2024-06-26 18:36:23,831:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-06-26 18:36:23,832:DEBUG:certbot._internal.main:Arguments: [] 2024-06-26 18:36:23,832:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-06-26 18:36:24,623:DEBUG:certbot._internal.log:Root logging level set at 20 2024-06-26 18:36:24,623:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-06-26 18:36:24,660:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-06-26 18:36:24,707:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-26 18:36:24,947:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-26 18:36:24,961:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2024-06-26 18:36:24,966:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2024-06-26 18:36:24,974:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:12 UTC. 2024-06-26 18:36:24,974:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-26 18:36:24,974:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-26 18:36:24,979:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-26 18:36:24,979:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-26 18:36:24,980:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-26 18:36:24,986:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-26 18:36:24,987:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-26 18:36:24,989:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-26 18:36:25,474:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-26 18:36:25,475:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:36:18 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "bIOXPcYmhBs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-26 18:36:25,476:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-26 18:36:30,729:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7962_key-certbot.pem 2024-06-26 18:36:35,367:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7960_csr-certbot.pem 2024-06-26 18:36:35,367:DEBUG:acme.client:Requesting fresh nonce 2024-06-26 18:36:35,367:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-26 18:36:35,523:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-26 18:36:35,524:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:36:28 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: WDMSYcqS_P-lMDqcMzozAD3wwEhBY4kPqI5dDWlHqIpXarLrDa4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-26 18:36:35,524:DEBUG:acme.client:Storing nonce: WDMSYcqS_P-lMDqcMzozAD3wwEhBY4kPqI5dDWlHqIpXarLrDa4 2024-06-26 18:36:35,525:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-06-26 18:36:35,532:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV0RNU1ljcVNfUC1sTURxY016b3pBRDN3d0VoQlk0a1BxSTVkRFdsSHFJcFhhckxyRGE0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "DMHvwjH35HS7oHLRWn3JILeSI0-35foAsegDTSCa7fUbHlWZWzwaynQTK0J8pQXsSpP3hO5rV55sKkO7Jcvpf29cNWGxSjQ4VcG32QheaTjULf5KX7tJ7Oz-cr7RfeGYcta5u3SMxuTPsbvRMJP2jzeFnOjc8Ls5JT7IeZQJ6yvF95ZTUjBB8JLabtoPK5VzxRWxLQJubfJEk1zRDUSIzVxIOqPAK9a2okZGPBbdtap4T0SypQSP33QsCDFUt5-sfryuD709ePSipe8ixHK6hip1MXqGIRhZZ_KUWbGAFYg-1ccjNHLFY3aVdoxJBNzL9x7B76m9DYFABQ2wehQIcA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-06-26 18:36:35,701:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-06-26 18:36:35,702:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 26 Jun 2024 16:36:29 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824128037 Replay-Nonce: WDMSYcqS4ubBtpauxick-abx7I47mb92ErXAOPyPi_vez1ZPXOY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:00:50Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985446737" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824128037" } 2024-06-26 18:36:35,702:DEBUG:acme.client:Storing nonce: WDMSYcqS4ubBtpauxick-abx7I47mb92ErXAOPyPi_vez1ZPXOY 2024-06-26 18:36:35,702:DEBUG:acme.client:JWS payload: b'' 2024-06-26 18:36:35,709:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985446737: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV0RNU1ljcVM0dWJCdHBhdXhpY2stYWJ4N0k0N21iOTJFclhBT1B5UGlfdmV6MVpQWE9ZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU0NDY3MzcifQ", "signature": "WQn6SbKHKiAjisOmOMxphHqjpTl7YJylrxnegxLJcNHlIV8Qk8mj7Vsh0rBKrhC7gga4y9te-osZ0jPi8vmB5iCvMSkjOm2oMeo4whgQnar_PHqYAsm09GyKITmxm05qK9K-Ti6CYRfHycRGvUu2ZkRqL7r6_bHC5uAe1YsyFHl3xnamBkEBfNuoJPvh8pLIyy18I6jHY3WL8C3BXww3phTxtzDpuf4SOkIeTr8gBYdJI7ZW3YaoDEREw3xd8NtnCqhI-ESdDCtMMjkcLyM5DXWbbZzFfwlPKsa9Db0pVMIeicUnB6Q3wwifIkR5HuHEY7FSQOMNloqJIgtySANF_A", "payload": "" } 2024-06-26 18:36:35,870:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985446737 HTTP/1.1" 200 810 2024-06-26 18:36:35,871:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:36:29 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 8AH9ZZ0oY9un6-tXkYvZGRcGMeVFtqGeYOHpltLQrWYCVnJxL8o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:00:50Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/KAQe7Q", "status": "pending", "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/Sd6_7w", "status": "pending", "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/Ra3-nA", "status": "pending", "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ" } ] } 2024-06-26 18:36:35,872:DEBUG:acme.client:Storing nonce: 8AH9ZZ0oY9un6-tXkYvZGRcGMeVFtqGeYOHpltLQrWYCVnJxL8o 2024-06-26 18:36:35,872:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-26 18:36:35,873:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-06-26 18:36:35,873:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-26 18:36:35,873:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-26 18:36:35,887:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-26 18:36:35,887:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-26 18:36:35,887:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-26 18:36:35,888:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-26 18:36:35,893:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-26 18:36:35,936:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-26 18:36:36,144:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-26 18:36:36,146:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-26 18:36:36,146:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-26 18:36:36,150:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:26 UTC. 2024-06-26 18:36:36,151:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-26 18:36:36,151:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-26 18:36:36,156:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-26 18:36:36,156:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-26 18:36:36,156:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-26 18:36:36,172:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-26 18:36:36,173:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-26 18:36:36,176:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-26 18:36:36,663:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-26 18:36:36,664:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:36:30 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "vwrrXM44_8Q": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-06-26 18:36:36,665:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-26 18:36:41,292:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7963_key-certbot.pem 2024-06-26 18:36:45,688:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7961_csr-certbot.pem 2024-06-26 18:36:45,689:DEBUG:acme.client:Requesting fresh nonce 2024-06-26 18:36:45,689:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-26 18:36:45,852:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-26 18:36:45,852:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:36:39 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 8AH9ZZ0oWxsSDRWt4YndYIy-d19jcBofBsUFALr1SV5Cs1XP69Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-26 18:36:45,852:DEBUG:acme.client:Storing nonce: 8AH9ZZ0oWxsSDRWt4YndYIy-d19jcBofBsUFALr1SV5Cs1XP69Y 2024-06-26 18:36:45,853:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-06-26 18:36:45,859:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOEFIOVpaMG9XeHNTRFJXdDRZbmRZSXktZDE5amNCb2ZCc1VGQUxyMVNWNUNzMVhQNjlZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ikhhsxJ8xLoserJQP3cf8RJyD1WCTLQEi028lyoNVILiZQ4WtIfCT3qyaHGqzAzBdCYqVfqsRuMIRQsw2PlHMprj4riepEach_eNu7y43eNUUB5eE2MQ0k78lLDguJv5QcZkZaHTECmZaOj4s-p1T8qKqNl4GrovA01Rds7UWClmbaVIWbxkha4Fv4tcFozCZE5qnRaYDrnnRk8p2K_fb1cYzdrIVzeQX9_znvPu8cY-83-s2k0uX8W373TGdf-ZYYbNqS8F0tzX237pxXLAxPlVWezMA4iKBuWbvT1hjUJzfY0zVFbRNAXSoM07ZhQlmDeeiljmZts8lReb3QS23A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-06-26 18:36:46,030:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-06-26 18:36:46,031:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 26 Jun 2024 16:36:39 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824165847 Replay-Nonce: 8AH9ZZ0oD6rB-mDU40qY-UJcCsFQh8EP04tWsgaYlAi9v9XNad4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:01Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985503087" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824165847" } 2024-06-26 18:36:46,032:DEBUG:acme.client:Storing nonce: 8AH9ZZ0oD6rB-mDU40qY-UJcCsFQh8EP04tWsgaYlAi9v9XNad4 2024-06-26 18:36:46,032:DEBUG:acme.client:JWS payload: b'' 2024-06-26 18:36:46,042:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985503087: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOEFIOVpaMG9ENnJCLW1EVTQwcVktVUpjQ3NGUWg4RVAwNHRXc2dhWWxBaTl2OVhOYWQ0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU1MDMwODcifQ", "signature": "DQv1kLb9sFCffPTRKrGr2A-Bs7xesox311PsXDgRPB5ebFUy4YRdPXXEdqBfzTjw3xA95HtPi1t6zCCW7GGGYma2F_vynwWOlbrxETFUACyND87aVqxlJ0srE2ns9gOq5I2OSoTQHSdXFTBLaB56hWCsCDVgBhrBxjNyVVtLWUI1M3C0M6GB2xMLIbh39fN9VYDA_CAynMbLfd0ampCj2B1bwUjJ8AHRgFmLfNXgwzCQMMXnj39WtGSo0Mj0Kee7GCC96626cAOmQYeAIHTMPX5WrT8tBeHk1ylg0d-0I2-DWvCdCRSV5Xbyon_J0ATStILhdtXw3NRzqpl9-KuiXw", "payload": "" } 2024-06-26 18:36:46,207:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985503087 HTTP/1.1" 200 804 2024-06-26 18:36:46,208:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:36:39 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: WDMSYcqSAxQ0w6827XakaCc6s6zBUqp__ifSRjmFECAYD1MaJ58 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:01Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/6TW65g", "status": "pending", "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/HbqBvA", "status": "pending", "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/f36r8w", "status": "pending", "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ" } ] } 2024-06-26 18:36:46,208:DEBUG:acme.client:Storing nonce: WDMSYcqSAxQ0w6827XakaCc6s6zBUqp__ifSRjmFECAYD1MaJ58 2024-06-26 18:36:46,208:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-26 18:36:46,209:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-06-26 18:36:46,209:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-26 18:36:46,209:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-26 18:36:46,210:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-26 18:36:46,210:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-26 18:36:46,210:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-26 18:36:46,211:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-26 18:36:46,212:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-26 18:36:46,264:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-26 18:36:46,530:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-26 18:36:46,531:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-06-26 18:36:46,532:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-06-26 18:36:46,536:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:40 UTC. 2024-06-26 18:36:46,537:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-26 18:36:46,537:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-26 18:36:46,542:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-26 18:36:46,542:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-26 18:36:46,542:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-26 18:36:46,561:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-26 18:36:46,563:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-26 18:36:46,566:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-26 18:36:47,031:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-26 18:36:47,032:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:36:40 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "YGAz6kvaiTo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-26 18:36:47,032:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-26 18:36:51,676:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7964_key-certbot.pem 2024-06-26 18:36:56,061:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7962_csr-certbot.pem 2024-06-26 18:36:56,062:DEBUG:acme.client:Requesting fresh nonce 2024-06-26 18:36:56,062:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-26 18:36:56,217:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-26 18:36:56,218:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:36:49 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: WDMSYcqS2ZbrNvsog0_5XBuD7dBYe8FWnQ2ArvqZ1sQS6Txfxqs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-26 18:36:56,219:DEBUG:acme.client:Storing nonce: WDMSYcqS2ZbrNvsog0_5XBuD7dBYe8FWnQ2ArvqZ1sQS6Txfxqs 2024-06-26 18:36:56,219:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-06-26 18:36:56,228:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV0RNU1ljcVMyWmJyTnZzb2cwXzVYQnVEN2RCWWU4RlduUTJBcnZxWjFzUVM2VHhmeHFzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "uhkwbZYcj5TgMx9dcnxU76hQNIE2f5DlaOm4LW_GcQ6IVoYQTKe9-unvo4vOv701Yb_3-W1Rg9Ymddfc0oQ22hvofSkbSnpPr3DsFQk3LqngMecoIpHhmBQE9sfwTSilwvyd2kqssIfBwXhd4aeJEcCJza2VyIRMYB9sAH1cw-QUEBZqyW5z7xTaCQk20pBy_VqICmZ5QExSm_HPyopXJsivsE7KEX1hRv4WPTpZ1TlIl0Ym4SsYpDE5kZzui1W1cQJvbmFhPzNYyCHFIahEzvLKd2vf9w_pbytMPXcHNBw84DEfhFi5UO-W_A_NWuDnEl_slUpfdegs9oK-qFqAfA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-06-26 18:36:56,396:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-06-26 18:36:56,396:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 26 Jun 2024 16:36:49 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824216467 Replay-Nonce: WDMSYcqSo1rYDJpINwV_8DqBUJpXDvF9P_DmjSOGyioZ2cPQPTA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:11Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985574177" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824216467" } 2024-06-26 18:36:56,397:DEBUG:acme.client:Storing nonce: WDMSYcqSo1rYDJpINwV_8DqBUJpXDvF9P_DmjSOGyioZ2cPQPTA 2024-06-26 18:36:56,398:DEBUG:acme.client:JWS payload: b'' 2024-06-26 18:36:56,407:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985574177: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV0RNU1ljcVNvMXJZREpwSU53Vl84RHFCVUpwWER2RjlQX0RtalNPR3lpb1oyY1BRUFRBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU1NzQxNzcifQ", "signature": "MAHz3Ui6EvJzs-HVSmRMYjCMoeicgnOH78W3Ee4ZkLE5yW_QSjxUpnqwuKHxFx13TIjHzOp04Vaqi2QHmZ8gYkLwbMXnMcS0SJu04q4x7FOWonGbTpEToB1C6u6j7iszm1FTOzxgQgKi8jqpL3reU8wjTrOFicYlLwakbr1UN789257ApW4EnlbVhwOlMgBziZ9K6CTJOjzJ93RcGZuzBhl3Ex5AB1Rkin5lhZHJ4HhJcEo8cXtUY0j2nBVMR3k0unwJhJJLCyIjXuZkiKEOYPLC2nHiYPjdTJcz4p6m8agZjTWMrQGBh5Sv9wCgUUagbZJ_iGW-VLU2QmVQv5Vt_w", "payload": "" } 2024-06-26 18:36:56,568:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985574177 HTTP/1.1" 200 807 2024-06-26 18:36:56,569:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:36:50 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 8AH9ZZ0or0kaC5u1GJTeMadmvn-EY1egfMEcMNUEjI8RD4FoC8M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:11Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/RO51fg", "status": "pending", "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/APGIHQ", "status": "pending", "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/4l4xCQ", "status": "pending", "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs" } ] } 2024-06-26 18:36:56,570:DEBUG:acme.client:Storing nonce: 8AH9ZZ0or0kaC5u1GJTeMadmvn-EY1egfMEcMNUEjI8RD4FoC8M 2024-06-26 18:36:56,571:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-26 18:36:56,572:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-06-26 18:36:56,572:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-26 18:36:56,573:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-26 18:36:56,575:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-26 18:36:56,575:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-26 18:36:56,575:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-26 18:36:56,576:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-26 18:36:56,579:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-26 18:36:56,621:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-26 18:36:56,874:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-26 18:36:56,875:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-26 18:36:56,876:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-26 18:36:56,882:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:54 UTC. 2024-06-26 18:36:56,882:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-26 18:36:56,882:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-26 18:36:56,887:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-26 18:36:56,888:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-26 18:36:56,888:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-26 18:36:56,906:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-26 18:36:56,908:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-26 18:36:56,913:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-26 18:36:57,400:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-26 18:36:57,401:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:36:50 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "QDbzji8c7gc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-26 18:36:57,402:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-26 18:37:02,194:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7965_key-certbot.pem 2024-06-26 18:37:06,751:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7963_csr-certbot.pem 2024-06-26 18:37:06,751:DEBUG:acme.client:Requesting fresh nonce 2024-06-26 18:37:06,751:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-26 18:37:06,912:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-26 18:37:06,912:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:37:00 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: WDMSYcqSqqAbTg-imYLycP0oe7fY8ajmIX-P3flt18ayui5H4h8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-26 18:37:06,913:DEBUG:acme.client:Storing nonce: WDMSYcqSqqAbTg-imYLycP0oe7fY8ajmIX-P3flt18ayui5H4h8 2024-06-26 18:37:06,913:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-06-26 18:37:06,920:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV0RNU1ljcVNxcUFiVGctaW1ZTHljUDBvZTdmWThham1JWC1QM2ZsdDE4YXl1aTVINGg4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "QyihNl_LUnUdbLGV5FrR9J0I048OM-VmjLZE2JRt2yrc4QnAEglisqECq0kgGYbxd89FCYzzgu1zuyPjHQFdY1JT7uLWuuJCJiTIwXTjkJ4BN_fVNlAQR8jdQBV_snKiOmiMpcqqLqd8WCMcflmzs3TuWrjLsHfIfF43US0CJfwO7WDnGkf7DRH0_zXhKC5XB8d5nVFJaB2my8wCAikhsr7yYbgvbkaDtlJ17TCbqutU6Nk98c2mx46NWPWjrHPRDNSP_y4s0OXfRgL-P9Dhvs7ipzO2eL9VN9sMIxgqDyOlpoVH2fgysOF5E-1R8DgE7r3500m1MH4PepAf6-n0iw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-06-26 18:37:07,094:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-06-26 18:37:07,094:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 26 Jun 2024 16:37:00 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824261497 Replay-Nonce: 8AH9ZZ0oQOYX_lrzOecsR0PUL69VtmySGm9hcgkgNBMzDpy00FY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:21Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985640857" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824261497" } 2024-06-26 18:37:07,094:DEBUG:acme.client:Storing nonce: 8AH9ZZ0oQOYX_lrzOecsR0PUL69VtmySGm9hcgkgNBMzDpy00FY 2024-06-26 18:37:07,095:DEBUG:acme.client:JWS payload: b'' 2024-06-26 18:37:07,100:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985640857: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOEFIOVpaMG9RT1lYX2xyek9lY3NSMFBVTDY5VnRteVNHbTloY2drZ05CTXpEcHkwMEZZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU2NDA4NTcifQ", "signature": "a7Mnj0nPT0_ddQ4iYjB4HDU111Fud9EY3iIDaX7YvROhLTV8usoZIYYkpvtHWRDi1HAvv4mhUpZWw8DaUAFemUnAy0vkNKtEQd3GelwfvwHzNU_duPtVFp0fO2duyAyKOj1f-_gWRTLMOcsazeiwqplwMm4WupgZ2lS5SRGdaFxg00X_T2NXEbVAHr3TruZJ6hxzgww3GnSwrzqHwTpcFcit1nKo9dStMOYDKyQ3Cy3ecc-UhTex2xbg38_lPDVIPJ7_63hKkwz7bEzpwxfMio9MRzzNUUgPa0j1wYazZy5hUc7OXwOw004gPSuIX8fuBvgSmq6IQop81A8vu_u_7w", "payload": "" } 2024-06-26 18:37:07,268:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985640857 HTTP/1.1" 200 801 2024-06-26 18:37:07,269:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:37:00 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: WDMSYcqS9qoAt-VYM7GdL8_5SaGi83vgbLLsBRdeijZ4_TOBFs0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:21Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/_W_uNw", "status": "pending", "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/1XcAQA", "status": "pending", "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/a1s51Q", "status": "pending", "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs" } ] } 2024-06-26 18:37:07,269:DEBUG:acme.client:Storing nonce: WDMSYcqS9qoAt-VYM7GdL8_5SaGi83vgbLLsBRdeijZ4_TOBFs0 2024-06-26 18:37:07,271:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-26 18:37:07,271:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-06-26 18:37:07,272:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-26 18:37:07,273:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-26 18:37:07,274:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-26 18:37:07,275:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-26 18:37:07,275:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-26 18:37:07,276:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-26 18:37:07,279:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-26 18:37:07,329:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-26 18:37:07,545:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-26 18:37:07,548:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-26 18:37:07,550:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-26 18:37:07,554:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:09 UTC. 2024-06-26 18:37:07,555:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-26 18:37:07,555:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-26 18:37:07,559:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-26 18:37:07,559:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-26 18:37:07,559:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-26 18:37:07,575:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-26 18:37:07,576:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-26 18:37:07,579:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-26 18:37:08,062:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-26 18:37:08,063:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:37:01 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "eEJDys-C5iY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-26 18:37:08,064:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-26 18:37:12,540:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7966_key-certbot.pem 2024-06-26 18:37:16,942:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7964_csr-certbot.pem 2024-06-26 18:37:16,942:DEBUG:acme.client:Requesting fresh nonce 2024-06-26 18:37:16,943:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-26 18:37:17,104:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-26 18:37:17,104:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:37:10 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: WDMSYcqSA2eksT_hGTn6wJ8-lHTRrbn-o9xDlLJtPXL5KxSgKVE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-26 18:37:17,105:DEBUG:acme.client:Storing nonce: WDMSYcqSA2eksT_hGTn6wJ8-lHTRrbn-o9xDlLJtPXL5KxSgKVE 2024-06-26 18:37:17,105:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-06-26 18:37:17,112:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV0RNU1ljcVNBMmVrc1RfaEdUbjZ3SjgtbEhUUnJibi1vOXhEbExKdFBYTDVLeFNnS1ZFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "o8zRnC9B3aGgqDDS0ZdeAVYUKjnC1T3mKtwbZFOKZx9Ox3AdnUKgGcQvzeekfSpRyb85ifGZGvey9ephN3yZJzXdVXoyZXhg3sC4pVJjVzdpkPfCWp384KUrcDkh7ywI7yhqEUaMf_wr9GqQfPzPqz_wrYOP6z3pgmAj9sW-1H62VJ5ZjVsRq1CBulTBZOsndTs7VUF3AeJ8JTb7PoKYcVpokNsmnGGkBgEEXKRSNTT8ZZUWv0GOvDcuLSHj129UtdPfJZLE3OOOe4ULhIpQElqpVbJGGxujioPVAin-X4KGO-C_9lC6ERENpnqhkEkMS5lcFzTtngktGtw-MM-zRA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-06-26 18:37:17,360:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-06-26 18:37:17,361:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 26 Jun 2024 16:37:10 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824300277 Replay-Nonce: WDMSYcqSACJJpY2_XQR0bOADLJYIV5eSHg-sHeRGKYacB8ZDzkw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:31Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985696127" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824300277" } 2024-06-26 18:37:17,362:DEBUG:acme.client:Storing nonce: WDMSYcqSACJJpY2_XQR0bOADLJYIV5eSHg-sHeRGKYacB8ZDzkw 2024-06-26 18:37:17,362:DEBUG:acme.client:JWS payload: b'' 2024-06-26 18:37:17,375:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985696127: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV0RNU1ljcVNBQ0pKcFkyX1hRUjBiT0FETEpZSVY1ZVNIZy1zSGVSR0tZYWNCOFpEemt3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU2OTYxMjcifQ", "signature": "hYnS0VDK2nYjN_Jem9YbUKGXWLjIVeA01Hf-Y0h5UJatr1vdxVDwvmH5kBdxO4frFZKOv37BI9Ts1dxQ259-URVJKqHJE564bLRc3hninbQx77WZ-oVRGvWDCNYIVlpx0xncrTBy22CILQm0x4r_NFFh4yi-8XzB1nDChvQQXA5lOWoZi7PYEqXxDcJ8v_OBYedpW6f496CryX5-0Onux8DXLs41JzQBWT5vFyLnvxQtFpEI-sEbaD6NIV92XEaShjjZ_C7AoU0ipe9QzqJGP7j3hqt4Z4NdBFfNt_tNakHCRuVrDwaDh--zFRu1FX6jhvnxeIybkpBd9P_csy26ZA", "payload": "" } 2024-06-26 18:37:17,543:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985696127 HTTP/1.1" 200 805 2024-06-26 18:37:17,545:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:37:10 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 8AH9ZZ0oNDShJ0ysJGkyAPQHKJ9HmsYg6QLAdEPYToRrnGqXbmo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:31Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/p3DiTg", "status": "pending", "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/dn4kZw", "status": "pending", "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/A2Vu8Q", "status": "pending", "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU" } ] } 2024-06-26 18:37:17,545:DEBUG:acme.client:Storing nonce: 8AH9ZZ0oNDShJ0ysJGkyAPQHKJ9HmsYg6QLAdEPYToRrnGqXbmo 2024-06-26 18:37:17,546:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-26 18:37:17,547:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-06-26 18:37:17,548:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-26 18:37:17,548:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-26 18:37:17,550:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-26 18:37:17,550:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-26 18:37:17,550:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-26 18:37:17,551:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-26 18:37:17,554:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-26 18:37:17,603:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-26 18:37:17,811:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-26 18:37:17,812:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-06-26 18:37:17,812:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-06-26 18:37:17,817:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:26 UTC. 2024-06-26 18:37:17,817:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-26 18:37:17,818:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-26 18:37:17,827:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-26 18:37:17,827:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-26 18:37:17,827:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-26 18:37:17,843:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-26 18:37:17,844:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-26 18:37:17,847:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-26 18:37:18,281:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-26 18:37:18,282:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:37:11 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "qx4AA-cMFQY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-26 18:37:18,284:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-26 18:37:22,780:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7967_key-certbot.pem 2024-06-26 18:37:27,135:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7965_csr-certbot.pem 2024-06-26 18:37:27,136:DEBUG:acme.client:Requesting fresh nonce 2024-06-26 18:37:27,136:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-26 18:37:27,282:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-26 18:37:27,283:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:37:20 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1VRjeNN9QTc-6BotE4iZd97tWCmag32PPNcIkujqiZeT-e_57is X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-26 18:37:27,283:DEBUG:acme.client:Storing nonce: 1VRjeNN9QTc-6BotE4iZd97tWCmag32PPNcIkujqiZeT-e_57is 2024-06-26 18:37:27,284:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-06-26 18:37:27,293:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVZSamVOTjlRVGMtNkJvdEU0aVpkOTd0V0NtYWczMlBQTmNJa3VqcWlaZVQtZV81N2lzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "DWvRziETYMSx1cP1WHi5Pwd8pm6fvFLLkwQ374L58qEs8wWXXEBctANklNx7ELiQkCd10z4ZNcFf2kbM5viKf7btqz4IiIZFZkuRd4e_g7aL8hVVgvR4iJWmZp6TRSyAgLfM0m7_4X39fYhfWV0e2WdtYu1zTk3PZFMiJ7A5ekR6qXWWyqUGIOI6cish2OuI0LVERl8DtbyVKSFF2ts8AOsDk2FCqpQkuTEC1-JSiRJNGMuuTJbG_Gemhv9xq6U06A5euazlWCFA7wrTzafmXubGvj_XLg9-M28OUxxac3X10-Gg6sqaVtRGS7tjtEOPTNmfSyzKdzb-sysN_actpA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-06-26 18:37:27,453:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-06-26 18:37:27,454:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 26 Jun 2024 16:37:20 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824334367 Replay-Nonce: 1VRjeNN9eNkeB-J9nPfgIp15SHrCPWXgPyz-lJmBfU7IELlwIXc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:41Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985747117" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824334367" } 2024-06-26 18:37:27,455:DEBUG:acme.client:Storing nonce: 1VRjeNN9eNkeB-J9nPfgIp15SHrCPWXgPyz-lJmBfU7IELlwIXc 2024-06-26 18:37:27,455:DEBUG:acme.client:JWS payload: b'' 2024-06-26 18:37:27,461:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985747117: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVZSamVOTjllTmtlQi1KOW5QZmdJcDE1U0hyQ1BXWGdQeXotbEptQmZVN0lFTGx3SVhjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU3NDcxMTcifQ", "signature": "fAtNdp4Gn7PMJv7RQ0lNdN1HNr7Fpdldkq807du8mfYLPmgt6kGgfl5qH7CgNX6zet-jZcCWaHtyINSwQj3Oiln1pSsSI2arhUlzQZjTOo4tmO5UfYKjYwY5oNk45OhSlKIYvJ6TaocIeLltDrLmsLFjb5yXMnEsc4AwhiPCqlyO0ZwdRaMRm-c_xvok8qtB4AEDLzyNFM50T4qx5LkmEbkW19xSeo23VVFzUaPOyD91b3nDj1Z6hOs_JIFqHWJI9RfgdMQXc_HKsmlrsJPrMnlaeBWE3tecl3BLB3AxU-KvDOMAU9Nse5g_PegYURGs1dwwVlO2ABa4a7FO1R56Ng", "payload": "" } 2024-06-26 18:37:27,613:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985747117 HTTP/1.1" 200 809 2024-06-26 18:37:27,613:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:37:21 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: lCR6it1ET4QEiI_0MPZxnFxU7zf74MKdPcJhwkarTxG7P6jf2qE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:41Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/NIFDhg", "status": "pending", "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/1iYgbg", "status": "pending", "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/elhV3g", "status": "pending", "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY" } ] } 2024-06-26 18:37:27,613:DEBUG:acme.client:Storing nonce: lCR6it1ET4QEiI_0MPZxnFxU7zf74MKdPcJhwkarTxG7P6jf2qE 2024-06-26 18:37:27,614:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-26 18:37:27,614:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-06-26 18:37:27,615:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-26 18:37:27,616:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-26 18:37:27,616:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-26 18:37:27,617:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-26 18:37:27,617:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-26 18:37:27,617:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-26 18:37:27,619:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-26 18:37:27,667:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-26 18:37:27,857:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-26 18:37:27,858:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is signed by the certificate's issuer. 2024-06-26 18:37:27,859:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD 2024-06-26 18:37:27,863:INFO:certbot._internal.renewal:Cert not yet due for renewal 2024-06-26 18:37:27,867:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-26 18:37:27,924:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-26 18:37:28,336:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-26 18:37:28,338:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-26 18:37:28,339:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-26 18:37:28,344:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:40 UTC. 2024-06-26 18:37:28,345:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-26 18:37:28,345:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-26 18:37:28,356:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-26 18:37:28,356:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-26 18:37:28,356:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-26 18:37:28,372:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-26 18:37:28,373:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-26 18:37:28,375:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-26 18:37:28,841:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-26 18:37:28,842:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:37:22 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "JffkY63MHoA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-26 18:37:28,843:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-26 18:37:33,706:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7968_key-certbot.pem 2024-06-26 18:37:38,114:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7966_csr-certbot.pem 2024-06-26 18:37:38,115:DEBUG:acme.client:Requesting fresh nonce 2024-06-26 18:37:38,115:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-26 18:37:38,277:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-26 18:37:38,278:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:37:31 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: WDMSYcqSTnOf4p61xziIVbCeKn4k8AC5RXOkMToJ_3aHuIc01_g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-26 18:37:38,278:DEBUG:acme.client:Storing nonce: WDMSYcqSTnOf4p61xziIVbCeKn4k8AC5RXOkMToJ_3aHuIc01_g 2024-06-26 18:37:38,279:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-06-26 18:37:38,287:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV0RNU1ljcVNUbk9mNHA2MXh6aUlWYkNlS240azhBQzVSWE9rTVRvSl8zYUh1SWMwMV9nIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Yx3UNCAaHf2PitOIg4IODYTNMKytR6OQOvFfMOH9fkpieYvOSfF23SX4F9U4G71xO1hMmRb4KsErI2mtjB6sipxlMWN_6R51A1A2zksfbiImRYB0lkbe-M992BVYO2wWe1xZR8PpoDX_wadxH9_zZeob80G_sYNw_qn4XHOgcyJ6Fsw56AzTHPLEbHfr6JVMh2AE1XGM5SVPo5amLbl2cREicoujERFXsG_oAKoS4u94J85xfAcLUp_AZkiB4lyMX0rkGRMSTyPxUz4UOCx7mPRQefmrDcAu0C-wNcQ3ufiv0IILCbyJSZh867enew2gnRJj4iKIPFM8yx7h9mlN1g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-06-26 18:37:38,456:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-06-26 18:37:38,457:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 26 Jun 2024 16:37:31 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824371297 Replay-Nonce: 8AH9ZZ0okWIMlZ6btKom2q0Co3e0mcq-lIrdugQYKE_-u1UrCUY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:52Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985803767" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824371297" } 2024-06-26 18:37:38,458:DEBUG:acme.client:Storing nonce: 8AH9ZZ0okWIMlZ6btKom2q0Co3e0mcq-lIrdugQYKE_-u1UrCUY 2024-06-26 18:37:38,459:DEBUG:acme.client:JWS payload: b'' 2024-06-26 18:37:38,469:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985803767: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOEFIOVpaMG9rV0lNbFo2YnRLb20ycTBDbzNlMG1jcS1sSXJkdWdRWUtFXy11MVVyQ1VZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU4MDM3NjcifQ", "signature": "fPmFd-_sGbbdGgJ4yym3zdfuU1MIHWcEF0L8vPerna3GZbPXDTXma6MOvr6AuE9UVoHwlaS-syX1OYhKShtvmaj0YTcHrJp3r3DRf_KynW0T-VwSnifIjrW6-W5aev0V8pwYC_9f8Hjj4RPMyUQeNUaNzBFBNG2Umha9lQgV7fiGgb0FTM9SfsF5BnzOOLvFzCZo8ih6MFGlSIzsjUXU1e6UJuwX4rI-OegWS9vWUEHumwKoqp0xTpk5SWNtkBQ6PfgIwrnU9xwa4zPxww4Led6gF3GX4Pf7XzpLpAFy0RYX9iMb-6oYoobOLoJGv-19dWqfZDGzWaHheCpkQ_ncCg", "payload": "" } 2024-06-26 18:37:38,632:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985803767 HTTP/1.1" 200 806 2024-06-26 18:37:38,633:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:37:32 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: WDMSYcqSBs2y42ZLxCBGDKlrRjkq0SyP5DoLEUUdWAx-dpFgiog X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:52Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/DP175w", "status": "pending", "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/kAzjPg", "status": "pending", "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/-Uec4A", "status": "pending", "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0" } ] } 2024-06-26 18:37:38,633:DEBUG:acme.client:Storing nonce: WDMSYcqSBs2y42ZLxCBGDKlrRjkq0SyP5DoLEUUdWAx-dpFgiog 2024-06-26 18:37:38,634:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-26 18:37:38,634:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-06-26 18:37:38,635:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-26 18:37:38,635:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-26 18:37:38,636:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-26 18:37:38,636:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-26 18:37:38,636:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-26 18:37:38,637:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-26 18:37:38,638:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-26 18:37:38,678:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-06-26 18:37:38,678:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-26 18:37:38,678:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-06-26 18:37:38,684:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-06-26 18:37:38,686:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-06-26 18:37:38,687:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-06-26 18:37:38,687:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-06-26 18:37:38,687:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-06-26 18:37:38,689:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-06-26 18:37:38,729:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-26 18:37:38,924:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-26 18:37:38,927:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-26 18:37:38,928:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-26 18:37:38,934:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:58 UTC. 2024-06-26 18:37:38,934:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-26 18:37:38,934:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-26 18:37:38,939:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-26 18:37:38,939:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-26 18:37:38,940:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-26 18:37:38,955:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-26 18:37:38,957:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-26 18:37:38,960:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-26 18:37:39,401:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-26 18:37:39,402:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:37:32 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "f8xffQ3TGpw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-26 18:37:39,403:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-26 18:37:43,884:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7969_key-certbot.pem 2024-06-26 18:37:48,254:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7967_csr-certbot.pem 2024-06-26 18:37:48,255:DEBUG:acme.client:Requesting fresh nonce 2024-06-26 18:37:48,255:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-26 18:37:48,401:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-26 18:37:48,402:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:37:41 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1VRjeNN9V-hwb_kPvvhsbNU6MFYOAaIsliLBqQcMMfblEHbSxw4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-26 18:37:48,403:DEBUG:acme.client:Storing nonce: 1VRjeNN9V-hwb_kPvvhsbNU6MFYOAaIsliLBqQcMMfblEHbSxw4 2024-06-26 18:37:48,403:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-06-26 18:37:48,412:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVZSamVOTjlWLWh3Yl9rUHZ2aHNiTlU2TUZZT0FhSXNsaUxCcVFjTU1mYmxFSGJTeHc0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "lWh2oobYy2XssaCFQEP4pydi6EChfY8p96hwfv8USzat787nINK8JcKsKqmmFLKEwu-bejyE_OcQptBJdgNgS9yVcGJfGH6jyiwV9MQrWgLiUU9sQaZIO56weobcFqqL5SvPAmfRoRRYsZEXXj4SCN51IbMR9dfWSLQLBj9lZv1HvXUSHHDWIMt-l7gJr9TuwmnS8h4VrHBOuoqYdSRORijqbjMWuOc9mqLWV3YmFZKJ0A_2idOIRkC4QzpjMx0_C7kC4T52kzW5OICA9nBLDyWwPtwx316IP4e5UlT2PB29TByMSWd5hbDE2w-2GLKEo3YEeSTe3Sa6-H3Ey19m1g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-06-26 18:37:48,571:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-06-26 18:37:48,572:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 26 Jun 2024 16:37:42 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824405187 Replay-Nonce: lCR6it1EMBnocyuD8t4FKASmocb9C3cTeinFFt4W8K9d99s3KmE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:01Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985856047" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824405187" } 2024-06-26 18:37:48,573:DEBUG:acme.client:Storing nonce: lCR6it1EMBnocyuD8t4FKASmocb9C3cTeinFFt4W8K9d99s3KmE 2024-06-26 18:37:48,573:DEBUG:acme.client:JWS payload: b'' 2024-06-26 18:37:48,580:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985856047: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibENSNml0MUVNQm5vY3l1RDh0NEZLQVNtb2NiOUMzY1RlaW5GRnQ0VzhLOWQ5OXMzS21FIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU4NTYwNDcifQ", "signature": "xGM_MxJvHLI-h82OvBfdJ_hi_1eLp2aGzhGWF1obm3yKZQjfgpAayUoUWL_VJP90mbrBCAmUpavJ6tVO9Kf4dVjh3OyI50kt054jmZmyGa7XQmmh4qyZA4Gl86BsXoXEdf_4HOXJZkkmh2b0Q7koJozcRAhVgcSINce_oCYIAkUlxR6jkJw4mirK9bGwGYoBFaoiBhfMebI3uPBoEp5IVddnA5SeCLeJGWNn8WITyqSi_22KwUSIUJx2TgW61XNk2TGQQmzVJjgSVkreQfDXH-kqHTNHwwHRblgOZpJemXTsOJX7TTMXrBQ8Q0namoiwYMuXFzszMog_L2yYPLx5xQ", "payload": "" } 2024-06-26 18:37:48,729:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985856047 HTTP/1.1" 200 811 2024-06-26 18:37:48,730:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:37:42 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1VRjeNN9KVx6xMfMquKf3tvM2xOUsoRvQjWnjlcvw9IASnc6e8I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:01Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/ZygfgQ", "status": "pending", "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/f5kJqg", "status": "pending", "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/OgjqNA", "status": "pending", "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s" } ] } 2024-06-26 18:37:48,731:DEBUG:acme.client:Storing nonce: 1VRjeNN9KVx6xMfMquKf3tvM2xOUsoRvQjWnjlcvw9IASnc6e8I 2024-06-26 18:37:48,732:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-26 18:37:48,732:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-06-26 18:37:48,734:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-26 18:37:48,734:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-26 18:37:48,735:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-26 18:37:48,735:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-26 18:37:48,735:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-26 18:37:48,736:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-26 18:37:48,737:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-26 18:37:48,787:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-26 18:37:49,161:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-26 18:37:49,162:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-26 18:37:49,163:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-26 18:37:49,169:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:15 UTC. 2024-06-26 18:37:49,169:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-26 18:37:49,169:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-26 18:37:49,175:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-26 18:37:49,176:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-26 18:37:49,176:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-26 18:37:49,191:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-26 18:37:49,192:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-26 18:37:49,194:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-26 18:37:49,674:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-26 18:37:49,675:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:37:43 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "pgQW0j51EoY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-26 18:37:49,675:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-26 18:37:54,296:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7970_key-certbot.pem 2024-06-26 18:37:58,572:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7968_csr-certbot.pem 2024-06-26 18:37:58,573:DEBUG:acme.client:Requesting fresh nonce 2024-06-26 18:37:58,573:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-26 18:37:58,731:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-26 18:37:58,732:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:37:52 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 8AH9ZZ0oaVlOur7fcc2E8A7QqAnziu9QzTzFBUmYCwRjTgdXNl0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-26 18:37:58,732:DEBUG:acme.client:Storing nonce: 8AH9ZZ0oaVlOur7fcc2E8A7QqAnziu9QzTzFBUmYCwRjTgdXNl0 2024-06-26 18:37:58,733:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-06-26 18:37:58,745:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOEFIOVpaMG9hVmxPdXI3ZmNjMkU4QTdRcUFueml1OVF6VHpGQlVtWUN3UmpUZ2RYTmwwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "BhNJK8F-9ZIBlEl2megCZtueiXoSvwCXXkudtLyLsB4ICVW7Xkf-mFikJwC6TgoApDuonn97p-zGSpDCNBXCqL2oNCMhxclfIBTLOPKMvf3qNzsvKQIKJpQsyl0kR4sRMICgs4tamLOC_kj4vYtvSfV-Op72l99Ht95q_u5ArUeppdCDsfH3W8_X_Yp6EdyJDJ3kgReAxkrrMledTj9Qw30xD-6ezcEmfl__AZSERU3kz-hFnp5lDIWlHBFp2OVlGdVjOXsZh1hglgfxWyWEMs-HgvfmTTF5mYrBsxSAHJz1rgLxrbBHITq8ryntnagF-KERTa15FjnG0xNcHZbb_Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-06-26 18:37:58,914:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-06-26 18:37:58,915:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 26 Jun 2024 16:37:52 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824456717 Replay-Nonce: 8AH9ZZ0olWDaTyvhFyJ4eMI3g24sirKoNA-PD9YCRlqsiEHMM-c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:12Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985929937" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824456717" } 2024-06-26 18:37:58,916:DEBUG:acme.client:Storing nonce: 8AH9ZZ0olWDaTyvhFyJ4eMI3g24sirKoNA-PD9YCRlqsiEHMM-c 2024-06-26 18:37:58,916:DEBUG:acme.client:JWS payload: b'' 2024-06-26 18:37:58,926:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985929937: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOEFIOVpaMG9sV0RhVHl2aEZ5SjRlTUkzZzI0c2lyS29OQS1QRDlZQ1JscXNpRUhNTS1jIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU5Mjk5MzcifQ", "signature": "Oiaxta7iD64SKiCSzJ9U0USr9AUDHSk-xoE6bCBJQQN1BhwVgcgKAvKA3ZC7PGJgWuvyQsRg1UUXoYFmO7gLd_F0v8-0gxYPDjVK0dbd-Yq9wYDh8ri49AyHxOx36JAE-UI5vEBcWR1CUneOmobsgeGYmR8nC8Yo-BLKSRt8g5q5yn0NQvPWVTsQtj8r4Gt13LZLYCm_rvlxDOAFUII-utbwJDDfigE_igfr7aMMsmtpSnTHjckhRM5VdMA2V_kbYGX6KOODSteCYWzxHJh3L0AmGyioX2F0nxoBxytlCz8bDiPC5cC4SEnEbck3F1t_T8gao6zkh4TQrz31gQOenQ", "payload": "" } 2024-06-26 18:37:59,100:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985929937 HTTP/1.1" 200 810 2024-06-26 18:37:59,101:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:37:52 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 8AH9ZZ0okZ6bMzqDFKeZT1BHSLRd5YTH6qKupALcEaqNFmaCIvQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:12Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/gXwyeA", "status": "pending", "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/K4XtOg", "status": "pending", "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/NX0yhA", "status": "pending", "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY" } ] } 2024-06-26 18:37:59,101:DEBUG:acme.client:Storing nonce: 8AH9ZZ0okZ6bMzqDFKeZT1BHSLRd5YTH6qKupALcEaqNFmaCIvQ 2024-06-26 18:37:59,102:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-26 18:37:59,103:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-06-26 18:37:59,104:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-26 18:37:59,104:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-26 18:37:59,105:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-26 18:37:59,105:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-26 18:37:59,105:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-26 18:37:59,105:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-26 18:37:59,107:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-26 18:37:59,155:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-26 18:37:59,547:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-26 18:37:59,548:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-06-26 18:37:59,549:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-06-26 18:37:59,554:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:29 UTC. 2024-06-26 18:37:59,554:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-26 18:37:59,554:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-26 18:37:59,559:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-26 18:37:59,559:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-26 18:37:59,559:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-26 18:37:59,579:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-26 18:37:59,581:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-26 18:37:59,585:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-26 18:38:00,036:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-26 18:38:00,037:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:37:53 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "NYYbKT7w9Eo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-26 18:38:00,038:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-26 18:38:04,817:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7971_key-certbot.pem 2024-06-26 18:38:09,179:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7969_csr-certbot.pem 2024-06-26 18:38:09,179:DEBUG:acme.client:Requesting fresh nonce 2024-06-26 18:38:09,180:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-26 18:38:09,329:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-26 18:38:09,330:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:38:02 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: lCR6it1EsdKNJ03BPm9aX5RWqjDvpxVU6_spESc4WmmiJqAmp4g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-26 18:38:09,330:DEBUG:acme.client:Storing nonce: lCR6it1EsdKNJ03BPm9aX5RWqjDvpxVU6_spESc4WmmiJqAmp4g 2024-06-26 18:38:09,330:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-06-26 18:38:09,336:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibENSNml0MUVzZEtOSjAzQlBtOWFYNVJXcWpEdnB4VlU2X3NwRVNjNFdtbWlKcUFtcDRnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "MgwhStXuguwRcdB-YJQ1MhMsCzuggg66iZB4FJn9YCRB3Nv22nOsZUSzwJFhh4Vedxtei5fUt5Ev5opZySIoJTVsjFcoLdyc_m0JudxpBPPboHT0htdAr1IvQ7Brl3Pu9ENcfhf4r0573IO_i7kfb8PEsFBe4VSKFm40S275WlxdOZZLs4v2rn8IJWKFseaIMBVlwpddMvoZMH2RVkf4brLEQt6ZAH7YVx9uDd4ZLohFm8vPdmr2XJ6_HixjiswR-SlaicDRRdtfAGW_vVfdFoQD9UDf1c3N7IU0bCY3GRVaHkS496Yksf7WuM4jx0kAcfYcilHgpDaxSYKBsv6FPQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-06-26 18:38:09,503:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-06-26 18:38:09,504:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 26 Jun 2024 16:38:02 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824496987 Replay-Nonce: lCR6it1E1wTj2qqlN11kRzQrz_gUHzDguZ7lgedQDINhi7mCmaU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:22Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985989517" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824496987" } 2024-06-26 18:38:09,504:DEBUG:acme.client:Storing nonce: lCR6it1E1wTj2qqlN11kRzQrz_gUHzDguZ7lgedQDINhi7mCmaU 2024-06-26 18:38:09,504:DEBUG:acme.client:JWS payload: b'' 2024-06-26 18:38:09,510:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985989517: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibENSNml0MUUxd1RqMnFxbE4xMWtSelFyel9nVUh6RGd1WjdsZ2VkUURJTmhpN21DbWFVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU5ODk1MTcifQ", "signature": "WRG_MYxQ3d2AhlCYj9YwtzjYHy_KdGtABE0WEcSBBLbkz7M64dSFTlb_0a3_ZNQh029PLe7sgpZYB6Uppkre6d-QIEWenqllaVclb-zyxp2nO4cDDE_0s6KuFZVfy7L4cRzMlJc1OWqPNC9PlRE0l4LVx9bPHojlRhLbit-rOlZ9fB_1xeiorD4iEulGkPvG_JHsRifrlz9CiXKBl_36U0vQ7W1BaBoNQSzYUAc8l7Ze70MtEqwq164lGoxgXTEhjqd48vi2bxD5HAAP6FR-RxlqRokzPsR0VgnTf4SeqD2Dgb5SeiAm3xFTBuleYzY_5Tz9ilX0hg10NaiA3Kl0fQ", "payload": "" } 2024-06-26 18:38:09,666:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985989517 HTTP/1.1" 200 809 2024-06-26 18:38:09,666:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:38:03 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: lCR6it1EGPBW5QNwsAi3BXPq175smPnrRfiyvV6DOTC4Bd0bODo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:22Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/ebl14A", "status": "pending", "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/-PFYBw", "status": "pending", "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/LKEO7w", "status": "pending", "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0" } ] } 2024-06-26 18:38:09,667:DEBUG:acme.client:Storing nonce: lCR6it1EGPBW5QNwsAi3BXPq175smPnrRfiyvV6DOTC4Bd0bODo 2024-06-26 18:38:09,667:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-26 18:38:09,668:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-06-26 18:38:09,669:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-26 18:38:09,669:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-26 18:38:09,671:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-26 18:38:09,672:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-26 18:38:09,672:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-26 18:38:09,673:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-26 18:38:09,675:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-26 18:38:09,718:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-26 18:38:09,907:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-26 18:38:09,908:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-06-26 18:38:09,909:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-06-26 18:38:09,913:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:53 UTC. 2024-06-26 18:38:09,913:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-26 18:38:09,914:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-26 18:38:09,919:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-26 18:38:09,919:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-26 18:38:09,919:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-26 18:38:09,936:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-26 18:38:09,937:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-26 18:38:09,939:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-26 18:38:10,406:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-26 18:38:10,407:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:38:03 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "pibPrCqt630": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-26 18:38:10,408:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-26 18:38:15,172:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7972_key-certbot.pem 2024-06-26 18:38:19,595:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7970_csr-certbot.pem 2024-06-26 18:38:19,596:DEBUG:acme.client:Requesting fresh nonce 2024-06-26 18:38:19,596:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-26 18:38:19,752:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-26 18:38:19,753:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:38:13 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 8AH9ZZ0ocgCgV8qsf4wFqpIwGgCg4MGhrHRd4fh6S5-EM41keYM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-26 18:38:19,753:DEBUG:acme.client:Storing nonce: 8AH9ZZ0ocgCgV8qsf4wFqpIwGgCg4MGhrHRd4fh6S5-EM41keYM 2024-06-26 18:38:19,753:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-06-26 18:38:19,760:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOEFIOVpaMG9jZ0NnVjhxc2Y0d0ZxcEl3R2dDZzRNR2hySFJkNGZoNlM1LUVNNDFrZVlNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "L5Enkhy_mpRTGzOfQMR5IlGSSfS_6JDtpfhIIxosZdNYVabh0jBRywaSlDMQKLHzgUXBD0Im4YqmAL8lxUq_oI_eAwuMoQ0oAGM80BnpOFGj-sUBp_D7dbGRRwihUUPjjbxoOwMonvNoCMcfa-aMI8zRGSC3Rmm-lqcQ3Yg3zbAu55WoarSCxxly_hLezLZ6olB2fLWcM0W1FoYNwXI42EKZajchUUMgOmPVcxxZfaEgSS6CxsDN2vbgEbhCGDhPFYRxzBTCHWYoWnj_OixidXEiQoQz4XBaWyNQgnrEKtAJLpg7hDnKmhLTsSX3V-_f59jB3WwbarYsi-yz0zy1ng", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-06-26 18:38:19,926:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-06-26 18:38:19,927:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 26 Jun 2024 16:38:13 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824533727 Replay-Nonce: 8AH9ZZ0o-tATGSctiQGHQQ6lJqyWslAoQKHfjbIw4J6kkQd_8Nw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:32Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986047927" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824533727" } 2024-06-26 18:38:19,927:DEBUG:acme.client:Storing nonce: 8AH9ZZ0o-tATGSctiQGHQQ6lJqyWslAoQKHfjbIw4J6kkQd_8Nw 2024-06-26 18:38:19,928:DEBUG:acme.client:JWS payload: b'' 2024-06-26 18:38:19,934:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986047927: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOEFIOVpaMG8tdEFUR1NjdGlRR0hRUTZsSnF5V3NsQW9RS0hmamJJdzRKNmtrUWRfOE53IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYwNDc5MjcifQ", "signature": "IXHpYi5J5qKVgARQqYpuV5rTgMiFFg0BVxZfjiv0JR3BL4Qn-cRqhe5JJIDqut3QToXVSaiSR2P44Motm5WmB2O_v69rNIGNYwoaQ7IpNQvmIceex7lvTlwscyCK9jRhuWENoxzajZeY0H4fC0UU4IvAn-d16p2039auesCOXDM0oQj8SAhBhNX0NZrEI4jS43A0cbIF2b_-ParOkQVnoBSclKt3TKwRDRbfPSx3nuXSiy9hguf4iXyk9NmcHg6tYSKPsKbgM2fiZWtFY6gQbC_iLpg9cGcc7NNr-JKAteegEESb9-Ojk_vEYMGGvC_H3FIV7zx--GBHY2kMsu6qzw", "payload": "" } 2024-06-26 18:38:20,093:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986047927 HTTP/1.1" 200 805 2024-06-26 18:38:20,094:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:38:13 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: WDMSYcqSWPZ2Fl2RbTbQnHk17V5ewOQrEUPwlw-LRTMGzCYpHWA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:32Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/a7aI1Q", "status": "pending", "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/Rqj-2Q", "status": "pending", "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/4mVq6w", "status": "pending", "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0" } ] } 2024-06-26 18:38:20,094:DEBUG:acme.client:Storing nonce: WDMSYcqSWPZ2Fl2RbTbQnHk17V5ewOQrEUPwlw-LRTMGzCYpHWA 2024-06-26 18:38:20,095:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-26 18:38:20,095:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-06-26 18:38:20,095:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-26 18:38:20,096:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-26 18:38:20,097:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-26 18:38:20,097:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-26 18:38:20,097:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-26 18:38:20,097:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-26 18:38:20,099:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-26 18:38:20,149:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-26 18:38:20,452:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-26 18:38:20,454:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-06-26 18:38:20,454:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-06-26 18:38:20,459:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:19 UTC. 2024-06-26 18:38:20,459:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-26 18:38:20,460:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-26 18:38:20,465:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-26 18:38:20,465:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-26 18:38:20,465:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-26 18:38:20,471:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-26 18:38:20,471:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-26 18:38:20,474:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-26 18:38:20,919:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-26 18:38:20,920:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:38:14 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "ZfT9H_BEVMM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-26 18:38:20,920:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-26 18:38:25,239:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7973_key-certbot.pem 2024-06-26 18:38:29,340:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7971_csr-certbot.pem 2024-06-26 18:38:29,341:DEBUG:acme.client:Requesting fresh nonce 2024-06-26 18:38:29,341:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-26 18:38:29,492:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-26 18:38:29,493:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:38:22 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1VRjeNN9DYJ9JPD05wjXCETnBhovYCRSY2upgzTjtKPs1lbdgO8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-26 18:38:29,493:DEBUG:acme.client:Storing nonce: 1VRjeNN9DYJ9JPD05wjXCETnBhovYCRSY2upgzTjtKPs1lbdgO8 2024-06-26 18:38:29,493:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-06-26 18:38:29,500:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVZSamVOTjlEWUo5SlBEMDV3alhDRVRuQmhvdllDUlNZMnVwZ3pUanRLUHMxbGJkZ084IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Da8hBWBwkdyxKpyUiuNCkuGuOhWgXAlVarIEXoxuJanOYO7twJhvR7gTxerZzOs3QiIFU7oc-ZcPi1J6fhU4exu_L0cL9RgDz1FAYimrXosjz3IebuEYHZ5KKqBZizsHdIEkwyaZufStl5TZrNITGd1dK2pJ0Q2-IKqEb4x_bqYVFiPXHc7-BuLq-gQrfhLSOly6zE-cXeaNtKD5ZNPMUfAvUZ8JRooHshneDuzEwFrs9VHOI47gahE2tnuQHWWksHYldcIPIiD0XGjPpLZlRdDgMlpiyL1thg9-Qi5UINfm__Jv5HQuf5Ah6_niIo_QoQ4cTfXT1WiQ_9EtOhtIRw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-06-26 18:38:29,665:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-06-26 18:38:29,666:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 26 Jun 2024 16:38:23 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824568847 Replay-Nonce: 1VRjeNN9EbhHAt6aAGyuJZq0DVbxGFIFa10S9L0uUkD2bZRlnTA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:42Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986101167" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824568847" } 2024-06-26 18:38:29,666:DEBUG:acme.client:Storing nonce: 1VRjeNN9EbhHAt6aAGyuJZq0DVbxGFIFa10S9L0uUkD2bZRlnTA 2024-06-26 18:38:29,666:DEBUG:acme.client:JWS payload: b'' 2024-06-26 18:38:29,677:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986101167: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVZSamVOTjlFYmhIQXQ2YUFHeXVKWnEwRFZieEdGSUZhMTBTOUwwdVVrRDJiWlJsblRBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYxMDExNjcifQ", "signature": "YedDHAvr_-xaV8v3d6pYUHMOo7zGi7HjNuo4Tk4FBUs38ErGHmQmhB-Nw9J3FhrvoaDFs1UuafDnV9lk_hM_HRCVD2davYEwsLq6A0H6pPuBA2b2UsUFJeguAN2aoh-vdxz_EvovwDwCkPZ6hGV4HlOmnLDaE8-0y-j-4f7kdGjhjZ5WwRBvP1Fzsxpzg5a0f2GTJVzw9eHVEz7-S36bUj-xYqNNyJ-2KEMaXCrHudds_TMqO9AW55gkAWRxBTrpuuFPp9DNwgaKPdLhxX7cJ2irE1gw5mmpzJ2AEQrNAOanN65d7d8hLk6J81mJbAQ8o75smNr5mXCwNSS9fwEk8w", "payload": "" } 2024-06-26 18:38:29,845:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986101167 HTTP/1.1" 200 805 2024-06-26 18:38:29,846:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:38:23 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1VRjeNN9tsPwJDa19KBL1VS8bkL7ATQNJm-2-6j1ckfn_cVh0a0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:42Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/nlLFxg", "status": "pending", "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/mOuqMg", "status": "pending", "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/b0ZrJg", "status": "pending", "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q" } ] } 2024-06-26 18:38:29,846:DEBUG:acme.client:Storing nonce: 1VRjeNN9tsPwJDa19KBL1VS8bkL7ATQNJm-2-6j1ckfn_cVh0a0 2024-06-26 18:38:29,847:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-26 18:38:29,847:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-06-26 18:38:29,848:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-26 18:38:29,849:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-26 18:38:29,851:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-26 18:38:29,851:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-26 18:38:29,851:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-26 18:38:29,852:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-26 18:38:29,852:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-26 18:38:29,909:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-26 18:38:30,138:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-26 18:38:30,139:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-06-26 18:38:30,140:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-06-26 18:38:30,145:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:37 UTC. 2024-06-26 18:38:30,145:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-06-26 18:38:30,145:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-06-26 18:38:30,151:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-06-26 18:38:30,151:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-26 18:38:30,151:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-06-26 18:38:30,156:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-06-26 18:38:30,157:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-06-26 18:38:30,159:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-06-26 18:38:30,607:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-06-26 18:38:30,608:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:38:24 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "OlyxWKpoeuw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-26 18:38:30,608:INFO:certbot._internal.main:Renewing an existing certificate 2024-06-26 18:38:35,296:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7974_key-certbot.pem 2024-06-26 18:38:39,407:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7972_csr-certbot.pem 2024-06-26 18:38:39,408:DEBUG:acme.client:Requesting fresh nonce 2024-06-26 18:38:39,408:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-06-26 18:38:39,559:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-06-26 18:38:39,559:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:38:33 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: lCR6it1EfUSP5QAcxhJBsP0ASLpjQ4UEdRf7xt8e7h_oTm8WoX0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-06-26 18:38:39,559:DEBUG:acme.client:Storing nonce: lCR6it1EfUSP5QAcxhJBsP0ASLpjQ4UEdRf7xt8e7h_oTm8WoX0 2024-06-26 18:38:39,560:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-06-26 18:38:39,565:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibENSNml0MUVmVVNQNVFBY3hoSkJzUDBBU0xwalE0VUVkUmY3eHQ4ZTdoX29UbThXb1gwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "t3emOcHGFJBJ5Dski9okCBDNegRqtJs5p3ISTa-vtCpqYSzVIs1KkZrDv90GrHIay_xT95lAvX9fomROZx-o_IRovXiX0f488XPXEwY3gXKf-3QIMmjnL7I-nu3Ppxk5ZHKdLxlplrazyUrKSSm_ITkKy6qkLJR6dp__WQe9EfCz5vQQKHiZdqVZGI_Nf6aOoQTCDDCvBrq6FtSIhlob76Hl2N40Y6LC-sGxzD1bW6_5hKF2CZ17yvbjLWAgiS3xBP2BSnrcfNER_WWLjLO_2T070egZa3m9oSYtyfIjA5PhrXN5koGlsjyrNvZi7cAg5deueKq5I12Fp4Pl5t3StQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-06-26 18:38:39,729:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-06-26 18:38:39,730:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 26 Jun 2024 16:38:33 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824603047 Replay-Nonce: lCR6it1Enrtw7sQdkCkl2I8GKBVNuN2IgMuAjtHx-MAkpunqO10 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:53Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986156647" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824603047" } 2024-06-26 18:38:39,730:DEBUG:acme.client:Storing nonce: lCR6it1Enrtw7sQdkCkl2I8GKBVNuN2IgMuAjtHx-MAkpunqO10 2024-06-26 18:38:39,731:DEBUG:acme.client:JWS payload: b'' 2024-06-26 18:38:39,737:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986156647: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibENSNml0MUVucnR3N3NRZGtDa2wySThHS0JWTnVOMklnTXVBanRIeC1NQWtwdW5xTzEwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYxNTY2NDcifQ", "signature": "wzXWbslHZTe0Pobp2kFg59QSl26ArUEFv11zg65MEKv-ZoMR9V94wlJbQoI3x9rONS5b5gGroa62SEVz4waj2yqbjuxhhy7YiEOc-HPiQVPz_YlJHxrPdc81-l4qPidqVYFbj_DOkh0tbvi9EzIreok_OD0XX-tB1SF2iGOzefm-kXi67hxO34rNAuEsW70l6wTFDvWdiFRACA9DC-PQDNqtJvuRdIcVDYqnjaYBLQlqoHH-DdABbkhJFMYYtGO5DwuTZKNBCfTtmhqHZDUkikXlssHgvdLtz7mVvhgynULxejZNFHPRV2MVweWgSv4UvOpqhwQVRcjZNPiIsoYmZg", "payload": "" } 2024-06-26 18:38:39,892:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986156647 HTTP/1.1" 200 805 2024-06-26 18:38:39,893:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 26 Jun 2024 16:38:33 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: lCR6it1EUOWS2xDjIYGtrr8I0T0XOK-bicr7I1wA09aYBqu6sdQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:53Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/B3rfNg", "status": "pending", "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/ZEHm3Q", "status": "pending", "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/xivawQ", "status": "pending", "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk" } ] } 2024-06-26 18:38:39,893:DEBUG:acme.client:Storing nonce: lCR6it1EUOWS2xDjIYGtrr8I0T0XOK-bicr7I1wA09aYBqu6sdQ 2024-06-26 18:38:39,893:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-06-26 18:38:39,894:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-06-26 18:38:39,894:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-06-26 18:38:39,895:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-06-26 18:38:39,896:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-26 18:38:39,896:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-06-26 18:38:39,896:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-06-26 18:38:39,896:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-06-26 18:38:39,897:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-06-26 18:38:39,898:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-06-26 18:38:39,898:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-06-26 18:38:39,909:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-06-26 18:38:39,911:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)