX9LJJiICmROxB9eH2yiR1SlqnTmOA8agbabucKZ1sLsq6wKSap2CDzPXHjUhkI8xQL_EuQnYcjnVr69GZQfMjQRYBj1ilv3Hc2M7QdcuKTtQ7f1YS03a0Crf03RGKoiNtC4jCTtZp_hcOln1flmkw9rygXs0GS9DB6wRQ1y4l70Kz4NTPTqD02ysNjqs-NIQfZPyv5jEBAAdbdc4UtRw2k-Cct-rdv3oYZWz5QCxeRR6cVgw1PpLxV98LQ", "payload": "" } 2024-06-28 00:42:35,915:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985640857 HTTP/1.1" 200 801 2024-06-28 00:42:35,915:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:42:34 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6CkOVF1lRlNKWtOy178J399rZ4ciHGuN8Dju15DjwJyRv0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:21Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/_W_uNw", "status": "pending", "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/1XcAQA", "status": "pending", "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/a1s51Q", "status": "pending", "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs" } ] } 2024-06-28 00:42:35,916:DEBUG:acme.client:Storing nonce: qqMiT6CkOVF1lRlNKWtOy178J399rZ4ciHGuN8Dju15DjwJyRv0 2024-06-28 00:42:35,916:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-28 00:42:35,916:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-06-28 00:42:35,917:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-28 00:42:35,917:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-28 00:42:35,918:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-28 00:42:35,918:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-28 00:42:35,919:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-28 00:42:35,919:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-28 00:42:35,920:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-28 00:42:35,976:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-28 00:42:36,028:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-28 00:42:36,029:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-28 00:42:36,030:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-28 00:42:36,035:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:09 UTC. 2024-06-28 00:42:36,035:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-28 00:42:36,036:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-28 00:42:36,041:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-28 00:42:36,041:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-28 00:42:36,041:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-28 00:42:36,045:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-28 00:42:36,046:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-28 00:42:36,049:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-28 00:42:36,496:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-28 00:42:36,497:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:42:35 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "G4Eo0nfQ-34": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-28 00:42:36,497:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-28 00:42:41,481:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8005_key-certbot.pem 2024-06-28 00:42:46,028:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8003_csr-certbot.pem 2024-06-28 00:42:46,028:DEBUG:acme.client:Requesting fresh nonce 2024-06-28 00:42:46,029:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-28 00:42:46,178:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-28 00:42:46,179:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:42:45 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9ak6BfkvRAmMj2P5nG2RhYolihe17fvO9kJ8EbnZyXLg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-28 00:42:46,179:DEBUG:acme.client:Storing nonce: eF-2qMJ9ak6BfkvRAmMj2P5nG2RhYolihe17fvO9kJ8EbnZyXLg 2024-06-28 00:42:46,180:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-06-28 00:42:46,187:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlhazZCZmt2UkFtTWoyUDVuRzJSaFlvbGloZTE3ZnZPOWtKOEViblp5WExnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "bDBiRf9qJ2_RsyhMZeF4FkEkpJLK4ZBHHHH5wjtMbydCqeqHn4CSUzTA9wtZNBdqOCQW7qyVq397a0G_E7bcuZxFtZMnkkIeSfusLyq4hcUDOZZS0PcLkT309Myonvd3pdEGJk93AWxWZOjUrlHpRo5i2PRRGPU9MYK6y0TU-Kh9AyMGlHM3JKzY3F0Q0Xh6nEcnFQ6O4PfbJ5Y-rIHNnbFNqWtih_XmwYG_4OF5Ws0M_naZkTfuMXLX_mKuuDX99oBqYEBiSWzNKma_Q68EjjOul-OMVOvVxzy26T8xIIv-l9jdir9650mGiubgmUCetX8rwLOEVkpMxlyNXpcpZw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-06-28 00:42:46,356:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-06-28 00:42:46,357:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 22:42:45 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824300277 Replay-Nonce: eF-2qMJ9SKVGEyGUmOc6N-Ovn6qaWmBsb3Fcb_06XzFHLbU1l5A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:31Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985696127" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824300277" } 2024-06-28 00:42:46,357:DEBUG:acme.client:Storing nonce: eF-2qMJ9SKVGEyGUmOc6N-Ovn6qaWmBsb3Fcb_06XzFHLbU1l5A 2024-06-28 00:42:46,358:DEBUG:acme.client:JWS payload: b'' 2024-06-28 00:42:46,364:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985696127: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlTS1ZHRXlHVW1PYzZOLU92bjZxYVdtQnNiM0ZjYl8wNlh6RkhMYlUxbDVBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU2OTYxMjcifQ", "signature": "rj8DRHgl7I_bgvAuDMoLFCPXgRWxc9_h0NrhYsgfC3JwgkmFGa7owg7RHC-yKcCrJB96A6S4OzaF0K7ZOxvoKi5weM9slUo2nhF-0dFmfhVTuPyldPf6YjYESYgR-Fk1Z4CUU3XiqlF5V6y-Ltc3dbi064HNJgcHL9FVYNcmV498Us16fVpszzRp9j344eufuiQg1X9hN5bRA32tzZsfcKxZnhbfET5RftELsdhho2i-3MBb5iu2YHXT-IGZ95OMFYVY5ik39GGZca3sfRhuJsW25NltnEhbmB3VoEwNG2fSq2vIphq_Opujj6dhxEAjxHzesqCaqXHa3FqA576UNw", "payload": "" } 2024-06-28 00:42:46,518:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985696127 HTTP/1.1" 200 805 2024-06-28 00:42:46,519:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:42:45 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9DAE9J0cuV2yMSgW6-tSfwsOxTtyyW_s4rnvWh7gR2Bk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:31Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/p3DiTg", "status": "pending", "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/dn4kZw", "status": "pending", "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/A2Vu8Q", "status": "pending", "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU" } ] } 2024-06-28 00:42:46,519:DEBUG:acme.client:Storing nonce: eF-2qMJ9DAE9J0cuV2yMSgW6-tSfwsOxTtyyW_s4rnvWh7gR2Bk 2024-06-28 00:42:46,520:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-28 00:42:46,520:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-06-28 00:42:46,521:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-28 00:42:46,521:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-28 00:42:46,522:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-28 00:42:46,522:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-28 00:42:46,522:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-28 00:42:46,523:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-28 00:42:46,524:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-28 00:42:46,576:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-28 00:42:46,790:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-28 00:42:46,791:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-06-28 00:42:46,792:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-06-28 00:42:46,797:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:26 UTC. 2024-06-28 00:42:46,797:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-28 00:42:46,797:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-28 00:42:46,803:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-28 00:42:46,803:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-28 00:42:46,803:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-28 00:42:46,808:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-28 00:42:46,809:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-28 00:42:46,811:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-28 00:42:47,254:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-28 00:42:47,255:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:42:46 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "t04wizR8QRE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-06-28 00:42:47,256:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-28 00:42:51,898:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8006_key-certbot.pem 2024-06-28 00:42:56,487:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8004_csr-certbot.pem 2024-06-28 00:42:56,488:DEBUG:acme.client:Requesting fresh nonce 2024-06-28 00:42:56,488:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-28 00:42:56,637:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-28 00:42:56,638:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:42:55 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ95inbx4cxItvjGyd-qSHooPZPof6BbH338qmCR5Ua0C0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-28 00:42:56,638:DEBUG:acme.client:Storing nonce: eF-2qMJ95inbx4cxItvjGyd-qSHooPZPof6BbH338qmCR5Ua0C0 2024-06-28 00:42:56,638:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-06-28 00:42:56,645:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjk1aW5ieDRjeEl0dmpHeWQtcVNIb29QWlBvZjZCYkgzMzhxbUNSNVVhMEMwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Qtm1g8qdsX-Sz8yNEFCCcSZOkDTkRIstfTCi9mr9fr9Z_ITuqFdLvyCwe9ycs3-B3hsOtRUhEyou23UMCcFFQwp_OfsOJ9MaoFRugMFknMb4IZF9W-Ema1AQ_BHwyMhOWfz73AB8QmGBsAp-34YehV0wNqCRgptq7yIrMo_2pfgRDvsSb8KYiK3nwzQRJR6YsqhpVJ5gMI0F7LomAep1VSIhqYRacTkCZ_wBOrreoh5BbHAQjNrzq2l8IODwxvuzBNWTwblTyrEW6wjZKrQ_pim7ddB6T6xNgkNvoEHFVk7Ow2OjKSwalUBKYGBCbMd62zsn-zwb_gK08Wkjam-iyw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-06-28 00:42:56,807:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-06-28 00:42:56,807:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 22:42:55 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824334367 Replay-Nonce: B-hK_YLCZ9f-7vbNcTzrttSSTvU-z_ZqRS5PHQZ23uZK7OftUdA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:41Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985747117" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824334367" } 2024-06-28 00:42:56,807:DEBUG:acme.client:Storing nonce: B-hK_YLCZ9f-7vbNcTzrttSSTvU-z_ZqRS5PHQZ23uZK7OftUdA 2024-06-28 00:42:56,808:DEBUG:acme.client:JWS payload: b'' 2024-06-28 00:42:56,813:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985747117: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENaOWYtN3ZiTmNUenJ0dFNTVHZVLXpfWnFSUzVQSFFaMjN1Wks3T2Z0VWRBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU3NDcxMTcifQ", "signature": "muHXhCeo-pIENsyMg-qlN7Jt7UKXjFDJUpUR9dAL5fBzDbOq1C1tB2Be5i-CuWZQ4ficQuQ2xj2skKzskZJq-cQCrnhIEzJCWBY7-xUKjc2zF9Ws7mnNPXiD2XGOYEWSzT1cTpzoSg8E8yep0qblOusPfDRxQXeWQA8tHJxNcF5MudjHAKeZSMDe1EaO2X7ZpvJn-57a6P5lgU41_OmyFSWuciyMCbaef2Pi0BmtSYbTQZT4ZVo4fq5ltkDljsy5ku3CPAkqhaGtuGcrJ5PzoFnQxcSqB3OSNkZrXMyhhxgTbgMUBoB0AFImQkvgXWuA8XLmXmG3HBd-WbrUXPrsuA", "payload": "" } 2024-06-28 00:42:56,979:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985747117 HTTP/1.1" 200 809 2024-06-28 00:42:56,980:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:42:56 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9rjyv-1h4ssI2PDouqBMpaiQRgTJjSJd9wVGEALR6rrQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:41Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/NIFDhg", "status": "pending", "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/1iYgbg", "status": "pending", "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/elhV3g", "status": "pending", "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY" } ] } 2024-06-28 00:42:56,980:DEBUG:acme.client:Storing nonce: eF-2qMJ9rjyv-1h4ssI2PDouqBMpaiQRgTJjSJd9wVGEALR6rrQ 2024-06-28 00:42:56,981:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-28 00:42:56,982:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-06-28 00:42:56,982:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-28 00:42:56,982:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-28 00:42:56,983:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-28 00:42:56,983:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-28 00:42:56,984:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-28 00:42:56,984:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-28 00:42:56,985:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-28 00:42:57,024:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-28 00:42:57,082:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-28 00:42:57,083:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is signed by the certificate's issuer. 2024-06-28 00:42:57,084:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD 2024-06-28 00:42:57,089:INFO:certbot._internal.renewal:Cert not yet due for renewal 2024-06-28 00:42:57,093:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-28 00:42:57,141:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-28 00:42:57,197:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-28 00:42:57,198:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-28 00:42:57,199:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-28 00:42:57,205:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:40 UTC. 2024-06-28 00:42:57,205:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-28 00:42:57,206:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-28 00:42:57,212:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-28 00:42:57,212:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-28 00:42:57,212:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-28 00:42:57,218:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-28 00:42:57,219:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-28 00:42:57,221:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-28 00:42:57,670:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-28 00:42:57,670:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:42:56 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "y8YpqHkWx74": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-06-28 00:42:57,671:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-28 00:43:02,472:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8007_key-certbot.pem 2024-06-28 00:43:07,216:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8005_csr-certbot.pem 2024-06-28 00:43:07,216:DEBUG:acme.client:Requesting fresh nonce 2024-06-28 00:43:07,217:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-28 00:43:07,368:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-28 00:43:07,369:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:43:06 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLCBaZlcOfuF3bk9eKcEmYZMYU1yBX-MGPWNGOvddJ-7pc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-28 00:43:07,369:DEBUG:acme.client:Storing nonce: B-hK_YLCBaZlcOfuF3bk9eKcEmYZMYU1yBX-MGPWNGOvddJ-7pc 2024-06-28 00:43:07,369:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-06-28 00:43:07,376:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENCYVpsY09mdUYzYms5ZUtjRW1ZWk1ZVTF5QlgtTUdQV05HT3ZkZEotN3BjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "AuQjng6aEtMYyuEUwcWxb6AFQT9pYEsAoZIgWeJN4c_NZTQj2QcBelQJTZTzem3ugQ6aVwm03j_1_uX-ygMyRxhwZSGST908bW_gQNnlfOuuoGHmIW32vQ051bkT7XSw3WV3VN73U1z6Tkf5CsRNIvHjFhPTISfICzLO4-MVJMASS27u4FkGeSDwRApenF4pDjBowIRZPe0j8WWE7A4kkeykTdIFdXE70I7NI9M3oZdd_wSc1gRtwhsAu8EIy-GHBftOougfaemsiN2lXYewJWWAqlWPMYoXn38SSI7Sb2ie0SBns6LrHcd_0OV6Es9OnduunQ0i-N3S3hyenMjX3Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-06-28 00:43:07,550:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-06-28 00:43:07,551:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 22:43:06 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824371297 Replay-Nonce: B-hK_YLCziNOL2FR7W2EyIAXPCC6Q1w3DQnTqnIq2q9H8KFLZYQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:52Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985803767" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824371297" } 2024-06-28 00:43:07,551:DEBUG:acme.client:Storing nonce: B-hK_YLCziNOL2FR7W2EyIAXPCC6Q1w3DQnTqnIq2q9H8KFLZYQ 2024-06-28 00:43:07,552:DEBUG:acme.client:JWS payload: b'' 2024-06-28 00:43:07,557:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985803767: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTEN6aU5PTDJGUjdXMkV5SUFYUENDNlExdzNEUW5UcW5JcTJxOUg4S0ZMWllRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU4MDM3NjcifQ", "signature": "V3AfiCSiYbfNdhblHjNKI65DZBdt6nfbl6oH6hPKY-Nr_9cU2__lDNKMk6Qe-CobTQ1o0rEWJufiuFeu_tFYn6GEdIceRZuSt6uxJkeW0ynV3AcaMKVQD4IvNBu2N0DTXlLiGkv_b7dPRNIpMNU1t-9xLOlQX3pOQ868-OLQeQB3-fehyUf3LTmOeRgu5eo_FszhcKUR0egjcS_b6mrv64aF9w5S8T7agBWQmGAy-c8AQOgvydqznZwH1-Vi-GfG62Q3gPtIbsv4oxSsQSwMhzYPT23-X9Pgn3Lrg1_xEw9j-pHiNXbgxHHXogRWB-5XpIH0h7NIL3w8PQ-M2J2IjQ", "payload": "" } 2024-06-28 00:43:07,713:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985803767 HTTP/1.1" 200 806 2024-06-28 00:43:07,714:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:43:06 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9v2l2b7JP82jmZm7QHriwgkpoHWthaJIw7jW7rr34WbA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:52Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/DP175w", "status": "pending", "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/kAzjPg", "status": "pending", "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/-Uec4A", "status": "pending", "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0" } ] } 2024-06-28 00:43:07,714:DEBUG:acme.client:Storing nonce: eF-2qMJ9v2l2b7JP82jmZm7QHriwgkpoHWthaJIw7jW7rr34WbA 2024-06-28 00:43:07,715:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-28 00:43:07,715:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-06-28 00:43:07,716:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-28 00:43:07,716:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-28 00:43:07,717:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-28 00:43:07,717:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-28 00:43:07,717:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-28 00:43:07,717:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-28 00:43:07,719:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-28 00:43:07,768:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-06-28 00:43:07,768:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-28 00:43:07,769:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-06-28 00:43:07,776:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-06-28 00:43:07,778:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-06-28 00:43:07,778:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-06-28 00:43:07,778:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-06-28 00:43:07,779:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-06-28 00:43:07,781:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-06-28 00:43:07,821:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-28 00:43:08,135:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-28 00:43:08,135:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-28 00:43:08,136:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-28 00:43:08,141:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:58 UTC. 2024-06-28 00:43:08,141:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-28 00:43:08,141:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-28 00:43:08,147:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-28 00:43:08,147:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-28 00:43:08,147:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-28 00:43:08,154:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-28 00:43:08,156:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-28 00:43:08,158:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-28 00:43:08,635:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-28 00:43:08,636:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:43:07 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "NaVwJttPWpM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-28 00:43:08,637:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-28 00:43:13,848:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8008_key-certbot.pem 2024-06-28 00:43:18,396:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8006_csr-certbot.pem 2024-06-28 00:43:18,397:DEBUG:acme.client:Requesting fresh nonce 2024-06-28 00:43:18,397:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-28 00:43:18,560:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-28 00:43:18,561:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:43:17 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6CkPxNPzVDvk5CO4aB3ETFEkpuG0RLT6W4rOTjXraHIF1Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-28 00:43:18,561:DEBUG:acme.client:Storing nonce: qqMiT6CkPxNPzVDvk5CO4aB3ETFEkpuG0RLT6W4rOTjXraHIF1Y 2024-06-28 00:43:18,561:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-06-28 00:43:18,567:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tQeE5QelZEdms1Q080YUIzRVRGRWtwdUcwUkxUNlc0ck9UalhyYUhJRjFZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "n48-XN-zqIKA1ifYICF47Y42i_sehL30khZ8mZ9l3O_QdLz4QYZ4_zCUXAnrkzd9T5WpGOm8aX8ILtO2uYo2KCF5n824FxDYvEIABaLZomCjg2X_B6pZKzi-SXQ1TaX_OgT-mS0dHgZxBfKcvMRhCPGjKF7cQWB7JHVXQUs-gf3Jh3NI8jh1Owfne9m5xbe26e_dR62c8799xR2DbklRO-GK1zQwKLjzGhOyQYU2y2a2AiiJDUfTIWCnBzBKX1UiDOHoz8L0eVaO7ZLBLpgQegrXBKpncjwC-sluY-j9q3WxSMAAWs6vY3AExKDonHwt8QrP8-oSSjKyx9t8S5UYew", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-06-28 00:43:18,739:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-06-28 00:43:18,740:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 22:43:17 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824405187 Replay-Nonce: jqVAJFJ0bPfH1Po0n5S9jPNBGtxocvC7tMrhyk6U3iCGXo95scY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:01Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985856047" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824405187" } 2024-06-28 00:43:18,740:DEBUG:acme.client:Storing nonce: jqVAJFJ0bPfH1Po0n5S9jPNBGtxocvC7tMrhyk6U3iCGXo95scY 2024-06-28 00:43:18,740:DEBUG:acme.client:JWS payload: b'' 2024-06-28 00:43:18,746:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985856047: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBiUGZIMVBvMG41UzlqUE5CR3R4b2N2Qzd0TXJoeWs2VTNpQ0dYbzk1c2NZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU4NTYwNDcifQ", "signature": "G-Y1ZhwyJvftvPvtvUTsclb5r-YHlZq-D2W0n14NXwerrMKXA7J4nUQ8QfvvdRlBNegyKgzkqrq7MfiRZAloq1uQ8u7iR8rcfRDqZAcKRygNeNFnnz1UTYhOeZqOqzPf1WqMG43pmDm_K480YkCNid5Z3D31hwXHW5pG66-UdMit8HMU_AO4LIHir9DZkcgbIx2ax1R3qmdiQSDWama7qdD8gCbY710r40uO5l0Knt7dXLiSAUG03bFFZz3Pm3MuKnXyM-G2GzoOrV1ft0ikxNj32Pkba_GSCs3MqUpmyCc15YRwNu8Lnaq3rOwj5kHlOJ02HFHl-lwbCMRr0kEhGw", "payload": "" } 2024-06-28 00:43:18,912:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985856047 HTTP/1.1" 200 811 2024-06-28 00:43:18,913:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:43:17 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0kxz0pf22HS7j1r15sSsvaVgLOEji3XkpvhNnFzsPFWI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:01Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/ZygfgQ", "status": "pending", "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/f5kJqg", "status": "pending", "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/OgjqNA", "status": "pending", "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s" } ] } 2024-06-28 00:43:18,913:DEBUG:acme.client:Storing nonce: jqVAJFJ0kxz0pf22HS7j1r15sSsvaVgLOEji3XkpvhNnFzsPFWI 2024-06-28 00:43:18,913:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-28 00:43:18,914:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-06-28 00:43:18,914:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-28 00:43:18,915:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-28 00:43:18,915:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-28 00:43:18,916:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-28 00:43:18,916:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-28 00:43:18,916:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-28 00:43:18,917:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-28 00:43:18,966:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-28 00:43:19,101:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-28 00:43:19,103:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-28 00:43:19,104:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-28 00:43:19,109:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:15 UTC. 2024-06-28 00:43:19,109:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-28 00:43:19,110:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-28 00:43:19,115:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-28 00:43:19,115:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-28 00:43:19,116:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-28 00:43:19,120:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-28 00:43:19,121:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-28 00:43:19,123:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-28 00:43:19,593:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-28 00:43:19,594:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:43:18 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "T8LPkVu5_Qk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-28 00:43:19,595:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-28 00:43:24,442:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8009_key-certbot.pem 2024-06-28 00:43:29,030:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8007_csr-certbot.pem 2024-06-28 00:43:29,031:DEBUG:acme.client:Requesting fresh nonce 2024-06-28 00:43:29,031:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-28 00:43:29,186:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-28 00:43:29,187:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:43:28 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0J0YU67belBAKxWKNzENOzTmH6-hEL-XC7cnSyuWqgcI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-28 00:43:29,187:DEBUG:acme.client:Storing nonce: jqVAJFJ0J0YU67belBAKxWKNzENOzTmH6-hEL-XC7cnSyuWqgcI 2024-06-28 00:43:29,187:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-06-28 00:43:29,193:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBKMFlVNjdiZWxCQUt4V0tOekVOT3pUbUg2LWhFTC1YQzdjblN5dVdxZ2NJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "mglDAQMhcTZNFId60ulAyPTErXmMLaUwBVXRvHKTtA86NtscAb9gcXJ6TSmi9ldBqAz7TmfZm8nWmP-tsdbJC5q-EtefwQOZMMpJuX0zaI5HLBif-sBXzuarkZO9-9XdxiB8wfifYMG3ZxhFtZ_sIr0zVuOBZCiXwSZEkxDtnRmqFCEL7vQNugNPSi2qMtI67e7Onpj_SGkUhpreYErkha6F1UABQnc7PnQaXVS5d66WEBuFbtxzvrHsm_jV2oPlAAV17YNsMcRN-0EVy-cKpXOL7HgoZx8zCb-fVf2TYhC2ru9tyByW_8E2_vVblM6Svtdkbce0r2xirysdY19kNA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-06-28 00:43:29,360:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-06-28 00:43:29,361:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 22:43:28 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824456717 Replay-Nonce: jqVAJFJ0jPm1bYPA-UBmUpA4KgbjoMS2bkwf8eEZnQZXhSbQ3YY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:12Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985929937" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824456717" } 2024-06-28 00:43:29,361:DEBUG:acme.client:Storing nonce: jqVAJFJ0jPm1bYPA-UBmUpA4KgbjoMS2bkwf8eEZnQZXhSbQ3YY 2024-06-28 00:43:29,361:DEBUG:acme.client:JWS payload: b'' 2024-06-28 00:43:29,367:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985929937: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBqUG0xYllQQS1VQm1VcEE0S2diam9NUzJia3dmOGVFWm5RWlhoU2JRM1lZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU5Mjk5MzcifQ", "signature": "BO5UqB6LM94_m0jzP6XCn6U3zYXDkoUkl00ZrkbailYsVU66-KLmd1KfcUVr60L-qvlOyyM7f7CJ8iFN7zCuYADpJEKcJpm7N41_UkFJw73I6xxL14Qu-tuX0fLx1xb8YltxFc-tEJr7C5qjJLkwY-J_4MDI9m3-in2b9A9ffpSwN_PulX2mbRnUvVhd_Zrd1Ug6yO5aTtm4kJXcyKT0s0QCtN0lODU7tUE34EcG1aFoAN1zt0xfeBnWdIWbJdu_-P2gFcLnsihLF_AykCOFYklDkv9Er2Gk1t9Lxa2dGpCEyPiceZ2PDoK8Q0W3Kiox3RzmOXM2CVRwsNQ6IgIcow", "payload": "" } 2024-06-28 00:43:29,529:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985929937 HTTP/1.1" 200 810 2024-06-28 00:43:29,530:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:43:28 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6CkSl0j6JlCmAwV4vWR_uhadpzcu894MFyfQXtAn05Tiy8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:12Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/gXwyeA", "status": "pending", "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/K4XtOg", "status": "pending", "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/NX0yhA", "status": "pending", "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY" } ] } 2024-06-28 00:43:29,530:DEBUG:acme.client:Storing nonce: qqMiT6CkSl0j6JlCmAwV4vWR_uhadpzcu894MFyfQXtAn05Tiy8 2024-06-28 00:43:29,531:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-28 00:43:29,531:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-06-28 00:43:29,532:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-28 00:43:29,532:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-28 00:43:29,533:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-28 00:43:29,533:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-28 00:43:29,533:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-28 00:43:29,533:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-28 00:43:29,535:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-28 00:43:29,575:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-28 00:43:29,606:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-28 00:43:29,607:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-06-28 00:43:29,608:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-06-28 00:43:29,612:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:29 UTC. 2024-06-28 00:43:29,612:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-28 00:43:29,612:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-28 00:43:29,618:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-28 00:43:29,619:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-28 00:43:29,619:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-28 00:43:29,625:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-28 00:43:29,626:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-28 00:43:29,628:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-28 00:43:30,109:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-28 00:43:30,109:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:43:29 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "svxbLl7msw8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-06-28 00:43:30,110:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-28 00:43:35,008:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8010_key-certbot.pem 2024-06-28 00:43:39,591:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8008_csr-certbot.pem 2024-06-28 00:43:39,592:DEBUG:acme.client:Requesting fresh nonce 2024-06-28 00:43:39,592:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-28 00:43:39,753:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-28 00:43:39,754:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:43:38 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6CkrJr-imUvyUFD2KFm6wqAZ5-Ae-RU82l0l5rAiWHsHbU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-28 00:43:39,754:DEBUG:acme.client:Storing nonce: qqMiT6CkrJr-imUvyUFD2KFm6wqAZ5-Ae-RU82l0l5rAiWHsHbU 2024-06-28 00:43:39,755:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-06-28 00:43:39,761:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tySnItaW1VdnlVRkQyS0ZtNndxQVo1LUFlLVJVODJsMGw1ckFpV0hzSGJVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "dTn20kopP3vFuO5HyAPHDuhgESM9ClcvsGJ1PNbFX0upEtCiKrKbXEJ7V3v4bMhOYuCsrt_W-ZixOOowtJ4tQWKvsja-PqcDNVKtArdKUCpFG2PmNa9TQuF4dq81DbygZuI-kNIsqMCgF8TjKlUzt8B1P16AapnRlV9PVPqwlAMYpEoQonORjCcLMlUWmnAY-p8POK50LMCpktXvO2amRjcTWh-olb_8v7cgBYP3TW5V232GXC1UKvRLi_ZQ0t4o1YY4sZtuBnH266dziNjKdkaia3edAHAKexyPExDJOYsnwoLkfnU5SS-HcUQspHA98fypR9hP-XDOnywA4UDdzQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-06-28 00:43:39,938:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-06-28 00:43:39,938:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 22:43:38 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824496987 Replay-Nonce: qqMiT6CkExZZcxhtrHIHb_Cc0huyKEezCGulFgT1KGyz2wnUqSw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:22Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985989517" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824496987" } 2024-06-28 00:43:39,939:DEBUG:acme.client:Storing nonce: qqMiT6CkExZZcxhtrHIHb_Cc0huyKEezCGulFgT1KGyz2wnUqSw 2024-06-28 00:43:39,939:DEBUG:acme.client:JWS payload: b'' 2024-06-28 00:43:39,946:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985989517: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tFeFpaY3hodHJISUhiX0NjMGh1eUtFZXpDR3VsRmdUMUtHeXoyd25VcVN3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU5ODk1MTcifQ", "signature": "Z8SsSsV1OKUlex94CsD9n7REN3HLu5m1unllTiUTpI9Yv_RQT6WIZ4Wp-6vs8-A1cnKbeMS6POnydt-lQCWpLrFrV2Xn-iOAkoTZD6wUl-lU0eh0l2qeykl8Oh618nawjv3rm06FKDbQ1DEaUSTSYS9xt4OYmmGxQA29LVXleSBlyEXNXLZqZR6jon7w_0G6kh5NTrNYilcDIIpqZ28QMk8JHR36FfTFFBnPPZQGodGWRPQJEJF93DwWPQHK0qW4A-viI_sN7HVW7tXSwtFqW_7DDYpgG0UNuG4a-qQ14FbLmlYRTxc_2lFflyIv7DJlukAdWyUD3N0VEYs_WcE8OA", "payload": "" } 2024-06-28 00:43:40,113:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985989517 HTTP/1.1" 200 809 2024-06-28 00:43:40,113:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:43:39 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0Nsq3-Lgemw4kKoCQHEKUIUvDIDmgQB-_fJ4apm_97ek X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:22Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/ebl14A", "status": "pending", "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/-PFYBw", "status": "pending", "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/LKEO7w", "status": "pending", "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0" } ] } 2024-06-28 00:43:40,114:DEBUG:acme.client:Storing nonce: jqVAJFJ0Nsq3-Lgemw4kKoCQHEKUIUvDIDmgQB-_fJ4apm_97ek 2024-06-28 00:43:40,114:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-28 00:43:40,114:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-06-28 00:43:40,115:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-28 00:43:40,115:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-28 00:43:40,116:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-28 00:43:40,116:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-28 00:43:40,117:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-28 00:43:40,117:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-28 00:43:40,118:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-28 00:43:40,164:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-28 00:43:40,200:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-28 00:43:40,201:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-06-28 00:43:40,202:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-06-28 00:43:40,208:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:53 UTC. 2024-06-28 00:43:40,208:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-28 00:43:40,209:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-28 00:43:40,214:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-28 00:43:40,215:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-28 00:43:40,215:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-28 00:43:40,219:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-28 00:43:40,221:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-28 00:43:40,225:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-28 00:43:40,703:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-28 00:43:40,704:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:43:39 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "pFFP0hhagTU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-28 00:43:40,704:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-28 00:43:45,428:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8011_key-certbot.pem 2024-06-28 00:43:50,181:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8009_csr-certbot.pem 2024-06-28 00:43:50,182:DEBUG:acme.client:Requesting fresh nonce 2024-06-28 00:43:50,182:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-28 00:43:50,342:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-28 00:43:50,343:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:43:49 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6CkibK9dh69KXNpSGFS4CxDdFcB4be_VFEApr1VAhcxMls X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-28 00:43:50,343:DEBUG:acme.client:Storing nonce: qqMiT6CkibK9dh69KXNpSGFS4CxDdFcB4be_VFEApr1VAhcxMls 2024-06-28 00:43:50,343:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-06-28 00:43:50,350:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tpYks5ZGg2OUtYTnBTR0ZTNEN4RGRGY0I0YmVfVkZFQXByMVZBaGN4TWxzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "x8SnL80v2oDhRwzP5Fb1U9I_guTy0HVWJ9Cr4B2BzmDgL3ckyjmB4pN2TGMLwsxw4IBp4ZZN7cFOtmWc19nJe3Mbej79hLso-AYpQDjnGjr5xxWqtYWgRrCVNABRop9HrSShG8l1jj3rEwg-ey5_KxTbbD7Z22LefLzswJriAjtUsGvSLvl4IZ44ABMJl-ElaQVYoL7ytkbE6mujKF1NW-pgzFfc0WbqE6ozRCwOii9S5h86o8lHfi68U3hAL_CA_zwFCU7krHHGe2lfNyAcsS7vF9ENyB52_AgN7AeYbAk1oHncz1zrEycOFuNqr9asvHKj8ooJhZAcy20CPBzHeA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-06-28 00:43:50,526:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-06-28 00:43:50,527:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 22:43:49 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824533727 Replay-Nonce: jqVAJFJ0MVcUQjfq3legxfjmuBqgdNhehkBVjRqGMoy_AKb74JU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:32Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986047927" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824533727" } 2024-06-28 00:43:50,527:DEBUG:acme.client:Storing nonce: jqVAJFJ0MVcUQjfq3legxfjmuBqgdNhehkBVjRqGMoy_AKb74JU 2024-06-28 00:43:50,527:DEBUG:acme.client:JWS payload: b'' 2024-06-28 00:43:50,533:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986047927: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBNVmNVUWpmcTNsZWd4ZmptdUJxZ2ROaGVoa0JWalJxR01veV9BS2I3NEpVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYwNDc5MjcifQ", "signature": "cpun_-WGbyi0yozG5YeC6FdmWSANoC3XSTThXeFEcHgppyqUog0eVqFN9blgIf1MqeZHv1xjfWGiWPqHRp8S91r8YU7Jyq1CR21uSDmi1nxnWMKml-9VVXedsRPG3svEoBp2TY6a_VG3s5hdHmUtetdkZdSLhhSpIhFzxd59K7qeaxx1BDw0bEcfpJd0V1r_UIYYFKiYXiuvFNpXMPClrvaTdd4wTFmLrf4mxm9YrPwWbuB4Grj7gvVhILJuKiT8KFNHiU7mBuW8tMgBXC-azxQlqZDR8JDAhnX6zIICwTKNucUNZINReWap07TldWPVCpwZpGEDnQch5n04HnSUow", "payload": "" } 2024-06-28 00:43:50,697:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986047927 HTTP/1.1" 200 805 2024-06-28 00:43:50,698:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:43:49 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6CkxCwuel08oSWI8Ks3eMlQCmOju8w9_l_lJVQeNOp9Hnw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:32Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/a7aI1Q", "status": "pending", "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/Rqj-2Q", "status": "pending", "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/4mVq6w", "status": "pending", "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0" } ] } 2024-06-28 00:43:50,698:DEBUG:acme.client:Storing nonce: qqMiT6CkxCwuel08oSWI8Ks3eMlQCmOju8w9_l_lJVQeNOp9Hnw 2024-06-28 00:43:50,698:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-28 00:43:50,700:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-06-28 00:43:50,701:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-28 00:43:50,701:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-28 00:43:50,702:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-28 00:43:50,702:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-28 00:43:50,702:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-28 00:43:50,702:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-28 00:43:50,710:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-28 00:43:50,754:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-28 00:43:50,809:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-28 00:43:50,811:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-28 00:43:50,812:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-28 00:43:50,820:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:19 UTC. 2024-06-28 00:43:50,820:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-28 00:43:50,820:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-28 00:43:50,825:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-28 00:43:50,826:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-28 00:43:50,826:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-28 00:43:50,830:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-28 00:43:50,831:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-28 00:43:50,834:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-28 00:43:51,313:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-28 00:43:51,314:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:43:50 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "VViWHsetSFg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-28 00:43:51,314:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-28 00:43:56,189:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8012_key-certbot.pem 2024-06-28 00:44:00,863:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8010_csr-certbot.pem 2024-06-28 00:44:00,864:DEBUG:acme.client:Requesting fresh nonce 2024-06-28 00:44:00,864:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-28 00:44:01,027:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-28 00:44:01,027:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:44:00 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0N57QWgNABN-qXnm7lhOZ63rgqIJKe7a1_i8lnbBTXyg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-28 00:44:01,027:DEBUG:acme.client:Storing nonce: jqVAJFJ0N57QWgNABN-qXnm7lhOZ63rgqIJKe7a1_i8lnbBTXyg 2024-06-28 00:44:01,028:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-06-28 00:44:01,034:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBONTdRV2dOQUJOLXFYbm03bGhPWjYzcmdxSUpLZTdhMV9pOGxuYkJUWHlnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Cc1ca3BVAx1uPgTrlddIy6Q50IHHnXb3ab829-TBb1yvBBuVg4KH6GoOlORf5_yMTCgNsDvwRdJTt4vm_q5Q6X8Zc0ZEK7zzsGZYLAZxqbbYmzF7AiRoHObYd_WB_6S99TtLC2M5re6VTfzZ0jgB9pH7RXuxd12a8oltl9YI-S40mdsMZ4rlTgYgzszWle2NM12qvjGZHJK4k9uUS4w2VYD02XleSRweaXuD2uqDt460LQQZS1sOYruMmqp9WiH391QiktQMI_1B1l5av6zLJpTqPQeZK1WWTlYLo1jNioIS6CEwXeOGi_qpMbhgwi5YAdC0uBmDfYgEr9iFYE4lUQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-06-28 00:44:01,208:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-06-28 00:44:01,209:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 22:44:00 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824568847 Replay-Nonce: jqVAJFJ05isKVNq8KX8VqAVrbGIfMDyiTwB2pcd7Bm6x5HthoIk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:42Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986101167" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824568847" } 2024-06-28 00:44:01,209:DEBUG:acme.client:Storing nonce: jqVAJFJ05isKVNq8KX8VqAVrbGIfMDyiTwB2pcd7Bm6x5HthoIk 2024-06-28 00:44:01,210:DEBUG:acme.client:JWS payload: b'' 2024-06-28 00:44:01,217:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986101167: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjA1aXNLVk5xOEtYOFZxQVZyYkdJZk1EeWlUd0IycGNkN0JtNng1SHRob0lrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYxMDExNjcifQ", "signature": "xwnoqquLFWT1kPFguIYvgHTc5bJiIg3gi_VVseBC4GO4yfp7eNlYqHfZzt-DQ3Oa73rU_x8ZwHcjGu461TErCBtVXvL5MdJP5Jj3QFninVzw9fkxjkj9Lo6wqao5IlxfAOgisfmIWd2T8VEzhHQvS0XVNfvbj-oBB4_WZgQf0va8pEsSFhx6kGQW2gGFcDU5uaFFEkADZH8k0M_7KmJuf-xa0rQlCHRLPH_X792J2zzOWvH5SVKolBZ1q_9t5qBoNJEhOaNFQ0-ot8EiGlC75OZD7HPHDe_Srath7w6BkTqI96VhoH0dTDUEupsUOlExPCx0-6ZWCpX2ze_BndRzCQ", "payload": "" } 2024-06-28 00:44:01,381:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986101167 HTTP/1.1" 200 805 2024-06-28 00:44:01,382:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:44:00 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0hk0pybfT6XoSTYmf2sPzZTiDBRwlWJWglmX5wFXhjhA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:42Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/nlLFxg", "status": "pending", "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/mOuqMg", "status": "pending", "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/b0ZrJg", "status": "pending", "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q" } ] } 2024-06-28 00:44:01,382:DEBUG:acme.client:Storing nonce: jqVAJFJ0hk0pybfT6XoSTYmf2sPzZTiDBRwlWJWglmX5wFXhjhA 2024-06-28 00:44:01,383:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-28 00:44:01,383:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-06-28 00:44:01,384:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-28 00:44:01,384:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-28 00:44:01,385:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-28 00:44:01,385:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-28 00:44:01,385:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-28 00:44:01,386:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-28 00:44:01,387:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-28 00:44:01,438:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-28 00:44:01,483:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-28 00:44:01,484:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-06-28 00:44:01,485:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-06-28 00:44:01,490:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:37 UTC. 2024-06-28 00:44:01,490:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-28 00:44:01,490:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-28 00:44:01,495:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-28 00:44:01,496:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-28 00:44:01,496:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-28 00:44:01,501:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-28 00:44:01,502:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-28 00:44:01,504:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-28 00:44:01,941:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-28 00:44:01,942:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:44:01 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "7xjziagfX9Y": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-28 00:44:01,942:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-28 00:44:06,764:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8013_key-certbot.pem 2024-06-28 00:44:11,304:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8011_csr-certbot.pem 2024-06-28 00:44:11,305:DEBUG:acme.client:Requesting fresh nonce 2024-06-28 00:44:11,305:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-28 00:44:11,451:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-28 00:44:11,451:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:44:10 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9sIQLIuKdLwZQhm1-49z82PLX2ciWmYd0prGYRiuG6cY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-28 00:44:11,452:DEBUG:acme.client:Storing nonce: eF-2qMJ9sIQLIuKdLwZQhm1-49z82PLX2ciWmYd0prGYRiuG6cY 2024-06-28 00:44:11,452:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-06-28 00:44:11,459:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlzSVFMSXVLZEx3WlFobTEtNDl6ODJQTFgyY2lXbVlkMHByR1lSaXVHNmNZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "wtI4iIkGEKPyB_kWq32sXFdaaquvathjT_LAMsrovhHdKxej_J-J7PfAITAe2KvuFfcX4EmlJmWors6YS1FL9wjnMdYNlFlgBE0dxeacFw75--2QJYP2J0b-yC_D1lzlLD0nNFx_eSJcfveBJ0QJz8GlyTqiWPiwdFtgQgLyq4zEfeAySjm0U_VrhURiO1MWsm09_bDnAxhT8AIsLiwK10xJeF8fyGPH-1ACFFWALWJsRZIXqk0H3ntYhANAVm5KGqScdK9RX-TwergvqwUr7PIZmiopnb7B8NhO_2S2FnXg849gBGJXcaEbR7TjfcTEY5HdzoNjAqZt-AsfdJTQKg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-06-28 00:44:11,638:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-06-28 00:44:11,639:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 22:44:10 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824603047 Replay-Nonce: B-hK_YLC1FDBP6enJXfaNT0Qj8pry7BK73GJMFAzkV7OOdowcTA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:53Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986156647" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824603047" } 2024-06-28 00:44:11,639:DEBUG:acme.client:Storing nonce: B-hK_YLC1FDBP6enJXfaNT0Qj8pry7BK73GJMFAzkV7OOdowcTA 2024-06-28 00:44:11,639:DEBUG:acme.client:JWS payload: b'' 2024-06-28 00:44:11,646:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986156647: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTEMxRkRCUDZlbkpYZmFOVDBRajhwcnk3Qks3M0dKTUZBemtWN09PZG93Y1RBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYxNTY2NDcifQ", "signature": "uikXZ7Tnnrn9XmJbP8aSzZmxrIIhY3P8oR-ZfQROFgtn29h2EuqelliBtyaYJnngC3XD2VsOLzMABCZ2fpUqorqZ5aCQ_qF63kPw_oXiuEe2fOS5uQe3ehVmotWSmGZybgqHtvl20d2LpV0wBI5Rsd9NBQZv8Aax8XSxQesML-dp70nP66yklwlFSGDk_K3il7F6xXK9S5phtVZG7NIPQnqNABcx3TGtZcCQ8BH8cR4V44SDOP_yefDHwi2s4iSzQZqE_n1mBvMk8otohdaFOfOvUNQ6jtc7aZzmYv8xWOxyh7y9689Fq-M8H3nayVUyDpakAw3vr06FmzVhBb3Xfw", "payload": "" } 2024-06-28 00:44:11,797:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986156647 HTTP/1.1" 200 805 2024-06-28 00:44:11,798:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 22:44:10 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLCpxZC9w4QqgPnLmVa0MbYeg1ckt5ZrHiBmQvcVokpDko X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:53Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/B3rfNg", "status": "pending", "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/ZEHm3Q", "status": "pending", "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/xivawQ", "status": "pending", "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk" } ] } 2024-06-28 00:44:11,798:DEBUG:acme.client:Storing nonce: B-hK_YLCpxZC9w4QqgPnLmVa0MbYeg1ckt5ZrHiBmQvcVokpDko 2024-06-28 00:44:11,798:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-28 00:44:11,799:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-06-28 00:44:11,799:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-28 00:44:11,800:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-28 00:44:11,800:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-28 00:44:11,800:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-28 00:44:11,801:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-28 00:44:11,801:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-28 00:44:11,802:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-28 00:44:11,802:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-06-28 00:44:11,803:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-06-28 00:44:11,814:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-06-28 00:44:11,816:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)