2024-06-27 22:36:41,651:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-06-27 22:36:41,651:DEBUG:certbot._internal.main:Arguments: [] 2024-06-27 22:36:41,652:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-06-27 22:36:42,533:DEBUG:certbot._internal.log:Root logging level set at 20 2024-06-27 22:36:42,534:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-06-27 22:36:42,575:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-06-27 22:36:42,616:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 22:36:42,821:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 22:36:42,823:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2024-06-27 22:36:42,828:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2024-06-27 22:36:42,837:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:12 UTC. 2024-06-27 22:36:42,838:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 22:36:42,838:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 22:36:42,844:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-27 22:36:42,845:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-27 22:36:42,845:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-27 22:36:42,851:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-27 22:36:42,852:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-27 22:36:42,854:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-27 22:36:43,363:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-27 22:36:43,364:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:36:42 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "A5pwhIEB_nE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-27 22:36:43,364:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-27 22:36:48,682:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7988_key-certbot.pem 2024-06-27 22:36:53,495:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7986_csr-certbot.pem 2024-06-27 22:36:53,496:DEBUG:acme.client:Requesting fresh nonce 2024-06-27 22:36:53,496:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-27 22:36:53,658:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-27 22:36:53,659:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:36:52 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6CkEHKP-U8XT26g5VMLIXyZFMnk-kWgJ7IxNJPP2rx9TYo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-27 22:36:53,659:DEBUG:acme.client:Storing nonce: qqMiT6CkEHKP-U8XT26g5VMLIXyZFMnk-kWgJ7IxNJPP2rx9TYo 2024-06-27 22:36:53,659:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-06-27 22:36:53,665:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tFSEtQLVU4WFQyNmc1Vk1MSVh5WkZNbmsta1dnSjdJeE5KUFAycng5VFlvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Xn5LWsf6_0TYitTbYiY1pcybLTfjPkU26hwWorw6VcDLbwjsdHYCi_QdXlkDVsiNTT0blGimZEvufdW6n1WmYzVG92grYpTWqCoZ971UThgm-2wH9Nk_kk-SogmhyENPvAtCn8ZSDsMy2LpykUSQEsXygePqon-e9XkW8GiGJp63-JgmaJGk5WroUGCko_DRS41ycWUAEemiDFQwfSKz_wUoiCUxjY9oQvQTogiPekMSHUDa-tAzAcsEiBZWkzmMqMzSd6yKRZJICM720SwwGQbvsT87xNn2KxAzG6Avz8qguHqpoInHLzi53mSSr-60BQsrVjpKac4xRXJ-e77Naw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-06-27 22:36:53,835:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-06-27 22:36:53,836:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 20:36:52 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824128037 Replay-Nonce: jqVAJFJ0DPN26W2Buc1sF5avqo0r-YElcm-TsuIG65yXDYgHl8A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:00:50Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985446737" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824128037" } 2024-06-27 22:36:53,836:DEBUG:acme.client:Storing nonce: jqVAJFJ0DPN26W2Buc1sF5avqo0r-YElcm-TsuIG65yXDYgHl8A 2024-06-27 22:36:53,837:DEBUG:acme.client:JWS payload: b'' 2024-06-27 22:36:53,843:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985446737: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBEUE4yNlcyQnVjMXNGNWF2cW8wci1ZRWxjbS1Uc3VJRzY1eVhEWWdIbDhBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU0NDY3MzcifQ", "signature": "GPMo2K1T9gOvChmWQleMls3Ia2SQPwrO6j53K-DL1rFLKHVZ89fNI5k-fBQpzw13wdJjFw0Wqpt_kbHDReSiFa_jfm6ap3krs8xEH-aNgIx8JQ-3Jnkf00iWep_cAkU5c5BPmlvN-VBiR1LnQ-wxQM0vDp0EAtCCV5sOTAS-LTzCC6JZn7ny7vH1R8qUkYFSCSv1JgJACHRx3XCFT6VQJLGCOC1WR75j_lwzTqmVTPVB1dppuWrhB3YXLv2B1eeha8TakuS_BS2yAfdmndgMg-IU79qR4WWP5zY0mK7bbMvmiP9Cajtsxm429Dg7fhI0j72ofiDSzOcF8HXQiTzKew", "payload": "" } 2024-06-27 22:36:54,007:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985446737 HTTP/1.1" 200 810 2024-06-27 22:36:54,008:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:36:53 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0qul056ydQ_PTdtqS7I3RPpnWMtYDJyrTl7sZ6dyfhxo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:00:50Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/KAQe7Q", "status": "pending", "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/Sd6_7w", "status": "pending", "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/Ra3-nA", "status": "pending", "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ" } ] } 2024-06-27 22:36:54,008:DEBUG:acme.client:Storing nonce: jqVAJFJ0qul056ydQ_PTdtqS7I3RPpnWMtYDJyrTl7sZ6dyfhxo 2024-06-27 22:36:54,009:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-27 22:36:54,009:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-06-27 22:36:54,009:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-27 22:36:54,010:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-27 22:36:54,023:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 22:36:54,024:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-27 22:36:54,024:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-27 22:36:54,024:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-27 22:36:54,030:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 22:36:54,072:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 22:36:54,281:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 22:36:54,282:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-27 22:36:54,283:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-27 22:36:54,289:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:26 UTC. 2024-06-27 22:36:54,289:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 22:36:54,290:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 22:36:54,295:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-27 22:36:54,295:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-27 22:36:54,295:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-27 22:36:54,298:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-27 22:36:54,299:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-27 22:36:54,301:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-27 22:36:54,769:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-27 22:36:54,769:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:36:53 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Ve0cappgjSM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-27 22:36:54,770:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-27 22:36:59,255:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7989_key-certbot.pem 2024-06-27 22:37:03,524:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7987_csr-certbot.pem 2024-06-27 22:37:03,524:DEBUG:acme.client:Requesting fresh nonce 2024-06-27 22:37:03,524:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-27 22:37:03,681:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-27 22:37:03,682:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:37:02 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0VGdKd6HnBSJ2SS1UUT0KSxyMb8zwsTEy2jzb2PngvJI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-27 22:37:03,682:DEBUG:acme.client:Storing nonce: jqVAJFJ0VGdKd6HnBSJ2SS1UUT0KSxyMb8zwsTEy2jzb2PngvJI 2024-06-27 22:37:03,682:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-06-27 22:37:03,688:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBWR2RLZDZIbkJTSjJTUzFVVVQwS1N4eU1iOHp3c1RFeTJqemIyUG5ndkpJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "dXqeng-0Wrz44cyM1uuRlNv8wuSGXTulUm30EI8JqjmRy49o8QVU1Z83sfSt2M7T_7p4cyr8IO2-225SkyT4TMOFGocmf-IPadIz5REHyFpayKzpJK6TEye-QVkG7jpMen2Wh0B5WlIiKth3ZNjTM4169YjrAJGLWMCNOdByh6qLVNTplJFyof2CkiSmUMBBpKSo_lrpAVUr6ivq4rwEKRrHxWXLVK9BC49Zk24weOxAemDM_lIonXigjBq_6ukI9hLuwWhRfK-mXftwQIcxsapMLqmLoFRXwuFPa51vRBRIPYSVgjzV161rAOEw4_WS3JcuIZBteCnM-L4ubYwkzA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-06-27 22:37:03,859:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-06-27 22:37:03,860:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 20:37:02 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824165847 Replay-Nonce: qqMiT6Ck5Ky56rGDAwpyzkws5UG_c7TcPIsHPFGYMaL-M56xlrg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:01Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985503087" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824165847" } 2024-06-27 22:37:03,860:DEBUG:acme.client:Storing nonce: qqMiT6Ck5Ky56rGDAwpyzkws5UG_c7TcPIsHPFGYMaL-M56xlrg 2024-06-27 22:37:03,860:DEBUG:acme.client:JWS payload: b'' 2024-06-27 22:37:03,867:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985503087: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2s1S3k1NnJHREF3cHl6a3dzNVVHX2M3VGNQSXNIUEZHWU1hTC1NNTZ4bHJnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU1MDMwODcifQ", "signature": "ISM7DnBmlFrYKUQbE-65uoniBZMIhI4ecyX_2wAfk8W_ZgZQkvjo7M6TgkoZZvbepdbvrLaKoOYMUj3Qs9LXotw23YSPSjvgo2L8qql6ZhyLg9zlPbNux9rjTK9PI31FiG_w68gBM0V-XNQlLrM3kpWssYRe_S7s4ADR9PvjCWUk8z5222sueWRciFT5EeqDzDfUx-0u49mriKW1yZY0H-sTq8vxrSi4Qp1zqScyORgoF1YzvBBKha-hiBzFlnRPJBXUN0Oee_awszSaVZ7puUBL0emfTDMJms-PNUeff3rYBZRCx-mMjMXLBikcLL4OkjWheV5m09tB0mAA6pcCjw", "payload": "" } 2024-06-27 22:37:04,029:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985503087 HTTP/1.1" 200 804 2024-06-27 22:37:04,030:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:37:03 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0aXITrwpoA-bCd4TmzvkdHMyqn7DDLTR_Q1LvlWrMxQo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:01Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/6TW65g", "status": "pending", "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/HbqBvA", "status": "pending", "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/f36r8w", "status": "pending", "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ" } ] } 2024-06-27 22:37:04,030:DEBUG:acme.client:Storing nonce: jqVAJFJ0aXITrwpoA-bCd4TmzvkdHMyqn7DDLTR_Q1LvlWrMxQo 2024-06-27 22:37:04,030:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-27 22:37:04,031:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-06-27 22:37:04,031:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-27 22:37:04,031:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-27 22:37:04,038:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 22:37:04,038:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-27 22:37:04,038:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-27 22:37:04,038:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-27 22:37:04,039:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 22:37:04,090:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 22:37:04,283:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 22:37:04,285:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-06-27 22:37:04,287:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-06-27 22:37:04,295:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:40 UTC. 2024-06-27 22:37:04,296:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 22:37:04,296:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 22:37:04,301:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-27 22:37:04,301:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-27 22:37:04,301:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-27 22:37:04,306:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-27 22:37:04,306:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-27 22:37:04,309:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-27 22:37:04,758:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-27 22:37:04,758:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:37:03 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "eMA4wMqzouQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-27 22:37:04,759:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-27 22:37:09,213:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7990_key-certbot.pem 2024-06-27 22:37:13,466:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7988_csr-certbot.pem 2024-06-27 22:37:13,467:DEBUG:acme.client:Requesting fresh nonce 2024-06-27 22:37:13,467:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-27 22:37:13,617:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-27 22:37:13,617:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:37:12 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ93y4tNbK7aQEjO9wOXWW_8YG1DCFT0CjSRPJ0jvMyPuk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-27 22:37:13,618:DEBUG:acme.client:Storing nonce: eF-2qMJ93y4tNbK7aQEjO9wOXWW_8YG1DCFT0CjSRPJ0jvMyPuk 2024-06-27 22:37:13,618:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-06-27 22:37:13,624:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjkzeTR0TmJLN2FRRWpPOXdPWFdXXzhZRzFEQ0ZUMENqU1JQSjBqdk15UHVrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "LvPfYDVIVUWpv4Idn2uYos2kxT3Q493HOxliNUilFlq3GSoMcqjn9IF1HFfD_lNz7qSk7ASqu88q1mBLGY8spMnmYIOYsOx9WAFrBeoHcRpUuAnPaDq9sjXlTu5WcO8k7904V1gpMboJmwSZKAnQJoftnCMzlvEOL-crN_tjOLS-ZMWvaEGmBCJ4h6NXJXpF7dv8X6bkUUUFmjFAEVAUiMoxPV4S4SbfLixKDEETHyg-aDkHOJKBd28ahTUAtIgMZYXoAm8gGGglMQ6ifHi0dmetzunmn5dmWjN960mYh9guWvUymYxUY4tEPNYKGbKBEO2-Z1YxHVBlsovextoXDg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-06-27 22:37:13,788:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-06-27 22:37:13,788:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 20:37:12 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824216467 Replay-Nonce: B-hK_YLCRj51N8Ogr4buDEVCcLEX_i_iQ0WoxDs8Bmp-Fs1GUx0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:11Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985574177" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824216467" } 2024-06-27 22:37:13,789:DEBUG:acme.client:Storing nonce: B-hK_YLCRj51N8Ogr4buDEVCcLEX_i_iQ0WoxDs8Bmp-Fs1GUx0 2024-06-27 22:37:13,789:DEBUG:acme.client:JWS payload: b'' 2024-06-27 22:37:13,795:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985574177: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENSajUxTjhPZ3I0YnVERVZDY0xFWF9pX2lRMFdveERzOEJtcC1GczFHVXgwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU1NzQxNzcifQ", "signature": "cKKCHwnJORj1L0j6K9tbCfNgy4jCc7-Qxhci0xl8xJlSNTYkZowpd9ELNwH3YqxRmAakFu--rz8ASzYnTFsJOqrcRgXwiyhofLfoOLr6k3UYG3dBkh_CNWfX5QRdcGos04cHymQZD_ZBmBxK-VkJWOKnA2vEaFXAsuiznLXtsnjkb-K7cHjnRgtk3EaNHmWYt1O9p57Yb2uqjyAHc2r9rA5J4-hPjb_DxxZvqoPCpaRsnFKey_Eohcg3Hci_U4sXLuM0oIQeE4uGbJhiXQtAwR1Vr6BWYUeThXlvyaymkQSv7we5278K-GYZIm6F9e6lFZ7QEDpX7yaSHtaoT6vpsQ", "payload": "" } 2024-06-27 22:37:13,961:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985574177 HTTP/1.1" 200 807 2024-06-27 22:37:13,961:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:37:13 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9zTKIv_4F1AElGeJvQLssiUR8hzJJ4jWwK_blX7zRgjo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:11Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/RO51fg", "status": "pending", "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/APGIHQ", "status": "pending", "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/4l4xCQ", "status": "pending", "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs" } ] } 2024-06-27 22:37:13,962:DEBUG:acme.client:Storing nonce: eF-2qMJ9zTKIv_4F1AElGeJvQLssiUR8hzJJ4jWwK_blX7zRgjo 2024-06-27 22:37:13,962:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-27 22:37:13,963:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-06-27 22:37:13,963:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-27 22:37:13,963:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-27 22:37:13,964:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 22:37:13,964:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-27 22:37:13,964:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-27 22:37:13,965:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-27 22:37:13,966:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 22:37:14,020:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 22:37:14,276:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 22:37:14,279:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-27 22:37:14,281:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-27 22:37:14,287:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:54 UTC. 2024-06-27 22:37:14,288:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 22:37:14,288:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 22:37:14,299:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-27 22:37:14,300:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-27 22:37:14,300:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-27 22:37:14,305:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-27 22:37:14,306:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-27 22:37:14,308:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-27 22:37:14,744:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-27 22:37:14,744:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:37:13 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "K1Rad1wyagU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-27 22:37:14,745:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-27 22:37:19,424:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7991_key-certbot.pem 2024-06-27 22:37:23,684:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7989_csr-certbot.pem 2024-06-27 22:37:23,685:DEBUG:acme.client:Requesting fresh nonce 2024-06-27 22:37:23,685:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-27 22:37:23,830:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-27 22:37:23,831:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:37:22 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLC0EdNDmiRDAgVvitGzo8fU5QQdCxFkxPbkJPfilmKlsQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-27 22:37:23,831:DEBUG:acme.client:Storing nonce: B-hK_YLC0EdNDmiRDAgVvitGzo8fU5QQdCxFkxPbkJPfilmKlsQ 2024-06-27 22:37:23,831:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-06-27 22:37:23,838:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTEMwRWRORG1pUkRBZ1Z2aXRHem84ZlU1UVFkQ3hGa3hQYmtKUGZpbG1LbHNRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "kpHzDywRTK5Sik584ilvQk6r3sJ7XxzlLbTlwOW8Yv7G6ep2BgkBzLL-kQZC9n28KEGdK3YrL5qN1mqJtfpiaUAF3dA_wYe8WGaeGtnnnahwjq5OCvc4q04rPDn4igjY4rau5rUy14g8IhfXV8UwpVfzuM6X0srxS9EtDGRPWPLdmsJ24UbZj8DeHMvty2NHpLkC6lD4_mfdqWeiO6RBITL-EuLA0XL6bjPFzKXjnI-_yPt5oSRf-lKP28OXigZQBY-Mtt78nz7jccL-5EZf0uaUsgnXu9xXUlqD-iHgID51ZYjXqlsFIqzi0AbTg8-a4C_8fU-rvytIOkI3x90L6g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-06-27 22:37:23,999:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-06-27 22:37:24,000:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 20:37:23 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824261497 Replay-Nonce: eF-2qMJ9y665mCiEQCgoVwZ2Pc-fWW-xnaSM61VCMSeZumEi-94 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:21Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985640857" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824261497" } 2024-06-27 22:37:24,000:DEBUG:acme.client:Storing nonce: eF-2qMJ9y665mCiEQCgoVwZ2Pc-fWW-xnaSM61VCMSeZumEi-94 2024-06-27 22:37:24,000:DEBUG:acme.client:JWS payload: b'' 2024-06-27 22:37:24,006:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985640857: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjl5NjY1bUNpRVFDZ29Wd1oyUGMtZldXLXhuYVNNNjFWQ01TZVp1bUVpLTk0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU2NDA4NTcifQ", "signature": "secCJ2RhaE89RYqHw6Ieo7FhIEmMeIP1buIpbkxdaoIFRpOjLHH6bhfzSeBaMOL6cHkzzHUgOiNR_EFucvPCuBo3MaqqFtHQnYIx5o4sHcjtFpCh-zQb8QctQYWcMBTSxGTajV7WDboRO-zXkOUi6vVCxalo_-UEV8K3Y69xVL6jyOlFwb7U05rHA_X0Yd5wjdXncP6tFhg6C1muNUSUKHSsw1cfaJumr319u91FNJTPZLnzUi_kVTJ96NEQC67GuUlgsxSLhO0hzYqsfm3nv0Lv8mpvSLmIC9oW36Zb2XbRl9fHsr7ioTuC_SspRwGK13Xa8_BGT5QJeZ4FrPvO6Q", "payload": "" } 2024-06-27 22:37:24,157:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985640857 HTTP/1.1" 200 801 2024-06-27 22:37:24,158:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:37:23 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLCgfOD8pZsnAim93lAcG3nh8d-2zqRz31MZ21aS__tgxs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:21Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/_W_uNw", "status": "pending", "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/1XcAQA", "status": "pending", "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/a1s51Q", "status": "pending", "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs" } ] } 2024-06-27 22:37:24,158:DEBUG:acme.client:Storing nonce: B-hK_YLCgfOD8pZsnAim93lAcG3nh8d-2zqRz31MZ21aS__tgxs 2024-06-27 22:37:24,158:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-27 22:37:24,159:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-06-27 22:37:24,159:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-27 22:37:24,159:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-27 22:37:24,160:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 22:37:24,160:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-27 22:37:24,160:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-27 22:37:24,161:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-27 22:37:24,162:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 22:37:24,214:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 22:37:24,400:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 22:37:24,401:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-27 22:37:24,402:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-27 22:37:24,408:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:09 UTC. 2024-06-27 22:37:24,409:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 22:37:24,409:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 22:37:24,414:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-27 22:37:24,414:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-27 22:37:24,415:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-27 22:37:24,419:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-27 22:37:24,420:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-27 22:37:24,422:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-27 22:37:24,902:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-27 22:37:24,903:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:37:24 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "MuKycqQ2A-k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-27 22:37:24,904:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-27 22:37:29,608:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7992_key-certbot.pem 2024-06-27 22:37:33,875:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7990_csr-certbot.pem 2024-06-27 22:37:33,876:DEBUG:acme.client:Requesting fresh nonce 2024-06-27 22:37:33,876:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-27 22:37:34,036:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-27 22:37:34,037:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:37:33 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0v2YZKTBP1z0urcFEZ0sRBGP-GS-W2OXxp1l0bFvegGQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-27 22:37:34,037:DEBUG:acme.client:Storing nonce: jqVAJFJ0v2YZKTBP1z0urcFEZ0sRBGP-GS-W2OXxp1l0bFvegGQ 2024-06-27 22:37:34,038:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-06-27 22:37:34,044:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjB2MllaS1RCUDF6MHVyY0ZFWjBzUkJHUC1HUy1XMk9YeHAxbDBiRnZlZ0dRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "OZgQlo0B0VjqltkY_F5wOSBYwuWIamJLbIhkDXAYQh0sJi02JaXVpEl6Gb5jF5eqqet7rcuBGNCJCnu8EZKAvVf4FaS3pHrsrPGZg-Lk-VFN8Bt9s0NUzQZkhI7WyCTV_7PBDzc8fpHnNecHNvJ30DM-Pw--I9ixuO7Y9E0BCDqEIPb8v_EKzTT4aideJCPjiFkgfk9CWSlBC14qekow0riJcWUGbh3e2TOoLVMDDAWuF1euimIjImiwKatXpJj6lWeJXfcjc_KAFhKWy-0M6gzOtMCK_DAdAhG47f_1xDa0pFDqqtDUeVggdw4VL9JzI5-ZKGAmRRT9auamoUbFWA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-06-27 22:37:34,224:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-06-27 22:37:34,224:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 20:37:33 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824300277 Replay-Nonce: jqVAJFJ07TNkTE3ZlkGuXs5VtkbZF-QmDf_oEBYiGndSA1oyK6A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:31Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985696127" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824300277" } 2024-06-27 22:37:34,225:DEBUG:acme.client:Storing nonce: jqVAJFJ07TNkTE3ZlkGuXs5VtkbZF-QmDf_oEBYiGndSA1oyK6A 2024-06-27 22:37:34,225:DEBUG:acme.client:JWS payload: b'' 2024-06-27 22:37:34,231:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985696127: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjA3VE5rVEUzWmxrR3VYczVWdGtiWkYtUW1EZl9vRUJZaUduZFNBMW95SzZBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU2OTYxMjcifQ", "signature": "CTT1moolezFyaSf7n4shs7lrK9WS3GuUW-boBLBFkX21jnmAJvG6zjeImm1HB4XuEU70yLGmaXRBQRoCyvCT9UzmhQM_Nhw98pZNddOI32Tp8g25r0L8fqIQ7tUS8a5lK5ALpN7aSY2QsnfRzyucLe_mlAA46ZRanKRld-drGL7H2oJNLjQn_YrTvwth6CVCNCfdN-eUgjyDgIA89Lsy_FoOTrLaDoNHDjj3tX8mXJNUI_sdMYqNE09q6k-v9sN6OOdUKh6G7MUwzy8DudM0jyW_IUko9jOlE6xSNlJxC-gGZ118SNGvc7Eh9hn65y3WOSSxOoRXDWO-6sNDFjr2kw", "payload": "" } 2024-06-27 22:37:34,396:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985696127 HTTP/1.1" 200 805 2024-06-27 22:37:34,397:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:37:33 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0S_lKiSf-5BDVfRAC8o1WICopYXjexjpBlGml2la9poI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:31Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/p3DiTg", "status": "pending", "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/dn4kZw", "status": "pending", "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/A2Vu8Q", "status": "pending", "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU" } ] } 2024-06-27 22:37:34,397:DEBUG:acme.client:Storing nonce: jqVAJFJ0S_lKiSf-5BDVfRAC8o1WICopYXjexjpBlGml2la9poI 2024-06-27 22:37:34,399:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-27 22:37:34,399:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-06-27 22:37:34,400:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-27 22:37:34,400:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-27 22:37:34,401:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 22:37:34,401:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-27 22:37:34,401:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-27 22:37:34,401:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-27 22:37:34,403:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 22:37:34,452:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 22:37:34,810:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 22:37:34,811:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-06-27 22:37:34,812:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-06-27 22:37:34,817:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:26 UTC. 2024-06-27 22:37:34,818:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 22:37:34,818:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 22:37:34,825:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-27 22:37:34,825:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-27 22:37:34,825:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-27 22:37:34,831:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-27 22:37:34,832:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-27 22:37:34,834:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-27 22:37:35,303:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-27 22:37:35,303:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:37:34 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "QINaUKD4dKE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-27 22:37:35,304:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-27 22:37:39,926:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7993_key-certbot.pem 2024-06-27 22:37:44,140:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7991_csr-certbot.pem 2024-06-27 22:37:44,140:DEBUG:acme.client:Requesting fresh nonce 2024-06-27 22:37:44,140:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-27 22:37:44,296:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-27 22:37:44,297:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:37:43 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0vTL8NsasLgEF_2CY59ih9iLt9XZFUyfuUe57BNCr3fk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-27 22:37:44,297:DEBUG:acme.client:Storing nonce: jqVAJFJ0vTL8NsasLgEF_2CY59ih9iLt9XZFUyfuUe57BNCr3fk 2024-06-27 22:37:44,297:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-06-27 22:37:44,303:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjB2VEw4TnNhc0xnRUZfMkNZNTlpaDlpTHQ5WFpGVXlmdVVlNTdCTkNyM2ZrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "vZvizIWl6ge2sW0hPK8tGYNyfLnIpZrkWG_pjIj2P7esDiu4kccp65340LbEMOXINdqPW8fVYEsovg5JUi2vGSAmVGS52cVNhs8684kH0LBjfIfTLsp88eUmmVmKuB6kwdfu6mjzB6jGY44Ir4BqFd5CLI43jGXjPbhoOFoEFd8Z6EWO2gzcwFAFRNqstSxi4pmSBnbA05swhY3Kgwm7DFiG7a9zKmfE7H8lqI5gInHEK4Qj0u4PcB2exmMt0YXcQhruyY7v5jZzzPmQaQgI_YkT7UMeZoFY3DjiRS7aVIfLvOVWg8oWljaCsSggKoZPYnjz8owcEw2vg_AfHKKMbA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-06-27 22:37:44,488:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-06-27 22:37:44,489:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 20:37:43 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824334367 Replay-Nonce: jqVAJFJ0_Ch3nzEgSd-M7XaekedMK3Rcwj0cDmD-KASH-JYC0gY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:41Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985747117" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824334367" } 2024-06-27 22:37:44,489:DEBUG:acme.client:Storing nonce: jqVAJFJ0_Ch3nzEgSd-M7XaekedMK3Rcwj0cDmD-KASH-JYC0gY 2024-06-27 22:37:44,489:DEBUG:acme.client:JWS payload: b'' 2024-06-27 22:37:44,495:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985747117: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBfQ2gzbnpFZ1NkLU03WGFla2VkTUszUmN3ajBjRG1ELUtBU0gtSllDMGdZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU3NDcxMTcifQ", "signature": "R1XbzRrgvB2AbihL7vBQYJ4SfCuS8xoFWVaupSBS2Se4kG0E4mSMHUKg_0DDbGwIiWo0UJSZvWHUcdHkLfDF1xSK6xz9g0Ti7C3QTK8cXodvg0Djbb2YefGPIcj-YNhyEYgSIbrkK_FTKzPDF9tbtaHVgcVmKzhkeQ4q8ErEU4xRroju7HojBb_Btr3M4DV0H4Mm3s07glAL1YZeeXXyh9KVnbkmUhwGoMzzmzdlOPm0scKRrLTb7dxnekgiVptA_sNNlt5DuauOkLRG0h6Bz7VKg4MaeXFlqPMgDCJLVrFzhvKrVn0sgOf1TSAXkw6johlFk77V_9Gml1vch3q5jg", "payload": "" } 2024-06-27 22:37:44,654:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985747117 HTTP/1.1" 200 809 2024-06-27 22:37:44,655:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:37:43 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6CksnMxfDh6zy6cibdVKudFNtF4x0HErEfjJuxNzfAcn7c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:41Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/NIFDhg", "status": "pending", "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/1iYgbg", "status": "pending", "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/elhV3g", "status": "pending", "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY" } ] } 2024-06-27 22:37:44,655:DEBUG:acme.client:Storing nonce: qqMiT6CksnMxfDh6zy6cibdVKudFNtF4x0HErEfjJuxNzfAcn7c 2024-06-27 22:37:44,656:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-27 22:37:44,656:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-06-27 22:37:44,657:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-27 22:37:44,657:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-27 22:37:44,658:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 22:37:44,658:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-27 22:37:44,658:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-27 22:37:44,659:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-27 22:37:44,660:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 22:37:44,707:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 22:37:44,899:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 22:37:44,900:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is signed by the certificate's issuer. 2024-06-27 22:37:44,901:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD 2024-06-27 22:37:44,905:INFO:certbot._internal.renewal:Cert not yet due for renewal 2024-06-27 22:37:44,909:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 22:37:44,959:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 22:37:45,264:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 22:37:45,267:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-27 22:37:45,267:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-27 22:37:45,278:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:40 UTC. 2024-06-27 22:37:45,278:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 22:37:45,278:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 22:37:45,283:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-27 22:37:45,284:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-27 22:37:45,284:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-27 22:37:45,288:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-27 22:37:45,289:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-27 22:37:45,291:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-27 22:37:45,737:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-27 22:37:45,738:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:37:44 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "JzKJodSUIDw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-27 22:37:45,738:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-27 22:37:50,333:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7994_key-certbot.pem 2024-06-27 22:37:54,580:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7992_csr-certbot.pem 2024-06-27 22:37:54,580:DEBUG:acme.client:Requesting fresh nonce 2024-06-27 22:37:54,581:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-27 22:37:54,730:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-27 22:37:54,731:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:37:53 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9-y3wD_cD2Laq2jpiNJ9imktKTeTCFOVs-z3xzfkCbfM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-27 22:37:54,731:DEBUG:acme.client:Storing nonce: eF-2qMJ9-y3wD_cD2Laq2jpiNJ9imktKTeTCFOVs-z3xzfkCbfM 2024-06-27 22:37:54,731:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-06-27 22:37:54,737:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjkteTN3RF9jRDJMYXEyanBpTko5aW1rdEtUZVRDRk9Wcy16M3h6ZmtDYmZNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "A4ud3nEqsJ9iVNILeaYyULQH9eDguid0_BUQM-rR7SAgEHa-F3bcYBy5fTi0a7aKyJEkGA9cFsPt-SZBMxn31kqVA-CNBiBHOnnZGOzYk3CzhzAGtx0mSq1gdS46M8daXHLLvHzlqOYIyra6etpkExucGCLGRF3j7LXUtcB-yPydAFfsVMIi1JRDk60FRRQG7uMu_iFUR4-SO0k27ydSGBm20Qs3u1b1KGCVmKRJAG_BhN3g6nLgWnFOJDSC-U52GHU2fI8dX00-iLomGjBlICVQz77xEGPXzKraeDQkrycQwLL8wIz01o7lVqGFfuN5kEoR9gzxx477xv7Y9Ht6gg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-06-27 22:37:54,896:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-06-27 22:37:54,897:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 20:37:54 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824371297 Replay-Nonce: B-hK_YLC2HYXkEJf41vaKjDGEKB-U3jfMWNqjEawn8qGQx0ioxk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:52Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985803767" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824371297" } 2024-06-27 22:37:54,897:DEBUG:acme.client:Storing nonce: B-hK_YLC2HYXkEJf41vaKjDGEKB-U3jfMWNqjEawn8qGQx0ioxk 2024-06-27 22:37:54,897:DEBUG:acme.client:JWS payload: b'' 2024-06-27 22:37:54,903:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985803767: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTEMySFlYa0VKZjQxdmFLakRHRUtCLVUzamZNV05xakVhd244cUdReDBpb3hrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU4MDM3NjcifQ", "signature": "tB29ntzlnGIjXGKJSeL4anhxSdGIfJRwqjY6slabzcXBtnnKl4whoa7xYVvbk-G-Zdrsuw20A7IEfpugADJno27hsKpzBK0vg__IKYRkDyiXYiHGk60t1DE_sBcNLLPFuVM8THYlacY1MVDE7j1QI4TpfuWwqtMZZ7Ap8yxcR6U9MZrxzyD34rIs_e6fG8xEQYiiF0OBVFbtVYzxu65-iZ4V4GitOp3Ns9TOPElgz3kyCV_DJub0u6hzzGIcszIPGP8ByY6toNn3PqFZzJTWcqIwWF1MJP5qiH6nPDMAkB7U6RNKo2CB3zj74Wvuz4434IcU1pdG-n9ElscqmCv7Zw", "payload": "" } 2024-06-27 22:37:55,056:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985803767 HTTP/1.1" 200 806 2024-06-27 22:37:55,057:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:37:54 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLCeNUqWa0lHOtjyaYbx26iZESjPzuWiAnOxC8Jfp5-Aog X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:52Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/DP175w", "status": "pending", "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/kAzjPg", "status": "pending", "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/-Uec4A", "status": "pending", "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0" } ] } 2024-06-27 22:37:55,057:DEBUG:acme.client:Storing nonce: B-hK_YLCeNUqWa0lHOtjyaYbx26iZESjPzuWiAnOxC8Jfp5-Aog 2024-06-27 22:37:55,058:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-27 22:37:55,058:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-06-27 22:37:55,059:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-27 22:37:55,059:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-27 22:37:55,060:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 22:37:55,060:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-27 22:37:55,060:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-27 22:37:55,061:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-27 22:37:55,062:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 22:37:55,102:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-06-27 22:37:55,102:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 22:37:55,102:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-06-27 22:37:55,109:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-06-27 22:37:55,111:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-06-27 22:37:55,111:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-06-27 22:37:55,111:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-06-27 22:37:55,112:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-06-27 22:37:55,114:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-06-27 22:37:55,154:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 22:37:55,356:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 22:37:55,357:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-27 22:37:55,358:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-27 22:37:55,363:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:58 UTC. 2024-06-27 22:37:55,363:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 22:37:55,364:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 22:37:55,369:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-27 22:37:55,369:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-27 22:37:55,369:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-27 22:37:55,374:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-27 22:37:55,375:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-27 22:37:55,377:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-27 22:37:55,822:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-27 22:37:55,823:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:37:54 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "HQuFRzdH0FE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-27 22:37:55,824:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-27 22:38:00,538:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7995_key-certbot.pem 2024-06-27 22:38:04,802:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7993_csr-certbot.pem 2024-06-27 22:38:04,803:DEBUG:acme.client:Requesting fresh nonce 2024-06-27 22:38:04,803:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-27 22:38:04,958:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-27 22:38:04,958:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:38:04 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLC_ZYDhl5xsiPYYCJWkZLydH_tFkJrNnS1sulsS5IPZA4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-27 22:38:04,959:DEBUG:acme.client:Storing nonce: B-hK_YLC_ZYDhl5xsiPYYCJWkZLydH_tFkJrNnS1sulsS5IPZA4 2024-06-27 22:38:04,959:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-06-27 22:38:04,965:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENfWllEaGw1eHNpUFlZQ0pXa1pMeWRIX3RGa0pyTm5TMXN1bHNTNUlQWkE0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "P2auYqksJg9MzNkwO9ixzwpCLmy15hDqCYe3VFpSkyIYwHSVNGW1sWfiQCu1AZjncDQCqWfu9WiheYXtPfT6bRb-v7Tb_G5rgp9ibeV62GcQKMSryX8Py2KspC5PC33OfmLtvOcqKsgdUePzGMcLwitaCS6IzGZIvGWPJEo3hp8C0djtPSq3iWXRAuCgvg8PjoUoVZPpWpqWmNX7kOiFme7rR6OrdTtAe5AYr2gq2awVk7fNHgXt-L81uUs-pIibtQmdAdnKBldS-XEiGgomzDSR5xUeNa-nsXXQKkwO0cUlU62ypyAQ-giYYrEIxjvYXlpMPtrJrt9C1mmmBNEPSQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-06-27 22:38:05,128:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-06-27 22:38:05,129:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 20:38:04 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824405187 Replay-Nonce: B-hK_YLCNT0qLEYqg-8GubacaW560kjgH2Mzi5boA8C--d7Gjck X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:01Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985856047" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824405187" } 2024-06-27 22:38:05,129:DEBUG:acme.client:Storing nonce: B-hK_YLCNT0qLEYqg-8GubacaW560kjgH2Mzi5boA8C--d7Gjck 2024-06-27 22:38:05,130:DEBUG:acme.client:JWS payload: b'' 2024-06-27 22:38:05,136:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985856047: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENOVDBxTEVZcWctOEd1YmFjYVc1NjBramdIMk16aTVib0E4Qy0tZDdHamNrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU4NTYwNDcifQ", "signature": "VAqOZO8oFEJXa25AsBsMeivOUTSQE0_oYm3hj-2_WcIoLjId-SM7E-5nfsbD6s02scQNNqMlwsxD1h7f7ABVW27mUfNmXTr_ho99qFrAdknNG4Lm2I2gu6csbyOrv458DtZi2V_kRpfiwwkucXho12-g8DrBYTCl-mA1hE3cttfE2JmJICIEeTK76RfeINVIxh7l8QUYRlbiEu7i3pRntDcL2CJOtbqqfufofFd0vWyIMmB1nBC9YRXo01T5IDbWq52-8IKorVrAOlQDb1egm6u3WRyJU6XjacaD1M00Upv5867jSAfUCS-7bcgw31tkIq58neWTAwPuqpdmINf1aw", "payload": "" } 2024-06-27 22:38:05,292:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985856047 HTTP/1.1" 200 811 2024-06-27 22:38:05,293:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:38:04 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLCgvi5r5ddY41C0eSD26QEcQd_GmarD4FvukH22WU8qm4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:01Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/ZygfgQ", "status": "pending", "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/f5kJqg", "status": "pending", "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/OgjqNA", "status": "pending", "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s" } ] } 2024-06-27 22:38:05,293:DEBUG:acme.client:Storing nonce: B-hK_YLCgvi5r5ddY41C0eSD26QEcQd_GmarD4FvukH22WU8qm4 2024-06-27 22:38:05,294:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-27 22:38:05,294:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-06-27 22:38:05,295:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-27 22:38:05,295:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-27 22:38:05,296:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 22:38:05,296:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-27 22:38:05,296:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-27 22:38:05,297:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-27 22:38:05,298:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 22:38:05,340:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 22:38:05,372:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 22:38:05,373:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-27 22:38:05,374:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-27 22:38:05,379:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:15 UTC. 2024-06-27 22:38:05,379:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 22:38:05,380:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 22:38:05,385:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-27 22:38:05,385:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-27 22:38:05,385:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-27 22:38:05,390:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-27 22:38:05,390:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-27 22:38:05,393:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-27 22:38:05,829:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-27 22:38:05,829:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:38:04 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Nak6VxAVcs0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-27 22:38:05,830:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-27 22:38:10,212:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7996_key-certbot.pem 2024-06-27 22:38:14,464:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7994_csr-certbot.pem 2024-06-27 22:38:14,464:DEBUG:acme.client:Requesting fresh nonce 2024-06-27 22:38:14,464:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-27 22:38:14,609:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-27 22:38:14,609:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:38:13 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9orvvEL7DApYgJpBLUhiUadHrR7osY85kTiNxh0hZLMk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-27 22:38:14,610:DEBUG:acme.client:Storing nonce: eF-2qMJ9orvvEL7DApYgJpBLUhiUadHrR7osY85kTiNxh0hZLMk 2024-06-27 22:38:14,610:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-06-27 22:38:14,617:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlvcnZ2RUw3REFwWWdKcEJMVWhpVWFkSHJSN29zWTg1a1RpTnhoMGhaTE1rIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "DtgQFsff-Ueeo0ZXKZTOs-RjAvCqmx06f2qUUVAmlmKaua4zW6KBoY5YTgYaJPfSu7qLJViIGL6EHIFWFhPf6KEXFwyzG8UJuGVJpmjRQeBsFel_PQHcaLt0fed6AmVUG7J8fBGt_3WV2D9qj2cogvI5jWClBZTgdSd3413ALYxMCM31ZusDrTBvGg1O4HIjkVwyGTAgcIt1OyaXvykX_8rC6NtXNWruA4at4IZQhuzH1p4Nx90x-2nPOoLpQr2teJds6Bz_iwBonOonwg1RhXSAgF7FnqAc-s2Ba1-ggJZpTVqFwoZ5HVIZEOzAezpk7E5AQNHc3huMlHZl1B6Cpg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-06-27 22:38:14,772:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-06-27 22:38:14,773:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 20:38:13 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824456717 Replay-Nonce: eF-2qMJ9FmHMHy7AVvjZwWWgCwPv74lfEumrliN82KRsLCwQE1U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:12Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985929937" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824456717" } 2024-06-27 22:38:14,773:DEBUG:acme.client:Storing nonce: eF-2qMJ9FmHMHy7AVvjZwWWgCwPv74lfEumrliN82KRsLCwQE1U 2024-06-27 22:38:14,774:DEBUG:acme.client:JWS payload: b'' 2024-06-27 22:38:14,780:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985929937: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlGbUhNSHk3QVZ2alp3V1dnQ3dQdjc0bGZFdW1ybGlOODJLUnNMQ3dRRTFVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU5Mjk5MzcifQ", "signature": "OGNmswjzifEsWON8_nEWGUd83seUSKCtu0cNrcqg1D4X1DXzEFrK5rmmoeAlcME6zh9NcxhD_gtXG4xqoUf_IiFZRoxmyFmNxkWvfi69KIKawhD9lZ63M0rsamCeYVnSwnViOKkRjQ1HZjyNCfPSs9fw29pO0S4Ez3p_lbl26K4pLdCY3tMXHF9ld6Mw4-s9U-89dmKE_LQ9aLZzeDcB4JF3HsvCzYjhnZBNDBpo7PUQLBj9lc9tM4djh8b5QNPfiXCSZ5xxSEvwXhklZmztu4ur7NIgfksfIYEbjA61mPwllSJpwfKBTNwVx2Ce5ZoOyomEcUU21Ew1-NUzgyl_Ww", "payload": "" } 2024-06-27 22:38:14,931:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985929937 HTTP/1.1" 200 810 2024-06-27 22:38:14,932:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:38:14 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLC8H1aoAptVS4dA_mrRjvrdU5eeeiJD-sljWFfYmwfhoo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:12Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/gXwyeA", "status": "pending", "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/K4XtOg", "status": "pending", "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/NX0yhA", "status": "pending", "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY" } ] } 2024-06-27 22:38:14,932:DEBUG:acme.client:Storing nonce: B-hK_YLC8H1aoAptVS4dA_mrRjvrdU5eeeiJD-sljWFfYmwfhoo 2024-06-27 22:38:14,932:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-27 22:38:14,933:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-06-27 22:38:14,933:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-27 22:38:14,934:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-27 22:38:14,935:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 22:38:14,935:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-27 22:38:14,935:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-27 22:38:14,936:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-27 22:38:14,937:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 22:38:14,987:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 22:38:15,181:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 22:38:15,183:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-06-27 22:38:15,184:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-06-27 22:38:15,189:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:29 UTC. 2024-06-27 22:38:15,189:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 22:38:15,190:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 22:38:15,195:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-27 22:38:15,195:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-27 22:38:15,195:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-27 22:38:15,200:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-27 22:38:15,200:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-27 22:38:15,202:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-27 22:38:15,686:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-27 22:38:15,688:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:38:14 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "qRP4jQhRFug": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-27 22:38:15,689:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-27 22:38:20,202:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7997_key-certbot.pem 2024-06-27 22:38:24,484:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7995_csr-certbot.pem 2024-06-27 22:38:24,485:DEBUG:acme.client:Requesting fresh nonce 2024-06-27 22:38:24,485:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-27 22:38:24,646:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-27 22:38:24,647:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:38:23 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jqVAJFJ0Vbiw3n36rUWLUJCv4AUYp1PE5dhWm5OBOm8L5SC2CLY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-27 22:38:24,647:DEBUG:acme.client:Storing nonce: jqVAJFJ0Vbiw3n36rUWLUJCv4AUYp1PE5dhWm5OBOm8L5SC2CLY 2024-06-27 22:38:24,647:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-06-27 22:38:24,654:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBWYml3M24zNnJVV0xVSkN2NEFVWXAxUEU1ZGhXbTVPQk9tOEw1U0MyQ0xZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "eDIWy-WTlCwAs8HtYJS16rmvNJN4XbweWatBHM8ZN9UoTsABA8nyM-QkS-LSeV27-7hFHMLU7pRUQGoCB0BVj4aQW9UU02uySsE8yBANXA7CtU4b76DVvnXttEmJZFKOWT2pk3qzJ8JbDnrsfV9-35XeA1Sl1ZJXFCGrkQ27LsLjpW4CPns2RbNDNO1-gaeBGnCrdoTRR35ruu0JhnKf7mDod-vi99Keot6bsdG-OqIfdR9sM9bBrv1Am4aNof061jwBeXkjyQLZP5ELS4yNFDb8U4QTabiGwb4DaZ13PLhPUCjGHszRYNWEX-lVriQKC-KrTYYUzz0eiOPQPw92EQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-06-27 22:38:24,826:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-06-27 22:38:24,827:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 20:38:23 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824496987 Replay-Nonce: jqVAJFJ0R9dWPBVdfageMf1aCGPRBmNzYjmyh85S8_Ytn54NOWA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:22Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985989517" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824496987" } 2024-06-27 22:38:24,827:DEBUG:acme.client:Storing nonce: jqVAJFJ0R9dWPBVdfageMf1aCGPRBmNzYjmyh85S8_Ytn54NOWA 2024-06-27 22:38:24,827:DEBUG:acme.client:JWS payload: b'' 2024-06-27 22:38:24,833:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985989517: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBSOWRXUEJWZGZhZ2VNZjFhQ0dQUkJtTnpZam15aDg1UzhfWXRuNTROT1dBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU5ODk1MTcifQ", "signature": "UzeiTVPQCdBUBi1kfRhT9xQECaIUKVWgZYINnzr28fTSmFz7Mo9jXFpVnN0FvrLPVuDbXIvquiJM8ylMLuaBJMZUerJGmjEF1G1kBNaE_050BAxgx6WXLovcr5bR61rp8M8pMg9G1MsDaOtBDlhrrWM3lQdyJwaw7mjBpKPKpn8qV5piLdhAzAQFgwUM-2jazREd84zBWUKKnPcKxJmfHZGWyrUu0J5cS8gHQSZRyojhcxcHrcAGQnHxgZGFtbyIVdmYM8lJGAhjq9JOXrEpvw_1orK5ZZ_Mm1a6WGXCC_N2kWOZ7VfXIfWECP8ZQklBskECDALJg4em-NA8gJhbdQ", "payload": "" } 2024-06-27 22:38:24,999:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985989517 HTTP/1.1" 200 809 2024-06-27 22:38:25,000:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:38:24 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qqMiT6Ck3PXio6kqf-mAN2jU39bxOTSff2TghxeyomIH_IuZR1g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:22Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/ebl14A", "status": "pending", "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/-PFYBw", "status": "pending", "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/LKEO7w", "status": "pending", "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0" } ] } 2024-06-27 22:38:25,001:DEBUG:acme.client:Storing nonce: qqMiT6Ck3PXio6kqf-mAN2jU39bxOTSff2TghxeyomIH_IuZR1g 2024-06-27 22:38:25,002:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-27 22:38:25,003:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-06-27 22:38:25,004:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-27 22:38:25,004:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-27 22:38:25,006:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 22:38:25,006:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-27 22:38:25,007:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-27 22:38:25,007:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-27 22:38:25,009:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 22:38:25,062:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 22:38:25,307:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 22:38:25,309:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-06-27 22:38:25,309:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-06-27 22:38:25,314:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:53 UTC. 2024-06-27 22:38:25,314:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 22:38:25,314:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 22:38:25,319:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-27 22:38:25,320:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-27 22:38:25,320:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-27 22:38:25,324:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-27 22:38:25,325:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-27 22:38:25,327:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-27 22:38:25,776:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-27 22:38:25,776:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:38:24 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "RE9ZBMTB--8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-27 22:38:25,777:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-27 22:38:30,679:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7998_key-certbot.pem 2024-06-27 22:38:35,024:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7996_csr-certbot.pem 2024-06-27 22:38:35,025:DEBUG:acme.client:Requesting fresh nonce 2024-06-27 22:38:35,025:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-27 22:38:35,174:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-27 22:38:35,175:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:38:34 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLCWVYa-harzXuq4qv8-Qb-mL1o8AP8yMUfAIJQfpB1kpk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-27 22:38:35,175:DEBUG:acme.client:Storing nonce: B-hK_YLCWVYa-harzXuq4qv8-Qb-mL1o8AP8yMUfAIJQfpB1kpk 2024-06-27 22:38:35,175:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-06-27 22:38:35,181:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENXVllhLWhhcnpYdXE0cXY4LVFiLW1MMW84QVA4eU1VZkFJSlFmcEIxa3BrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "u-MSqHyh0XU6JyJwPqqJ3lJOp-bJ5tXT_ui5csM0Oe67pa7Fqnxcn-NeIvZzBcu0yfVmiXiMvn8xWe1NCsH17IKqPQOAbhHs_L00_NN5WpLzUt01SlsoI01dg8tWbX9i5G3VeIbOsEtIXnze-Qaj3Gv8X_6SUZeBLCQdsSJhS9pW1wVlmjN-DX4f_npYPThiGBM-zACGsYheVfYeQ8U2Uc_35BdKR5UMj71JUoDXZJv-b4E_66910X20Jf3FIUKlRzM0tV5fDAoXhFXaocOQCh6D5GmgZR_q8M8VuXXvPQwqT763fOONCUpOwPNnLlH9QnMRgy6Rhf6HCl7e-vV6yA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-06-27 22:38:35,346:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-06-27 22:38:35,347:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 20:38:34 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824533727 Replay-Nonce: eF-2qMJ9qDG6MpsIJ3PRa213iJpf6lBdIv_sdQWdBDdLC-To5r4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:32Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986047927" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824533727" } 2024-06-27 22:38:35,347:DEBUG:acme.client:Storing nonce: eF-2qMJ9qDG6MpsIJ3PRa213iJpf6lBdIv_sdQWdBDdLC-To5r4 2024-06-27 22:38:35,347:DEBUG:acme.client:JWS payload: b'' 2024-06-27 22:38:35,353:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986047927: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlxREc2TXBzSUozUFJhMjEzaUpwZjZsQmRJdl9zZFFXZEJEZExDLVRvNXI0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYwNDc5MjcifQ", "signature": "rWNstynws4dbjH9huO3Y66gzA5qoVlI_BvYWRXi1Ec_KKQecHf8AzxXJwRGn4V-R_d-nT8T0zwHeaNtDstoBlBJWqAeXzmjsQMOHLbar2qrc6GmzFXrZ0ES1Wx7GCgXDU28lMEsZiuXtCSIaWR2tSB8yMwPzcMPaPv0nHorLYomqd78pB-sGTTLFJ_4nLnBLArKcZ_wnFgbZTaavhd_qa7gtdFEs8CRAcR-G5TAis82xNYhQJZODED3INvecJkZr7SEeAJ7Z1QWNa1MC_LtoST-L318_WtzjSOnmyazBSpAiiH5yd283gDHLrbgFkED-3R8IwUajRTW2RuJvOEEH0w", "payload": "" } 2024-06-27 22:38:35,508:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986047927 HTTP/1.1" 200 805 2024-06-27 22:38:35,509:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:38:34 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9_DotuDvsitj3jSM3myj3XlpPEPlK9li7_7azr3a-zY4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:32Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/a7aI1Q", "status": "pending", "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/Rqj-2Q", "status": "pending", "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/4mVq6w", "status": "pending", "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0" } ] } 2024-06-27 22:38:35,509:DEBUG:acme.client:Storing nonce: eF-2qMJ9_DotuDvsitj3jSM3myj3XlpPEPlK9li7_7azr3a-zY4 2024-06-27 22:38:35,510:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-27 22:38:35,510:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-06-27 22:38:35,511:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-27 22:38:35,511:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-27 22:38:35,512:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 22:38:35,512:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-27 22:38:35,512:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-27 22:38:35,513:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-27 22:38:35,514:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 22:38:35,566:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 22:38:35,784:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 22:38:35,785:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-27 22:38:35,786:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-27 22:38:35,791:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:19 UTC. 2024-06-27 22:38:35,791:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 22:38:35,791:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 22:38:35,796:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-27 22:38:35,797:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-27 22:38:35,797:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-27 22:38:35,801:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-27 22:38:35,802:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-27 22:38:35,804:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-27 22:38:36,252:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-27 22:38:36,253:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:38:35 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "6IuCrFzL2Xw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-27 22:38:36,254:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-27 22:38:41,006:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7999_key-certbot.pem 2024-06-27 22:38:45,308:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7997_csr-certbot.pem 2024-06-27 22:38:45,309:DEBUG:acme.client:Requesting fresh nonce 2024-06-27 22:38:45,309:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-27 22:38:45,458:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-27 22:38:45,459:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:38:44 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLCGaik5-EebVuVfgDpLkbb57WLzn4oBnLKk4AaXM3SSsU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-27 22:38:45,459:DEBUG:acme.client:Storing nonce: B-hK_YLCGaik5-EebVuVfgDpLkbb57WLzn4oBnLKk4AaXM3SSsU 2024-06-27 22:38:45,459:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-06-27 22:38:45,467:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENHYWlrNS1FZWJWdVZmZ0RwTGtiYjU3V0x6bjRvQm5MS2s0QWFYTTNTU3NVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Irg9vocAaq0dD6VCdzff9wqHv0sKSJ1dixuu2vXGEQCm9k_84smS85jhxmV5Ktj5k6MMtgWL_McGhJVVUtiT9zLREPxb7ktLCb9HB4Vvb9MpNtiLCEu_IiO5aZuItJmlYMOeCsdtCvJFniN5bzMu408HVdWyEojO3vYlQ40iaIkiSlSKxSdYaxWBnl_m4jvC1TUhqp9FsZV_RZs3hIU6-U5SYxH84hkzWi2XklZ1hwsSIE8g6G3g21-75qOGb8BWT8P0xiNpk4lj3cSryGLr8yk8QNh5yGDCRCiskwSS-5zDSNYSeJaEUxYn6SGrZ-kYsPaBeHsekHnM5OL0wq8fdg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-06-27 22:38:45,640:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-06-27 22:38:45,640:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 20:38:44 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824568847 Replay-Nonce: B-hK_YLC73SZbIV69sioKFOCMKfqQDEkNdxe98UvDl-NQdInvww X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:42Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986101167" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824568847" } 2024-06-27 22:38:45,641:DEBUG:acme.client:Storing nonce: B-hK_YLC73SZbIV69sioKFOCMKfqQDEkNdxe98UvDl-NQdInvww 2024-06-27 22:38:45,641:DEBUG:acme.client:JWS payload: b'' 2024-06-27 22:38:45,647:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986101167: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTEM3M1NaYklWNjlzaW9LRk9DTUtmcVFERWtOZHhlOThVdkRsLU5RZEludnd3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYxMDExNjcifQ", "signature": "HEdCx2--WExZjF5NuBK4yW5WYM-81lDKD6HcD63gMYUXg1Osxkq8fqJ6Q7zR8aBcttDvIEUKH6zZaPmoeqlzEufH_NtDVFxGKhl2Uv-YB63pjIEqlrakUA6oE9KFYFdNssejrpASSU4JE3rNY4TyVytVZ9ypuPtmo4YVJdFbBcjI90oN5dY6ADG8sxD_Z6WCPq6PqMtrniaDkFMUi5IuTHLUAkcfKiPGJLXf5LwKnhM-PzaFw6LoWQ2GAkLCDNk0X_lK4qwcpbouIzSNdQuFHx_hUABQlNpFK9NI9ei6N2kQwVme1wso7lZF3oB37FLXU7GnTavqy64zSEKVB5LUaA", "payload": "" } 2024-06-27 22:38:45,800:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986101167 HTTP/1.1" 200 805 2024-06-27 22:38:45,801:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:38:44 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9eMIQs3MGGvLz2pqKf978X1U_QyweGkgflppcDnst_pM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:42Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/nlLFxg", "status": "pending", "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/mOuqMg", "status": "pending", "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/b0ZrJg", "status": "pending", "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q" } ] } 2024-06-27 22:38:45,802:DEBUG:acme.client:Storing nonce: eF-2qMJ9eMIQs3MGGvLz2pqKf978X1U_QyweGkgflppcDnst_pM 2024-06-27 22:38:45,802:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-27 22:38:45,803:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-06-27 22:38:45,803:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-27 22:38:45,803:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-27 22:38:45,804:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 22:38:45,804:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-27 22:38:45,804:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-27 22:38:45,805:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-27 22:38:45,806:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 22:38:45,856:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 22:38:46,046:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 22:38:46,047:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-06-27 22:38:46,047:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-06-27 22:38:46,052:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:37 UTC. 2024-06-27 22:38:46,052:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 22:38:46,052:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 22:38:46,057:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-27 22:38:46,058:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-27 22:38:46,058:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-27 22:38:46,063:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-27 22:38:46,064:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-27 22:38:46,066:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-27 22:38:46,512:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-27 22:38:46,513:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:38:45 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "pifgz_vSqP0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-27 22:38:46,513:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-27 22:38:50,921:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8000_key-certbot.pem 2024-06-27 22:38:55,188:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7998_csr-certbot.pem 2024-06-27 22:38:55,188:DEBUG:acme.client:Requesting fresh nonce 2024-06-27 22:38:55,189:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-27 22:38:55,339:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-27 22:38:55,339:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:38:54 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: eF-2qMJ9mqYtnv3-_2-4ypoc0CZTKNTAD2F84zbeuRbGWzczC7k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-27 22:38:55,339:DEBUG:acme.client:Storing nonce: eF-2qMJ9mqYtnv3-_2-4ypoc0CZTKNTAD2F84zbeuRbGWzczC7k 2024-06-27 22:38:55,340:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-06-27 22:38:55,347:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjltcVl0bnYzLV8yLTR5cG9jMENaVEtOVEFEMkY4NHpiZXVSYkdXemN6QzdrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "bz-ts4Gm6RMVbPjMbkR3KR2U0saQNcrhzkOP6uZ812q7wTtg6j-qZPpQFsO0nwpmGCxXSYCyGhlpmZ_lwhMYzNfwZPUTo9QCbwVIsl9_2iRBPxwlOcUDM17A0OHLROHnMQzm4kEzpgym4NBGApFt-SXLg36RzrcgRk68O4ukH3jHE0d-9rCsHp8la9cKHza_ihIqI8ckJisxCPr9tEgJT7faaVSaBkpLuFhDcDFeDf2Fc1esZqUGmYSyqV2svwE-47k3sim4LnWDh4vMklaO3z-6Bej6--7oDTWIx42ZrL1WQjYeeQYmqwKa4wOD-vKiDYZFW1RbSSPRj7HkIzcewA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-06-27 22:38:55,522:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-06-27 22:38:55,522:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 20:38:54 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824603047 Replay-Nonce: B-hK_YLCVv1tIg7qzvZQuIZhSkr1MOi4aMzYHyGnSvr4EcVUnhE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:53Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986156647" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824603047" } 2024-06-27 22:38:55,523:DEBUG:acme.client:Storing nonce: B-hK_YLCVv1tIg7qzvZQuIZhSkr1MOi4aMzYHyGnSvr4EcVUnhE 2024-06-27 22:38:55,523:DEBUG:acme.client:JWS payload: b'' 2024-06-27 22:38:55,530:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986156647: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENWdjF0SWc3cXp2WlF1SVpoU2tyMU1PaTRhTXpZSHlHblN2cjRFY1ZVbmhFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYxNTY2NDcifQ", "signature": "gGqAGsFd9YONbQ87YrU2USutvZozRAK1C67QyypMKEOKQ28BjdwryP3EBqKLL2O1I0079liZ4WFuGlp7748NIVmqg2KWsiuh3JpHVLxLD8J8pEz0k5Mqw12CFxaXT1NAT4flwVV3u8Z6WMI2b5ugz4kJ8wzvQvY_kZby-2H0bsTaUCpvnuZCmo50lYB5ui6_cTX-ovlrBwZP7p88HVm1qYf-xMMVPXeZb56fZEr7SoK3LIavxCKFGD6W8mWI42PePjyQ14FWqsjnc6LpRZ2RLzGS-Kppufo94tOjOeAobkXxuWu47KnpnjA8YqTJfkjamZKCKF5F5kg1vPETY-oSUA", "payload": "" } 2024-06-27 22:38:55,684:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986156647 HTTP/1.1" 200 805 2024-06-27 22:38:55,685:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 20:38:54 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: B-hK_YLC2acbKJfXl_kdLJLffgoRlkRHbIjJB4S07OVdV7_NE04 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:53Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/B3rfNg", "status": "pending", "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/ZEHm3Q", "status": "pending", "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/xivawQ", "status": "pending", "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk" } ] } 2024-06-27 22:38:55,685:DEBUG:acme.client:Storing nonce: B-hK_YLC2acbKJfXl_kdLJLffgoRlkRHbIjJB4S07OVdV7_NE04 2024-06-27 22:38:55,686:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-27 22:38:55,686:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-06-27 22:38:55,687:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-27 22:38:55,687:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-27 22:38:55,688:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 22:38:55,688:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-27 22:38:55,688:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-27 22:38:55,688:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-27 22:38:55,689:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 22:38:55,690:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-06-27 22:38:55,690:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-06-27 22:38:55,691:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-06-27 22:38:55,691:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)