2024-06-27 06:57:32,715:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-06-27 06:57:32,715:DEBUG:certbot._internal.main:Arguments: [] 2024-06-27 06:57:32,716:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-06-27 06:57:33,551:DEBUG:certbot._internal.log:Root logging level set at 20 2024-06-27 06:57:33,551:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-06-27 06:57:33,589:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-06-27 06:57:33,634:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 06:57:33,875:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 06:57:33,877:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2024-06-27 06:57:33,881:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2024-06-27 06:57:33,889:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:12 UTC. 2024-06-27 06:57:33,889:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 06:57:33,890:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 06:57:33,895:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-27 06:57:33,895:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-27 06:57:33,895:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-27 06:57:33,900:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-27 06:57:33,901:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-27 06:57:33,903:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-27 06:57:34,368:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-27 06:57:34,369:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:57:34 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "yWCp57Ss_ro": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-06-27 06:57:34,371:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-27 06:57:39,878:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7975_key-certbot.pem 2024-06-27 06:57:44,522:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7973_csr-certbot.pem 2024-06-27 06:57:44,522:DEBUG:acme.client:Requesting fresh nonce 2024-06-27 06:57:44,523:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-27 06:57:44,673:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-27 06:57:44,673:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:57:44 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1VRjeNN9XFM4sthSXwcxaAfGPgK-Tqeq8dFZkVhDpbeeTmc1Stg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-27 06:57:44,674:DEBUG:acme.client:Storing nonce: 1VRjeNN9XFM4sthSXwcxaAfGPgK-Tqeq8dFZkVhDpbeeTmc1Stg 2024-06-27 06:57:44,674:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-06-27 06:57:44,680:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVZSamVOTjlYRk00c3RoU1h3Y3hhQWZHUGdLLVRxZXE4ZEZaa1ZoRHBiZWVUbWMxU3RnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "HZUaBGu7gYSwWDw_gw6gNiiIuf4TYRMdyRg2X__D25RTx1ulJZ80J7hGgpx0j_SSQZdArEac9tufM3kX60FVNBOlf8W-2BHUNLIdvMW1EeK69EYxJBEr54kfsTmy5cmnZ6mMoVizsxaxe4Dm6cd458h4mgr7dsh7xeEBho29XcBG-SPuGxhYGaFUyJ_cyIetenI5l1PXdj4uNmIvFxdCBPzS_ZVZHX8jXfGMT_gGz0h9Qobpq1pHNkfq1viZVg4uEVJYI7-KP6PRlelJTXw0FRudP2aEv7AK4sv9pFtJXG4lKaWSlAgHu3zJcjKGx00nYhsgQ0fKkDPiwvLCltLd_Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-06-27 06:57:44,846:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-06-27 06:57:44,847:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 04:57:44 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824128037 Replay-Nonce: lCR6it1ET8ouPdgi508jyu4iwMrFw7JeJZAKIOk-m_OEwWGQd9I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:00:50Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985446737" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824128037" } 2024-06-27 06:57:44,847:DEBUG:acme.client:Storing nonce: lCR6it1ET8ouPdgi508jyu4iwMrFw7JeJZAKIOk-m_OEwWGQd9I 2024-06-27 06:57:44,847:DEBUG:acme.client:JWS payload: b'' 2024-06-27 06:57:44,854:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985446737: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibENSNml0MUVUOG91UGRnaTUwOGp5dTRpd01yRnc3SmVKWkFLSU9rLW1fT0V3V0dRZDlJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU0NDY3MzcifQ", "signature": "XxkWcDlfwnxPpWI0WB0fyRN8i53DD410Xj0pTs-V6SmI-C76VCsyik3H_S4VN2Hok3qlC4GBsqHe381C1PUWnUX0kuMlv_TPiJEuF3aPhtiP3UbF3_iwqhN1PwVnDbUcuJfgp4Wx5iXQGLbNBWqhvv2gpR1CHcdAyRzNTwsfVpUJneT6BMr4LE17gu32oe8wOef3OTzx6QLrw4MZpDTjd4TwRxNp8zbZBWWQKH-nqLfZiha91RLXYqOK7OFYtzJUCbrccWH1JmueXrt_BFH_GB69jrNGknCxHfjL8ck54uh-JyRdS8iOLo19it2qSz89yPjECsxwzRWykh0jwiYfFA", "payload": "" } 2024-06-27 06:57:45,008:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985446737 HTTP/1.1" 200 810 2024-06-27 06:57:45,010:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:57:44 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1VRjeNN9sUk3Pnn7c2-hjQjbp5CdrhBkNTjl_UUQBTgWa7LXEP0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:00:50Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/KAQe7Q", "status": "pending", "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/Sd6_7w", "status": "pending", "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/Ra3-nA", "status": "pending", "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ" } ] } 2024-06-27 06:57:45,010:DEBUG:acme.client:Storing nonce: 1VRjeNN9sUk3Pnn7c2-hjQjbp5CdrhBkNTjl_UUQBTgWa7LXEP0 2024-06-27 06:57:45,012:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-27 06:57:45,012:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-06-27 06:57:45,013:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-27 06:57:45,014:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-27 06:57:45,029:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 06:57:45,029:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-27 06:57:45,029:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-27 06:57:45,030:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-27 06:57:45,035:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 06:57:45,076:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 06:57:45,276:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 06:57:45,278:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-27 06:57:45,279:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-27 06:57:45,284:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:26 UTC. 2024-06-27 06:57:45,284:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 06:57:45,284:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 06:57:45,289:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-27 06:57:45,289:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-27 06:57:45,289:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-27 06:57:45,305:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-27 06:57:45,306:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-27 06:57:45,308:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-27 06:57:45,756:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-27 06:57:45,756:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:57:45 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "BRGxToISFQU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-27 06:57:45,757:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-27 06:57:50,338:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7976_key-certbot.pem 2024-06-27 06:57:54,668:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7974_csr-certbot.pem 2024-06-27 06:57:54,669:DEBUG:acme.client:Requesting fresh nonce 2024-06-27 06:57:54,669:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-27 06:57:54,819:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-27 06:57:54,820:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:57:54 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: lCR6it1Ew8YvuwmeygnEfyIvcC9ff1ZiZFOHelGvftlxhSriYgA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-27 06:57:54,821:DEBUG:acme.client:Storing nonce: lCR6it1Ew8YvuwmeygnEfyIvcC9ff1ZiZFOHelGvftlxhSriYgA 2024-06-27 06:57:54,821:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-06-27 06:57:54,833:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibENSNml0MUV3OFl2dXdtZXlnbkVmeUl2Y0M5ZmYxWmlaRk9IZWxHdmZ0bHhoU3JpWWdBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "JsSCkIwzbfCDTXt3zBLK_rk4SeoRMwqeQ-jnSw7Lx967OmKwJ2VCku_vEnMG8R_QZZ48axDRiWdAqjIfeKzKtzfjSSlJDGAh6j03dOnvw4JOJCSSAqBiYTmz6sDIE6DGgP-0JMStBjZqWrZdElxUhYsa6KgMc4tNMfjExx0sW2RDui0penq8nCYJIIkFY8qthdKlUb6c40wQHUpnpr8F8cx1hDGppHaltIqKoKqK0sD4N85KGciSzVATjd27pmvHkaCbYhCc4C_f625e6VA6E9qjsohfpJwJMmI7o_AowfFv4erGqaotRaG78HeeuO2XKBdGLDu7NeO_s9cykCDHfg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-06-27 06:57:54,997:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-06-27 06:57:54,998:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 04:57:54 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824165847 Replay-Nonce: lCR6it1E5YKC1soZGhFY9IXlmUl_sByMsAg8VmGqnKlYyVjgRKo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:01Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985503087" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824165847" } 2024-06-27 06:57:54,998:DEBUG:acme.client:Storing nonce: lCR6it1E5YKC1soZGhFY9IXlmUl_sByMsAg8VmGqnKlYyVjgRKo 2024-06-27 06:57:54,998:DEBUG:acme.client:JWS payload: b'' 2024-06-27 06:57:55,003:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985503087: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibENSNml0MUU1WUtDMXNvWkdoRlk5SVhsbVVsX3NCeU1zQWc4Vm1HcW5LbFl5VmpnUktvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU1MDMwODcifQ", "signature": "m22Tk5IAARYJTQSlhU6MrdjvOoPM2OCXrZSNcLg31LmtC5zvVDjDRNSfNwn9PhkrKs4i8sTVY5XCBGrgpvMZpmUjZMucrks92JVCnCuvFQ92GxGJhq2OWNTa2ib18IjLmipGfu3b20ADu458ge37Q9Soj9XuhOCv1Oe-CDiItQaVgTVMBTRSmNdr32Mf07HDS2h37FPknYLqrdsk1tYWyFPnjabUBug4io9VTlKxVAFSMew9KBF1M92PS0iUBh66txeSZBFpJdLFtqqAQXCjw_cw5bbB5CngiEYBeh0qbX-_amfqjNYhkr68KAnBV31NnYrD2LyJnwsuTPSvj3s-UQ", "payload": "" } 2024-06-27 06:57:55,160:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985503087 HTTP/1.1" 200 804 2024-06-27 06:57:55,161:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:57:54 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1VRjeNN9RBMGngTmF_tjHzyL_2PKL8RPYLf8PJc-1BvuSGPdmEA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:01Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/6TW65g", "status": "pending", "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/HbqBvA", "status": "pending", "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/f36r8w", "status": "pending", "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ" } ] } 2024-06-27 06:57:55,161:DEBUG:acme.client:Storing nonce: 1VRjeNN9RBMGngTmF_tjHzyL_2PKL8RPYLf8PJc-1BvuSGPdmEA 2024-06-27 06:57:55,162:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-27 06:57:55,162:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-06-27 06:57:55,162:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-27 06:57:55,163:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-27 06:57:55,164:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 06:57:55,164:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-27 06:57:55,164:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-27 06:57:55,164:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-27 06:57:55,166:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 06:57:55,207:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 06:57:55,453:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 06:57:55,454:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-06-27 06:57:55,455:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-06-27 06:57:55,459:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:40 UTC. 2024-06-27 06:57:55,459:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 06:57:55,460:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 06:57:55,465:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-27 06:57:55,465:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-27 06:57:55,465:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-27 06:57:55,480:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-27 06:57:55,481:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-27 06:57:55,483:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-27 06:57:55,962:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-27 06:57:55,963:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:57:55 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "6KoiHsbyEG8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-27 06:57:55,964:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-27 06:58:00,601:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7977_key-certbot.pem 2024-06-27 06:58:04,936:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7975_csr-certbot.pem 2024-06-27 06:58:04,937:DEBUG:acme.client:Requesting fresh nonce 2024-06-27 06:58:04,937:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-27 06:58:05,098:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-27 06:58:05,100:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:58:04 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: WDMSYcqSc75L8HUrk9nHZLE4ThKpLIagy43T__8I6hID3j88IHA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-27 06:58:05,100:DEBUG:acme.client:Storing nonce: WDMSYcqSc75L8HUrk9nHZLE4ThKpLIagy43T__8I6hID3j88IHA 2024-06-27 06:58:05,101:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-06-27 06:58:05,111:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV0RNU1ljcVNjNzVMOEhVcms5bkhaTEU0VGhLcExJYWd5NDNUX184STZoSUQzajg4SUhBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Bb0sZIAgXLboV4OYJw5JSmIKEdmH7wj_ePXITOdJeG2t70yMZ1rFFVzG0OJXdsWKEsRFK-wH_qo49YtzmhUlpSnNgF6Uxs-ZKUWnUkri-EKlZ54ygVaWpBUVbchdFUs8dPSecfaaEHyHSqmh7KoOmUq1v9mOZCW6GSLLC3zTN3-AJaC88peLY83S3FvAbuN9eDddsS8_uYwu3XXnel8IxBpS9XlsH46Dvrx30gmONc-g9VfLT-QpDg0t8e-d1BpXd4LNf3qAiu9VqkA0jal2nfIpLIjDHMfk7IcXgMRXzR5HVqkZoV6iQLrdWzAEljlIyGHLQ6y004QKq9ABm-FtnQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-06-27 06:58:05,288:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-06-27 06:58:05,289:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 04:58:05 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824216467 Replay-Nonce: WDMSYcqSEpjGCCQVFI0-HgkPNJnDoJZFYG6zAHvMUK2vMWW25k0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:11Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985574177" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824216467" } 2024-06-27 06:58:05,289:DEBUG:acme.client:Storing nonce: WDMSYcqSEpjGCCQVFI0-HgkPNJnDoJZFYG6zAHvMUK2vMWW25k0 2024-06-27 06:58:05,290:DEBUG:acme.client:JWS payload: b'' 2024-06-27 06:58:05,296:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985574177: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV0RNU1ljcVNFcGpHQ0NRVkZJMC1IZ2tQTkpuRG9KWkZZRzZ6QUh2TVVLMnZNV1cyNWswIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU1NzQxNzcifQ", "signature": "kX4zGu8V2fNOeiPFcDd7fkm_9fSAkuFbN5gUXfD_kDOgHdd3ktNQ4z8eSqmGKZCl_wknj_dNpeMjpVL0LEd46Udk1HCMvUxZ4JiuBA40lXpg9nalhPvEvlgGQSZyXNebpCG1mzXBBRb8KVS9G8z-ZqkIQRTQGe3P8ji4f-yssjsJRttYuv3M_DIodY4jvxl8z9OKP3v0V6C288Yq-aQ3rQgSxim55pXezo7vHKJ9gBziukSySzsvh7yErnbYwWMlCBuFQzKEYK0TouXtCJ_VOllNn05Izec8WUjQP0eMQ9yegPWYDHzeUk-yvBaNIQA5Oe6Nz-XcTJS4MOKJUaP51w", "payload": "" } 2024-06-27 06:58:05,461:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985574177 HTTP/1.1" 200 807 2024-06-27 06:58:05,461:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:58:05 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: WDMSYcqS5IYtDGg9f9pR9xnJ6d1Fk-f_dIidzkx6NnjsZ8LACko X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:11Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/RO51fg", "status": "pending", "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/APGIHQ", "status": "pending", "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/4l4xCQ", "status": "pending", "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs" } ] } 2024-06-27 06:58:05,462:DEBUG:acme.client:Storing nonce: WDMSYcqS5IYtDGg9f9pR9xnJ6d1Fk-f_dIidzkx6NnjsZ8LACko 2024-06-27 06:58:05,462:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-27 06:58:05,462:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-06-27 06:58:05,462:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-27 06:58:05,462:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-27 06:58:05,463:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 06:58:05,463:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-27 06:58:05,463:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-27 06:58:05,464:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-27 06:58:05,465:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 06:58:05,505:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 06:58:05,733:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 06:58:05,735:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-27 06:58:05,737:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-27 06:58:05,742:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:54 UTC. 2024-06-27 06:58:05,742:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 06:58:05,742:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 06:58:05,747:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-27 06:58:05,748:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-27 06:58:05,748:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-27 06:58:05,765:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-27 06:58:05,766:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-27 06:58:05,768:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-27 06:58:06,240:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-27 06:58:06,241:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:58:05 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "WWZCXtF0xGE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-27 06:58:06,242:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-27 06:58:11,029:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7978_key-certbot.pem 2024-06-27 06:58:15,400:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7976_csr-certbot.pem 2024-06-27 06:58:15,400:DEBUG:acme.client:Requesting fresh nonce 2024-06-27 06:58:15,401:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-27 06:58:15,557:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-27 06:58:15,558:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:58:15 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 8AH9ZZ0o2CrjAyYu6-iG771il4gbrcH6AIQ8FCAcBN509kGH-dM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-27 06:58:15,558:DEBUG:acme.client:Storing nonce: 8AH9ZZ0o2CrjAyYu6-iG771il4gbrcH6AIQ8FCAcBN509kGH-dM 2024-06-27 06:58:15,559:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-06-27 06:58:15,565:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOEFIOVpaMG8yQ3JqQXlZdTYtaUc3NzFpbDRnYnJjSDZBSVE4RkNBY0JONTA5a0dILWRNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "DuV_hLxdFr8Td8l-9onhCtZW27jmkOw7vGYBC5CwQXIqEWjKU2bujy3q9SAfQ310QPyEcBeyF2oqiBPDjMOj8k1frVgDSOYCBHbuLgcSdoaGI3O_rWJAiCzB4dLzxazaF0HblRFqBiTKqtj2h594TPd9kVGFz_EMBzVi2Fy2sXmZbnI6o3XIdbJFNj6eOOaGsTwcd_d36qUSMvUPgRrLUJX8X4C4i9TxhbQD76DnAG8kmnBeGMc9D8Fp55dVC5p8-B6earpGrtXeNfPPEuwq7anpKqirnGMhFcRILJWBgZT3lsIWY2aZokGXQYd7lnFhofXKcnzmF7xM3_ZyZrWitw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-06-27 06:58:15,736:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-06-27 06:58:15,738:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 04:58:15 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824261497 Replay-Nonce: WDMSYcqSA9TCMvrpNuSH29w-G0q0iWJmyJrcEZlsJaLBjfpRQrI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:21Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985640857" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824261497" } 2024-06-27 06:58:15,738:DEBUG:acme.client:Storing nonce: WDMSYcqSA9TCMvrpNuSH29w-G0q0iWJmyJrcEZlsJaLBjfpRQrI 2024-06-27 06:58:15,739:DEBUG:acme.client:JWS payload: b'' 2024-06-27 06:58:15,747:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985640857: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV0RNU1ljcVNBOVRDTXZycE51U0gyOXctRzBxMGlXSm15SnJjRVpsc0phTEJqZnBSUXJJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU2NDA4NTcifQ", "signature": "eAoPRSYbueaFfmbtxQS7bdmJL4tTrp1GR1zq1ZH2H__tJzeCsPXxYUheA8x6WdUIghnX3xxCuEqr5xS1T5BJaGkJ-OSu1KVJW02k_TY-gatVXmTpVsVdVGhcVGo89Wgwa6Py83NBlfLvbYp4_gdeTPekfEfHWdLUtL6iLF9QIGJ7PLG91bySM5bHltHVKTvhnKg04nXd72RX2Bt0J_BqhFJLFZRbEe17y0AW_i8A15pCKfqUEwojp8PVgf-mEymlBWgnxGgEuXlC0In672PCCX1yiP7bVuuZPaOqBBqO2q6fm9TYVyTnhciHZKjmhJuGcf3uXWt2rHhfQ68BgMMHTw", "payload": "" } 2024-06-27 06:58:15,910:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985640857 HTTP/1.1" 200 801 2024-06-27 06:58:15,912:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:58:15 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: WDMSYcqSxfFiQD9l4JfvuzW0uOsOixl-Wh-FkhHo7IEfIgWS56E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:21Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/_W_uNw", "status": "pending", "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/1XcAQA", "status": "pending", "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/a1s51Q", "status": "pending", "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs" } ] } 2024-06-27 06:58:15,912:DEBUG:acme.client:Storing nonce: WDMSYcqSxfFiQD9l4JfvuzW0uOsOixl-Wh-FkhHo7IEfIgWS56E 2024-06-27 06:58:15,914:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-27 06:58:15,914:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-06-27 06:58:15,915:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-27 06:58:15,916:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-27 06:58:15,917:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 06:58:15,918:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-27 06:58:15,918:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-27 06:58:15,919:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-27 06:58:15,921:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 06:58:15,973:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 06:58:16,160:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 06:58:16,163:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-27 06:58:16,164:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-27 06:58:16,168:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:09 UTC. 2024-06-27 06:58:16,168:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 06:58:16,168:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 06:58:16,173:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-27 06:58:16,173:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-27 06:58:16,173:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-27 06:58:16,178:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-27 06:58:16,179:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-27 06:58:16,181:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-27 06:58:16,665:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-27 06:58:16,666:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:58:16 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "cr4Go-sUQ6Q": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-27 06:58:16,667:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-27 06:58:21,121:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7979_key-certbot.pem 2024-06-27 06:58:25,525:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7977_csr-certbot.pem 2024-06-27 06:58:25,525:DEBUG:acme.client:Requesting fresh nonce 2024-06-27 06:58:25,525:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-27 06:58:25,686:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-27 06:58:25,687:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:58:25 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: WDMSYcqSLixrbqLfaciM4OGI8fHDP4ZvIYeYZQan46qowzrjhy0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-27 06:58:25,688:DEBUG:acme.client:Storing nonce: WDMSYcqSLixrbqLfaciM4OGI8fHDP4ZvIYeYZQan46qowzrjhy0 2024-06-27 06:58:25,688:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-06-27 06:58:25,701:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV0RNU1ljcVNMaXhyYnFMZmFjaU00T0dJOGZIRFA0WnZJWWVZWlFhbjQ2cW93enJqaHkwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "UmSXCtHMCEXiGYUcrhyd2PsevbQ8uhaArPz0vtbSRPx3QTrw3M4-k898dhEX8wXvapyl8ow5HTf_tcZUWekDA-j7xhe8f-zQ4noNT3Ry3jT41ZMCTxKqCrjuph7_5xsMfRpMvx8cYshgTDllRHiMyQBEN9dtKXaem_ZOHj-ya-XIlqsroYfIZQXXXL3SLFFNg_kUqKZA_9YBmvm6uhVWAU16Td23f8pGYHul0m14s07xxkbwlSqUxfwI3d6H9kBi9Iajy2utwoUj4pMWWENxsyN2eaR7FEew-L5lSxCWTt6KP45M_a-2HFmZ57jVLlOIqIvWe9MO1SVO8E1hNFRL1A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-06-27 06:58:25,885:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-06-27 06:58:25,886:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 04:58:25 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824300277 Replay-Nonce: WDMSYcqSSe_cdmGVE1xfYRLUW3ev1xOmymhOKiVtqp9H5DWyKXI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:31Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985696127" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824300277" } 2024-06-27 06:58:25,887:DEBUG:acme.client:Storing nonce: WDMSYcqSSe_cdmGVE1xfYRLUW3ev1xOmymhOKiVtqp9H5DWyKXI 2024-06-27 06:58:25,887:DEBUG:acme.client:JWS payload: b'' 2024-06-27 06:58:25,898:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985696127: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV0RNU1ljcVNTZV9jZG1HVkUxeGZZUkxVVzNldjF4T215bWhPS2lWdHFwOUg1RFd5S1hJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU2OTYxMjcifQ", "signature": "gtIgQSitfrTK66cAyvHUUmq_I8JiZwdsXLs36wDwNiVkKSVQF7TuUMPXdPyiySkqb-TDjo2CdTqw5ZmYIYp2LwQR-8X5mzoXdC0gXB-TCYJdAt4mvsjs_XwPrgjt3WxMWlET60Eq_5tYa-vYe_nyEvqkpdxehzcU7uicJ2C4cGHLgfSjlN_kRzBlTE101dDcR-HZ9n4Bjeof9GJZ13JSo3dOv5TuZYcLdiQz2PQnaolip9IzSzY05-LE7ZG2ok8wlDeE_uj9TO5_wpGBUQDUn9C-wZJNgf60HRXVFBduVoiWnob2qmV6smN8hVduTdtbUxa2GiHoa-WdqbMQAw7D5A", "payload": "" } 2024-06-27 06:58:26,064:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985696127 HTTP/1.1" 200 805 2024-06-27 06:58:26,065:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:58:25 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 8AH9ZZ0oWlUXIsNMbWxBLLkKgOxfvD2KB-ZAFj7uKyW_vV5qZWU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:31Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/p3DiTg", "status": "pending", "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/dn4kZw", "status": "pending", "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/A2Vu8Q", "status": "pending", "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU" } ] } 2024-06-27 06:58:26,065:DEBUG:acme.client:Storing nonce: 8AH9ZZ0oWlUXIsNMbWxBLLkKgOxfvD2KB-ZAFj7uKyW_vV5qZWU 2024-06-27 06:58:26,067:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-27 06:58:26,067:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-06-27 06:58:26,068:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-27 06:58:26,069:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-27 06:58:26,071:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 06:58:26,071:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-27 06:58:26,071:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-27 06:58:26,072:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-27 06:58:26,075:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 06:58:26,116:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 06:58:26,350:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 06:58:26,353:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-06-27 06:58:26,354:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-06-27 06:58:26,364:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:26 UTC. 2024-06-27 06:58:26,364:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 06:58:26,364:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 06:58:26,369:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-27 06:58:26,369:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-27 06:58:26,369:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-27 06:58:26,388:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-27 06:58:26,390:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-27 06:58:26,394:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-27 06:58:26,872:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-27 06:58:26,873:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:58:26 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "cr8ilw0RkPc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-27 06:58:26,874:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-27 06:58:31,857:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7980_key-certbot.pem 2024-06-27 06:58:36,216:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7978_csr-certbot.pem 2024-06-27 06:58:36,216:DEBUG:acme.client:Requesting fresh nonce 2024-06-27 06:58:36,216:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-27 06:58:36,377:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-27 06:58:36,378:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:58:36 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 8AH9ZZ0o47dlSUGk_k992inn_ndrhzrx6T5zBQI1FGOFjtvk8bQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-27 06:58:36,378:DEBUG:acme.client:Storing nonce: 8AH9ZZ0o47dlSUGk_k992inn_ndrhzrx6T5zBQI1FGOFjtvk8bQ 2024-06-27 06:58:36,379:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-06-27 06:58:36,387:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOEFIOVpaMG80N2RsU1VHa19rOTkyaW5uX25kcmh6cng2VDV6QlFJMUZHT0ZqdHZrOGJRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "JJ03gpsggHx8l4hHNN5wBzLoggx6fINNUjzF-7Z6GT48njmMeplROsWkqmLcs1OustwaDZ2TstkhJAcM7BNnXApQWmNXfgjw-86qGiFd3brzz7fb-YaqvgRzDuGWpwqbIlYQYXfWUxnRy8zUzk2btq2DKlAf37_an4plJyed3zM_2ml1B4z1SdDQsQ4WKcCYLzGm69V00yoSGxDJIy5mMfCnqYJE3qNvs08Br3mHibDqj9CX-SK3HR39dLic41vG-g1uiiYF1e5xHbskCmzDiU3h74pkrnkE7S3X4XasgbV0N9CFHrBMgKdT6rf_ecVma-faRPFjRQynBv4wOf_SdA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-06-27 06:58:36,560:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-06-27 06:58:36,561:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 04:58:36 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824334367 Replay-Nonce: WDMSYcqSLJeCWXs1OgIWiHaMzQSSVFPW0rU09oFTvMeiK0OIM9o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:41Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985747117" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824334367" } 2024-06-27 06:58:36,561:DEBUG:acme.client:Storing nonce: WDMSYcqSLJeCWXs1OgIWiHaMzQSSVFPW0rU09oFTvMeiK0OIM9o 2024-06-27 06:58:36,562:DEBUG:acme.client:JWS payload: b'' 2024-06-27 06:58:36,567:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985747117: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV0RNU1ljcVNMSmVDV1hzMU9nSVdpSGFNelFTU1ZGUFcwclUwOW9GVHZNZWlLME9JTTlvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU3NDcxMTcifQ", "signature": "KVCbklpoatOwSBE8LSm5DYB3GERiEtp4c9tdwR8EFdVulmw7YoLIA84aiaFCoqB3sRXjwqmZCmgUCH00dyb5VOFV251xRj8s_w5ggJVNFhhuILZPc03kqhumErrIqKNYekbboxrz6G_TrKpbgfrVg1emrayQ79W3xUw-H3Hp3g_ycOAcp22kpcN38phhDTc7XjpfipChhLD5q1zLQlr9IdNhxj_oCltVydpcBDvEqgxRc8U_n1cJqv0WeWs2WmU2TEFZMHO-nQlGhKpPTyLEfHB4zhL_P_vWBQTmIrgR0JNX8sD0vAluhl4B98D8Sfgfsrjv1rDuTQjI5nc9jQRj0w", "payload": "" } 2024-06-27 06:58:36,731:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985747117 HTTP/1.1" 200 809 2024-06-27 06:58:36,732:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:58:36 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 8AH9ZZ0oZ07BHhpLZxJu_g9tROzPxbOqiFjLdMlRAIdK_gaDUIs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:41Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/NIFDhg", "status": "pending", "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/1iYgbg", "status": "pending", "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/elhV3g", "status": "pending", "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY" } ] } 2024-06-27 06:58:36,732:DEBUG:acme.client:Storing nonce: 8AH9ZZ0oZ07BHhpLZxJu_g9tROzPxbOqiFjLdMlRAIdK_gaDUIs 2024-06-27 06:58:36,733:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-27 06:58:36,733:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-06-27 06:58:36,734:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-27 06:58:36,734:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-27 06:58:36,735:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 06:58:36,735:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-27 06:58:36,735:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-27 06:58:36,736:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-27 06:58:36,739:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 06:58:36,791:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 06:58:36,982:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 06:58:36,983:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is signed by the certificate's issuer. 2024-06-27 06:58:36,984:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD 2024-06-27 06:58:36,988:INFO:certbot._internal.renewal:Cert not yet due for renewal 2024-06-27 06:58:36,992:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 06:58:37,031:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 06:58:37,270:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 06:58:37,273:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-27 06:58:37,275:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-27 06:58:37,285:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:40 UTC. 2024-06-27 06:58:37,285:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 06:58:37,285:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 06:58:37,296:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-27 06:58:37,297:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-27 06:58:37,297:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-27 06:58:37,313:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-27 06:58:37,314:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-27 06:58:37,317:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-27 06:58:37,783:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-27 06:58:37,783:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:58:37 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "UwSzob1IILE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-27 06:58:37,784:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-27 06:58:42,645:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7981_key-certbot.pem 2024-06-27 06:58:46,967:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7979_csr-certbot.pem 2024-06-27 06:58:46,967:DEBUG:acme.client:Requesting fresh nonce 2024-06-27 06:58:46,967:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-27 06:58:47,124:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-27 06:58:47,124:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:58:46 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: WDMSYcqSC60eAIqN_B5-obQloTrGPtwgSy0_90z9amMgqPtn15E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-27 06:58:47,125:DEBUG:acme.client:Storing nonce: WDMSYcqSC60eAIqN_B5-obQloTrGPtwgSy0_90z9amMgqPtn15E 2024-06-27 06:58:47,125:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-06-27 06:58:47,131:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV0RNU1ljcVNDNjBlQUlxTl9CNS1vYlFsb1RyR1B0d2dTeTBfOTB6OWFtTWdxUHRuMTVFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "nqhkDcR9JX6OQuchh0YugrdWjodIMRL_QEUX_7RWn4ugFwRiZD_PnRC7g8uJsvBQUWlk24WcRaap5aZGSYrrO_NRWFwsh5e8Av6EYfz0yuly_qd9YunY5bJi7PId8fcBqQb4Qwc5lv1IKU9OGtHf6eAVATzdzI8tHlf6sIqm0fkTG8SyrFCzDw1qyGd8HsC8-1pYlaGhZSlQBVe5bQI1Gwo9J8ulJyRWG-6BYNkONWNbyBmlRSifhhk5IEsn3LKs9ZSk012LXUpaJonyGhnarOhxC4MuTPUmEgcGD7ZahyT_FJyVyGEnJ5KbaTY3YJoncWdkfSRHvsH5eg_l5A2LjQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-06-27 06:58:47,299:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-06-27 06:58:47,300:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 04:58:47 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824371297 Replay-Nonce: 8AH9ZZ0ovyq3-QeJUKvqm7FO89IuB8LIEBi2bha3Qg6Eb8FD-eo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:52Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985803767" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824371297" } 2024-06-27 06:58:47,300:DEBUG:acme.client:Storing nonce: 8AH9ZZ0ovyq3-QeJUKvqm7FO89IuB8LIEBi2bha3Qg6Eb8FD-eo 2024-06-27 06:58:47,300:DEBUG:acme.client:JWS payload: b'' 2024-06-27 06:58:47,306:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985803767: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOEFIOVpaMG92eXEzLVFlSlVLdnFtN0ZPODlJdUI4TElFQmkyYmhhM1FnNkViOEZELWVvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU4MDM3NjcifQ", "signature": "qzY3ZKMEzZTr6OV7dMMGLF_qNQCBkIEKRT_O96E-LtY2-qDZtWAEo877FzKdEJfpSm90aOPKG5kfBXIACCV__ThV7uQ2l3jXqOltqurAMparniQqn3pkjSd7QKmpbxkIS_hfUlL_K6sPHhlnRrS9Gi15vtqPqIZ95blIjgwonDmd60S3tPgJyX7dE1zZGyAYSSYecuQ0qJW8u7EkZln4zUgQBk6aN7wOuIsdSWSPmWOvMG4hr5VprJpNNpp4y4ClVIxfxExgzYWWD_bZFS2HC4gPPemjM2r-nlHIn_qupiK_qIpiOQv2zwAbpRjxI4-lAcPD3p_fbNysre3whJeSeA", "payload": "" } 2024-06-27 06:58:47,465:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985803767 HTTP/1.1" 200 806 2024-06-27 06:58:47,467:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:58:47 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: WDMSYcqSMtCUmzXxpVC31bzOQSd50W6uawMuFi0HccAbyGI7DDo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:52Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/DP175w", "status": "pending", "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/kAzjPg", "status": "pending", "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/-Uec4A", "status": "pending", "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0" } ] } 2024-06-27 06:58:47,467:DEBUG:acme.client:Storing nonce: WDMSYcqSMtCUmzXxpVC31bzOQSd50W6uawMuFi0HccAbyGI7DDo 2024-06-27 06:58:47,469:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-27 06:58:47,469:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-06-27 06:58:47,470:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-27 06:58:47,470:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-27 06:58:47,471:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 06:58:47,471:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-27 06:58:47,472:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-27 06:58:47,472:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-27 06:58:47,475:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 06:58:47,519:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-06-27 06:58:47,520:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 06:58:47,520:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-06-27 06:58:47,527:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-06-27 06:58:47,529:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-06-27 06:58:47,529:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-06-27 06:58:47,529:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-06-27 06:58:47,529:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-06-27 06:58:47,531:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-06-27 06:58:47,572:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 06:58:47,808:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 06:58:47,809:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-27 06:58:47,810:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-27 06:58:47,814:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:58 UTC. 2024-06-27 06:58:47,814:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 06:58:47,814:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 06:58:47,819:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-27 06:58:47,820:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-27 06:58:47,820:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-27 06:58:47,836:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-27 06:58:47,837:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-27 06:58:47,839:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-27 06:58:48,304:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-27 06:58:48,305:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:58:48 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "CfrIvqA_k9w": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-27 06:58:48,306:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-27 06:58:52,852:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7982_key-certbot.pem 2024-06-27 06:58:57,209:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7980_csr-certbot.pem 2024-06-27 06:58:57,209:DEBUG:acme.client:Requesting fresh nonce 2024-06-27 06:58:57,209:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-27 06:58:57,366:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-27 06:58:57,367:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:58:57 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 8AH9ZZ0oWDFWr693VX0sdTwWU8HOhu45Wh-O4mEFPASkkgmQfRQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-27 06:58:57,367:DEBUG:acme.client:Storing nonce: 8AH9ZZ0oWDFWr693VX0sdTwWU8HOhu45Wh-O4mEFPASkkgmQfRQ 2024-06-27 06:58:57,368:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-06-27 06:58:57,374:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOEFIOVpaMG9XREZXcjY5M1ZYMHNkVHdXVThIT2h1NDVXaC1PNG1FRlBBU2trZ21RZlJRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "JxbrhYTIlDuDEqtZpxdHVcSHFwS95zFiSUviduy1WumqvlUSrnA_O5Fzy69qoAifdyELx_-t2N4L1yH3lDNNO5XVXldgjk8O6LFjoc4GkZUNV1rHuZdCL8VesTMqPAHm6MGZVCj2p3iCx-39HOR526Y_VRzPX-r1sNr67KPE2NqLHZkgBkK6pz3T7LwC8ftJWyuw1Z4o60nw452fYBFYcMvNRlo-3UrVyr60ebw9A9dU0RKsocEvRxVeEforCYKmcARmqy9P838XfH3t84n0sngI2p9pdg9duagLxVEjFB8Ukn1IARi_230GatBzfRtBBhXxU65BaukJSUi867LUPQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-06-27 06:58:57,546:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-06-27 06:58:57,547:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 04:58:57 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824405187 Replay-Nonce: 8AH9ZZ0oSh1_v93w8dm0yr_QKIGOP2Lu8aUEgtep-_J2eR7NhfY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:01Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985856047" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824405187" } 2024-06-27 06:58:57,547:DEBUG:acme.client:Storing nonce: 8AH9ZZ0oSh1_v93w8dm0yr_QKIGOP2Lu8aUEgtep-_J2eR7NhfY 2024-06-27 06:58:57,547:DEBUG:acme.client:JWS payload: b'' 2024-06-27 06:58:57,552:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985856047: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOEFIOVpaMG9TaDFfdjkzdzhkbTB5cl9RS0lHT1AyTHU4YVVFZ3RlcC1fSjJlUjdOaGZZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU4NTYwNDcifQ", "signature": "WmumXUM0eDvR1Gj7k1Oa7nJYoVqnQ_92GXPccc2T68LU4-Xrgnn_7eGH2av_Dm0Am_dQX2_BsM7rnHhvoKpT0e-3PScRKtjMTNA2ZSithntyw-MxQVR1uPcrQN9zuAK13qfzoqEUUSWRW3wBYNBF-k-WnqCpDsUebHTmgLXTm9k4_zkxredu_pPBYhINEUywgDvQ6ksbCWLnEZWYjWynC2lqmUOBoKqFk508czOM7zpzsbPg7N1ePAq03WXq5MLL_qGvyOXWNdwJYuArRIrZCX4fwVvcTPhPkc-91YQqvQ9h778KA6dzEfmr81O7QHQxW3sIHIUaEvKB-o6M9zZCEw", "payload": "" } 2024-06-27 06:58:57,731:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985856047 HTTP/1.1" 200 811 2024-06-27 06:58:57,731:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:58:57 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 8AH9ZZ0o0Fjnu6eNXQw0A28kuDLp0pcAC2nnQ5JjX-cWRBjwDzU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:01Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/ZygfgQ", "status": "pending", "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/f5kJqg", "status": "pending", "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/OgjqNA", "status": "pending", "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s" } ] } 2024-06-27 06:58:57,732:DEBUG:acme.client:Storing nonce: 8AH9ZZ0o0Fjnu6eNXQw0A28kuDLp0pcAC2nnQ5JjX-cWRBjwDzU 2024-06-27 06:58:57,733:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-27 06:58:57,734:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-06-27 06:58:57,735:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-27 06:58:57,735:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-27 06:58:57,736:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 06:58:57,736:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-27 06:58:57,736:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-27 06:58:57,737:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-27 06:58:57,738:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 06:58:57,792:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 06:58:58,061:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 06:58:58,062:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-27 06:58:58,063:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-27 06:58:58,066:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:15 UTC. 2024-06-27 06:58:58,066:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 06:58:58,067:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 06:58:58,072:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-27 06:58:58,072:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-27 06:58:58,072:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-27 06:58:58,077:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-27 06:58:58,078:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-27 06:58:58,080:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-27 06:58:58,537:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-27 06:58:58,538:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:58:58 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "sw2PZ0I9q_I": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-06-27 06:58:58,539:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-27 06:59:03,114:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7983_key-certbot.pem 2024-06-27 06:59:07,549:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7981_csr-certbot.pem 2024-06-27 06:59:07,549:DEBUG:acme.client:Requesting fresh nonce 2024-06-27 06:59:07,549:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-27 06:59:07,701:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-27 06:59:07,702:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:59:07 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1VRjeNN9EVEJLIocIexjFopGIvRvVVv1wontFtL-VURZN0Vnzro X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-27 06:59:07,703:DEBUG:acme.client:Storing nonce: 1VRjeNN9EVEJLIocIexjFopGIvRvVVv1wontFtL-VURZN0Vnzro 2024-06-27 06:59:07,703:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-06-27 06:59:07,709:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVZSamVOTjlFVkVKTElvY0lleGpGb3BHSXZSdlZWdjF3b250RnRMLVZVUlpOMFZuenJvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "isCJoj-zZLmqh39SFih5COifHntseSGj_9sb6OV8hMlxTftlRcNIbzrdEwVQirUIgdv2NqNoaZKD8X5HClW0LmM8XNtxtsgJS_m9_rqW5s0XmfaPbQXY-rM0oUkGuoaEXz-fYlR6NxyTbhbfKohDjLsbAhpeS4WSPK1uN9kA7tZ1vgiJKntAq2Pf5WuskEXoDZA5NlVjmSE3M0oC1c0wpiYD4hm6MOLA5GrvDqepiRuxxH9421UZPaF0Z5J710l-Z9PoAlWnH3voUNL3DtcrZU23MHWxT72cb0EeNNrn5dEQOMypW-aeRIemJNsLtQvEkyrxu6j84euQZrL7yvbpxg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-06-27 06:59:07,932:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-06-27 06:59:07,932:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 04:59:07 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824456717 Replay-Nonce: 1VRjeNN9hfrkbiKe5_BdBXtoh6Rj6Dpu2xczgtjE78pW7aCJv28 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:12Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985929937" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824456717" } 2024-06-27 06:59:07,933:DEBUG:acme.client:Storing nonce: 1VRjeNN9hfrkbiKe5_BdBXtoh6Rj6Dpu2xczgtjE78pW7aCJv28 2024-06-27 06:59:07,933:DEBUG:acme.client:JWS payload: b'' 2024-06-27 06:59:07,940:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985929937: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVZSamVOTjloZnJrYmlLZTVfQmRCWHRvaDZSajZEcHUyeGN6Z3RqRTc4cFc3YUNKdjI4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU5Mjk5MzcifQ", "signature": "DXH90O0_Wr5Tfh9akRFJuheETnJuwuJ4PEnr7d7WY-naZbx4H-X2mu-uhK2urPqCSfw8XMP0BGHVecK6ucqilJeXGLSRkbORu4Cy6AK_872Us_X5GU9cr08a1HdaBSIWOo-ZDh-X_PTYS_Bq4I9fkATukZ57fd6LsOgyGEXHjMIm-ndMD26aUXivban5CjDNisRHT-ypKw7HEBSZ0B-XTWxEMwXLR7ur9Vwhp6SgWfEpHqGNj8OdLqB4YeWzIbL8_Dt-SGQtbDywxqW71Ca1twOnbyLEcIPG6yeDDXXL9afa7EAyn6vsdYlCBfD0BC_hJkGwgoHF0oDnyuZGeci8Ww", "payload": "" } 2024-06-27 06:59:08,109:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985929937 HTTP/1.1" 200 810 2024-06-27 06:59:08,109:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:59:07 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1VRjeNN9XStF6aZN4uan6avVD5z0pBQc2fq0d5U9zjMAW5xt5dg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:12Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/gXwyeA", "status": "pending", "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/K4XtOg", "status": "pending", "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/NX0yhA", "status": "pending", "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY" } ] } 2024-06-27 06:59:08,109:DEBUG:acme.client:Storing nonce: 1VRjeNN9XStF6aZN4uan6avVD5z0pBQc2fq0d5U9zjMAW5xt5dg 2024-06-27 06:59:08,110:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-27 06:59:08,110:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-06-27 06:59:08,111:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-27 06:59:08,112:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-27 06:59:08,114:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 06:59:08,114:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-27 06:59:08,115:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-27 06:59:08,115:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-27 06:59:08,118:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 06:59:08,158:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 06:59:08,348:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 06:59:08,349:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-06-27 06:59:08,350:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-06-27 06:59:08,355:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:29 UTC. 2024-06-27 06:59:08,355:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 06:59:08,355:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 06:59:08,360:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-27 06:59:08,361:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-27 06:59:08,361:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-27 06:59:08,366:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-27 06:59:08,367:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-27 06:59:08,369:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-27 06:59:08,862:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-27 06:59:08,863:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:59:08 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "JnlUMbKJrGU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-27 06:59:08,863:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-27 06:59:13,857:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7984_key-certbot.pem 2024-06-27 06:59:18,322:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7982_csr-certbot.pem 2024-06-27 06:59:18,323:DEBUG:acme.client:Requesting fresh nonce 2024-06-27 06:59:18,323:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-27 06:59:18,486:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-27 06:59:18,486:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:59:18 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 8AH9ZZ0o_8sch8nSo5nTk00YntqC-Z02U35m20y7tSWC9zzQMb8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-27 06:59:18,486:DEBUG:acme.client:Storing nonce: 8AH9ZZ0o_8sch8nSo5nTk00YntqC-Z02U35m20y7tSWC9zzQMb8 2024-06-27 06:59:18,486:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-06-27 06:59:18,492:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOEFIOVpaMG9fOHNjaDhuU281blRrMDBZbnRxQy1aMDJVMzVtMjB5N3RTV0M5enpRTWI4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "HU7xC3tANb6sd4s4Ut9nOCWeH3nC1AucwLF0ISaFHthSI_zRrcysQ6Iz1z1mQ2dGABslW5na06slHIuFGWv9rNkcbvhXBhHpEYpUhkWygCrDZGD6HHqMg9-jqbt2ltHpYVC2azevqH54GAJ1XyMIA1RiXmT5vdt6dk23fl0faz5XTTfYwZ0EW302a9LXjrldwaxW1F0lbh2FewCMzOcCfL8XXYL_BS50HD2UXCNoITomwF_G20n6uIm7O7AzYHioeou0sTG4s18hEUwz7v52SB1UXDRI98eHgZmk8czXBJ7qTmZBTRWOn6bbNkod2EDtiNKKiseBpmSjz4h_FNERgw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-06-27 06:59:18,666:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-06-27 06:59:18,666:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 04:59:18 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824496987 Replay-Nonce: WDMSYcqSZWpU_IXdRWp2uD8qx6Hee4x8RnMIwQd-IHMOUxbUR_s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:22Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985989517" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824496987" } 2024-06-27 06:59:18,666:DEBUG:acme.client:Storing nonce: WDMSYcqSZWpU_IXdRWp2uD8qx6Hee4x8RnMIwQd-IHMOUxbUR_s 2024-06-27 06:59:18,666:DEBUG:acme.client:JWS payload: b'' 2024-06-27 06:59:18,672:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985989517: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV0RNU1ljcVNaV3BVX0lYZFJXcDJ1RDhxeDZIZWU0eDhSbk1Jd1FkLUlITU9VeGJVUl9zIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU5ODk1MTcifQ", "signature": "HtrJoNr52CN9Z2qV7KIwzHVqxPdLRRVWOHoeLn9QRRuVgww5CjBRyKiD_yGZk4Xbt4Sq1qSc-HSxwgN22GcrK5NVYuCnDjmkw0wQ7irRkQMGjXMatga7QugfcICBNdQZCovl01WZQPcOo_EYA4C2wUPzloS3dXPfV20osDcjbXPTaVM8hiz4iSv-_lfuaK4wMLT6sTAgZGrYV6BCWC3mGn5wo5GZT9RAN_hZ7gjmdz3rnPLCycmom32fA2Qqg8TiwvjuEIc0pemToPA645W2pEcO2z9ZEu-OWOlzCQrJuXrT808aWMNchZsT74nMJTO87B3ak-m4m0DlZT1bptZh9Q", "payload": "" } 2024-06-27 06:59:18,848:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985989517 HTTP/1.1" 200 809 2024-06-27 06:59:18,849:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:59:18 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 8AH9ZZ0oPnyBqEiILijjAS_oP4JkvBu78YH5TqgPRJYzDhXUzS0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:22Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/ebl14A", "status": "pending", "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/-PFYBw", "status": "pending", "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/LKEO7w", "status": "pending", "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0" } ] } 2024-06-27 06:59:18,849:DEBUG:acme.client:Storing nonce: 8AH9ZZ0oPnyBqEiILijjAS_oP4JkvBu78YH5TqgPRJYzDhXUzS0 2024-06-27 06:59:18,850:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-27 06:59:18,850:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-06-27 06:59:18,851:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-27 06:59:18,851:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-27 06:59:18,852:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 06:59:18,852:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-27 06:59:18,852:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-27 06:59:18,853:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-27 06:59:18,854:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 06:59:18,909:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 06:59:19,098:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 06:59:19,099:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-06-27 06:59:19,099:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-06-27 06:59:19,104:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:53 UTC. 2024-06-27 06:59:19,104:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 06:59:19,105:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 06:59:19,109:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-27 06:59:19,110:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-27 06:59:19,110:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-27 06:59:19,115:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-27 06:59:19,116:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-27 06:59:19,118:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-27 06:59:19,571:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-27 06:59:19,572:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:59:19 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "fxUIGNimaEA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-27 06:59:19,572:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-27 06:59:24,463:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7985_key-certbot.pem 2024-06-27 06:59:28,959:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7983_csr-certbot.pem 2024-06-27 06:59:28,960:DEBUG:acme.client:Requesting fresh nonce 2024-06-27 06:59:28,960:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-27 06:59:29,112:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-27 06:59:29,113:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:59:28 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1VRjeNN9-EXBy_VwwCfo_HgjznBlwQ5CN-_IqFc8ijKoV59BWxU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-27 06:59:29,113:DEBUG:acme.client:Storing nonce: 1VRjeNN9-EXBy_VwwCfo_HgjznBlwQ5CN-_IqFc8ijKoV59BWxU 2024-06-27 06:59:29,114:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-06-27 06:59:29,124:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVZSamVOTjktRVhCeV9Wd3dDZm9fSGdqem5CbHdRNUNOLV9JcUZjOGlqS29WNTlCV3hVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "lQuXGAwLp4sXguJGFcM6NI_th5saiYHhb0789pUMToDaySrput0HeWHBDJ5n16FrKF8c7J9WsNHFIHupQBaNrct-K-a44EQwj4_uj6C3wrH7jDYdth0hcWbQRJpLTm7e9PD7zmekZWMy8C-cNfas8qVOMYFAtmMyqpUPu3UEQFEU50kPl2uZTSoTXPZ6j7XuyqJ__TA7XHBx_535vMq6ueyrgY3t63xcA-isAYrqQbUAzSQXAYXsvQZHXMGFs4tj8hwcpQuUuDuiW53QHDcHJt9bvjdT9hF64pLPVToYmFJdwqHeft-GEDV_-JRBSC-Sf9zfSpchg72LfLrOltXN4g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-06-27 06:59:29,289:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-06-27 06:59:29,290:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 04:59:29 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824533727 Replay-Nonce: 1VRjeNN9aoLByJT3E26Hj8NOgbgEcNckd1AsmIg-4R_Xt9bVwX0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:32Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986047927" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824533727" } 2024-06-27 06:59:29,290:DEBUG:acme.client:Storing nonce: 1VRjeNN9aoLByJT3E26Hj8NOgbgEcNckd1AsmIg-4R_Xt9bVwX0 2024-06-27 06:59:29,291:DEBUG:acme.client:JWS payload: b'' 2024-06-27 06:59:29,297:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986047927: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVZSamVOTjlhb0xCeUpUM0UyNkhqOE5PZ2JnRWNOY2tkMUFzbUlnLTRSX1h0OWJWd1gwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYwNDc5MjcifQ", "signature": "f_q7kso8KiI8oBBQfSWJ5ffgdkLvrpyhSb-usZSXiNUHStTr8nWPayJAGTIktlIf69QT3HqNzxD4AvmAExU3-sh04u8YBrIHy0kLCFrluz-UojqsuSjE7m_GM_YGajKm0tKfaCkZtAqBu41j7OBWzLGsXxYIRMDht2HWQMvQlFRgpun2Yy4wLDDNL9YovrG3SIpseowK5Bmt-vb4LmaU1Xo6AOR70In8Upk21pdKwBEgM_TKqt7F0yMJoXQ9m666k9h6zYYQfTZDDYr0Xx8rs_8kPBitF6IlB2iFZjJ8UZiBK6nby0_jmuKDGSSstDqd1GwuVPJFv0YrN01nAz0myQ", "payload": "" } 2024-06-27 06:59:29,453:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986047927 HTTP/1.1" 200 805 2024-06-27 06:59:29,454:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:59:29 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: lCR6it1EZtCnxCzwESZzvAnAC-pfDTz7CaomhdScTbC9MU_aTVg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:32Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/a7aI1Q", "status": "pending", "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/Rqj-2Q", "status": "pending", "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/4mVq6w", "status": "pending", "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0" } ] } 2024-06-27 06:59:29,454:DEBUG:acme.client:Storing nonce: lCR6it1EZtCnxCzwESZzvAnAC-pfDTz7CaomhdScTbC9MU_aTVg 2024-06-27 06:59:29,454:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-27 06:59:29,455:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-06-27 06:59:29,455:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-27 06:59:29,456:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-27 06:59:29,456:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 06:59:29,457:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-27 06:59:29,457:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-27 06:59:29,457:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-27 06:59:29,458:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 06:59:29,508:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 06:59:29,738:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 06:59:29,740:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-27 06:59:29,741:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-27 06:59:29,744:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:19 UTC. 2024-06-27 06:59:29,744:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 06:59:29,745:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 06:59:29,750:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-27 06:59:29,750:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-27 06:59:29,750:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-27 06:59:29,768:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-27 06:59:29,769:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-27 06:59:29,771:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-27 06:59:30,203:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-27 06:59:30,205:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:59:29 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "rys3SHt7avw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-06-27 06:59:30,206:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-27 06:59:34,950:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7986_key-certbot.pem 2024-06-27 06:59:39,382:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7984_csr-certbot.pem 2024-06-27 06:59:39,382:DEBUG:acme.client:Requesting fresh nonce 2024-06-27 06:59:39,382:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-27 06:59:39,537:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-27 06:59:39,539:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:59:39 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1VRjeNN9MCBQnaLWJuG_mIdLmYPzOQkT41l-UDMivp2hafHpBvs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-27 06:59:39,539:DEBUG:acme.client:Storing nonce: 1VRjeNN9MCBQnaLWJuG_mIdLmYPzOQkT41l-UDMivp2hafHpBvs 2024-06-27 06:59:39,540:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-06-27 06:59:39,551:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVZSamVOTjlNQ0JRbmFMV0p1R19tSWRMbVlQek9Ra1Q0MWwtVURNaXZwMmhhZkhwQnZzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "xItoWHPQYCLYwiAekmXO86IL_uL_41wGBEsqYS_p3Ap-98oD9e8ttq1oGQnc1OI3XSXI_M2KJtInw-iFV675ee98doZrpgWAEHnDycBcnQ_4FnCEG4Aypf-1GxhMEHeUpNDJotQTuDRW-oGFz5-VQ7tiYojd0Mr3Hiodtta75NyYIm09vxCfH4R79vmpQdnRjTFKUgRXiQ4TiEv7XLh4Q1xvOwLm1S6zzb5X_KxCOxhHGcUeak9KOc4yI58otK8Yrin9F0Xew54k8mJ9r4ET5owpRA_XNdQQFGTVuaZW6DlqOSwh5Iy1DLcHV_cKHr6mS6qe0vLqsW89VOl9vGfDbg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-06-27 06:59:39,719:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-06-27 06:59:39,719:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 04:59:39 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824568847 Replay-Nonce: 1VRjeNN9d0sySEJ3lYMn0ocf57UE7LdOcTwXVdqUigahUyG9E_c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:42Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986101167" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824568847" } 2024-06-27 06:59:39,720:DEBUG:acme.client:Storing nonce: 1VRjeNN9d0sySEJ3lYMn0ocf57UE7LdOcTwXVdqUigahUyG9E_c 2024-06-27 06:59:39,720:DEBUG:acme.client:JWS payload: b'' 2024-06-27 06:59:39,727:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986101167: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVZSamVOTjlkMHN5U0VKM2xZTW4wb2NmNTdVRTdMZE9jVHdYVmRxVWlnYWhVeUc5RV9jIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYxMDExNjcifQ", "signature": "Qdswnk_1c_xvJXl275iOY-QXTeOFNRy4G7x1Pyb-fENdctL-bjbqpq22KjumyBSjDmDJ2SagnVgSIlNaccQdoaZZ-IJk2yPB8L07mYIlYl52khqVrhjfk0AH2ZmnOPU4fdgJN3rmAG2h9Wdt-v1ob00WRxDrVP_bz4I6Oo-XS_OKtY5L9mMlcuPh7_gqF3i18uMYAX3O7H0-SKh_diML_MAwC-wHeTdTv0sjFHEmp6pV1_AftXimWiJNWYmARr4m71J9O7RTQwHTWkcfvktTQ1jFLRXEt-Tgw7_DGKGdQGBSwKNPMIplElGUo2xXB0lpUc0g0LG0Zj4xJ09r4_7bsA", "payload": "" } 2024-06-27 06:59:39,891:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986101167 HTTP/1.1" 200 805 2024-06-27 06:59:39,892:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:59:39 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1VRjeNN9pOCL8H9dWwCpjeVpPWg-wnyTvR_jJsxPeRfufzfQMFI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:42Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/nlLFxg", "status": "pending", "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/mOuqMg", "status": "pending", "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/b0ZrJg", "status": "pending", "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q" } ] } 2024-06-27 06:59:39,892:DEBUG:acme.client:Storing nonce: 1VRjeNN9pOCL8H9dWwCpjeVpPWg-wnyTvR_jJsxPeRfufzfQMFI 2024-06-27 06:59:39,893:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-27 06:59:39,894:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-06-27 06:59:39,895:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-27 06:59:39,895:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-27 06:59:39,897:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 06:59:39,897:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-27 06:59:39,898:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-27 06:59:39,898:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-27 06:59:39,900:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 06:59:39,951:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-27 06:59:40,167:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-27 06:59:40,169:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-06-27 06:59:40,170:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-06-27 06:59:40,175:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:37 UTC. 2024-06-27 06:59:40,175:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-27 06:59:40,175:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-27 06:59:40,181:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-27 06:59:40,181:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-27 06:59:40,181:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-27 06:59:40,185:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-27 06:59:40,186:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-27 06:59:40,188:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-27 06:59:40,632:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-27 06:59:40,633:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:59:40 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "LSUt4CfweYU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-27 06:59:40,634:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-27 06:59:45,189:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7987_key-certbot.pem 2024-06-27 06:59:49,628:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7985_csr-certbot.pem 2024-06-27 06:59:49,628:DEBUG:acme.client:Requesting fresh nonce 2024-06-27 06:59:49,629:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-27 06:59:49,778:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-27 06:59:49,780:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:59:49 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1VRjeNN9c8fyVBWZZrJHJlSYEw2ZYtUKN-dPUCXrtGmFpYG7rvI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-27 06:59:49,780:DEBUG:acme.client:Storing nonce: 1VRjeNN9c8fyVBWZZrJHJlSYEw2ZYtUKN-dPUCXrtGmFpYG7rvI 2024-06-27 06:59:49,781:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-06-27 06:59:49,794:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVZSamVOTjljOGZ5VkJXWlpySkhKbFNZRXcyWll0VUtOLWRQVUNYcnRHbUZwWUc3cnZJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "YbYoHuS6_N31iPS5YePTHV3ahd-9s1lXjqT4fZxvRWbmtbj0ITby6T6C0yoLT6M2fwDhPgW-jGAfwg-1a0wxT0JQdER-IARr0o6_4QskKxAvJVo7G1aLENFPSKKj0VHl3WAWke7Hhganx8MfoUOpnmosVep7p1rs4yLwjH2xtYZx9hOxitplcIjZcbn5XgAw4_VAQov8YiRncAZdn4V2hopVZ-yBlFRPIG5Y7imaetrK_hp79TQA9gLdn35tj-rvnICR1UOTr3IxfXjxuJ9wxiHQoZZBloZSBDGliOoLVgw-WCiUZ-vVmxnWnDsrHS_XtLgk3jPfeHhY4jI6uKC7aA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-06-27 06:59:49,962:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-06-27 06:59:49,963:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 27 Jun 2024 04:59:49 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824603047 Replay-Nonce: lCR6it1ECaByTBNmaKjXz1uXM0QgQBWI6LzzjADOoVqkKaV14t8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:53Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986156647" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824603047" } 2024-06-27 06:59:49,963:DEBUG:acme.client:Storing nonce: lCR6it1ECaByTBNmaKjXz1uXM0QgQBWI6LzzjADOoVqkKaV14t8 2024-06-27 06:59:49,963:DEBUG:acme.client:JWS payload: b'' 2024-06-27 06:59:49,969:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986156647: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibENSNml0MUVDYUJ5VEJObWFLalh6MXVYTTBRZ1FCV0k2THp6akFET29WcWtLYVYxNHQ4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYxNTY2NDcifQ", "signature": "NHcU877olutEZq9aununPkxVY-kzPe96FDPJ7mNx_6JSSKVYOIxTF-ZjZ_ut3coc2GYlmHb4kelCgrKkn3f5WgBK_l7SdCJ1Ifc9iaqQC0VE0Y2RxO7spTs1b_XolsQIOWzg7vA4zEgBq0u-90MoBHDz_gV_kPIj0_7E8z0ibH9vk_A2Z3UTfLlcp0JDBqysLeVYO-hFmELnBhBvlvhFvw-l_SBy-5SJIjQ6J1woP5zCMsLTFmpEFjF2XnSaV1iElZw43zh308cftWoqlFy5AiNM2WKTa13VP9Nf1_4SCeQYXFX5Sn1OtZMg2FO0xeT4eahsUqvA3a2NwIC1t2sq9w", "payload": "" } 2024-06-27 06:59:50,128:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986156647 HTTP/1.1" 200 805 2024-06-27 06:59:50,129:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 27 Jun 2024 04:59:49 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1VRjeNN98LzGJMsBRcJLk6Neb0sMW2URYt_vwRZt9KpK54Qah1I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:53Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/B3rfNg", "status": "pending", "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/ZEHm3Q", "status": "pending", "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/xivawQ", "status": "pending", "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk" } ] } 2024-06-27 06:59:50,130:DEBUG:acme.client:Storing nonce: 1VRjeNN98LzGJMsBRcJLk6Neb0sMW2URYt_vwRZt9KpK54Qah1I 2024-06-27 06:59:50,131:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-27 06:59:50,132:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-06-27 06:59:50,133:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-27 06:59:50,133:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-27 06:59:50,135:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 06:59:50,136:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-27 06:59:50,136:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-27 06:59:50,137:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-27 06:59:50,139:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-27 06:59:50,139:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-06-27 06:59:50,139:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-06-27 06:59:50,150:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-06-27 06:59:50,153:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)