2024-04-26 20:44:05,203:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-04-26 20:44:05,203:DEBUG:certbot._internal.main:Arguments: [] 2024-04-26 20:44:05,204:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-04-26 20:44:06,412:DEBUG:certbot._internal.log:Root logging level set at 20 2024-04-26 20:44:06,413:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-04-26 20:44:06,450:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-04-26 20:44:06,494:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-26 20:44:06,792:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-26 20:44:06,805:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert9.pem is signed by the certificate's issuer. 2024-04-26 20:44:06,809:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert9.pem is: OCSPCertStatus.GOOD 2024-04-26 20:44:06,816:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:24 UTC. 2024-04-26 20:44:06,816:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 20:44:06,817:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-26 20:44:06,822:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-26 20:44:06,822:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-26 20:44:06,822:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-26 20:44:06,828:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-26 20:44:06,829:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-26 20:44:06,832:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-26 20:44:07,352:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-26 20:44:07,352:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:44:47 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "RKESPm9J9pE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-26 20:44:07,353:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-26 20:44:12,756:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7922_key-certbot.pem 2024-04-26 20:44:17,374:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7920_csr-certbot.pem 2024-04-26 20:44:17,375:DEBUG:acme.client:Requesting fresh nonce 2024-04-26 20:44:17,375:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-26 20:44:17,533:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-26 20:44:17,534:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:44:57 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: GDpsvN1zrT7exBRZ65JCcWCuMAjeTw7a_APzcsol2UFD2QASR7c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-26 20:44:17,534:DEBUG:acme.client:Storing nonce: GDpsvN1zrT7exBRZ65JCcWCuMAjeTw7a_APzcsol2UFD2QASR7c 2024-04-26 20:44:17,534:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-04-26 20:44:17,540:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiR0Rwc3ZOMXpyVDdleEJSWjY1SkNjV0N1TUFqZVR3N2FfQVB6Y3NvbDJVRkQyUUFTUjdjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "cTh079R85IsnOFS6uW8cuiYoYjUk8St1B6jD7MsTv6sVEy3tVtTnY3E6hs16_yuu6JgZ1INJaMkZO-fR9rNUhj6Xeg-FOl3TaODjHX5AzIjSTNCOX3f96X16RIHxcQZzLnH2yJGs2N-dDxXqH-olxW2Um4rKF4thfdi2sZho2eCV7dGYdvRuHQTA9nHprjb8Xa3TcowKt13cS_OALCtdUzxiiIJxhGBsxYhYzfx27wXf20GXSs5fekSMHqKxeePfKFHDHfD2dSWo9KeA-ZGEe4RGlnIgVnqnDNtgdB3YaUGjf7putzLNwJh01yQc-QdHJ3K5p1HdRHE56-j3-sYU-g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-26 20:44:17,711:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-04-26 20:44:17,711:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Apr 2024 18:44:57 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263785897197 Replay-Nonce: gIMTIGxVmC3PbDEk6GhshIQbTYsutMEE_Kzb1Swc3L675XwCRwk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:39:02Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342590903587" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263785897197" } 2024-04-26 20:44:17,712:DEBUG:acme.client:Storing nonce: gIMTIGxVmC3PbDEk6GhshIQbTYsutMEE_Kzb1Swc3L675XwCRwk 2024-04-26 20:44:17,712:DEBUG:acme.client:JWS payload: b'' 2024-04-26 20:44:17,718:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342590903587: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ0lNVElHeFZtQzNQYkRFazZHaHNoSVFiVFlzdXRNRUVfS3piMVN3YzNMNjc1WHdDUndrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTA5MDM1ODcifQ", "signature": "F3S8EKkf6lGHnJAlzYHDnIKo00yLEPHpqFjWClQuOc7Swn7TUrXWZZYrFqmIEHDz-3rPZjhWUGQNG8mNI2VOIMPjpO6qfUwEvnlaE1hEsQmiPsvjTmTQK6Hv6gV0iVISCafTwNJ41zOWUGk2xSyB6pUH8r_NsfreYhR2FMCOlqmLJ_Lehtj9Q2Nmz1obJssUTgKtD-Fg0lDZA3gI2S92SZ2ZNX4LQpGiHDsjYLt3cIRwW_MtPWh-fVQ2fM1fBxAK-sBiEM1f3FwSo8ydGGd0gqd6c-U0_j0hcpz-tWrMjb-LdiaKIHmfvyfmwR1K0qm-6r_ZwRozZuvabJ4y_giIXQ", "payload": "" } 2024-04-26 20:44:17,880:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342590903587 HTTP/1.1" 200 810 2024-04-26 20:44:17,881:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:44:58 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gIMTIGxV_yDqFGLLH4UUxvVE6x3eWAIQ1qO0v5Iu4oipZenG3fM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:39:02Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590903587/yQQlQg", "token": "_cYaZQFxe65pnQBqTdAB7A2ly3NXiqxedIi23pGjVI4" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590903587/fshO_g", "token": "_cYaZQFxe65pnQBqTdAB7A2ly3NXiqxedIi23pGjVI4" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590903587/Ovx7gQ", "token": "_cYaZQFxe65pnQBqTdAB7A2ly3NXiqxedIi23pGjVI4" } ] } 2024-04-26 20:44:17,881:DEBUG:acme.client:Storing nonce: gIMTIGxV_yDqFGLLH4UUxvVE6x3eWAIQ1qO0v5Iu4oipZenG3fM 2024-04-26 20:44:17,882:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-26 20:44:17,882:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-04-26 20:44:17,882:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-26 20:44:17,883:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-26 20:44:17,886:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 20:44:17,886:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-26 20:44:17,886:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-26 20:44:17,887:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-26 20:44:17,892:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 20:44:17,936:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-26 20:44:18,127:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-26 20:44:18,128:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-26 20:44:18,129:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-26 20:44:18,134:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:42 UTC. 2024-04-26 20:44:18,134:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 20:44:18,135:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-26 20:44:18,140:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-26 20:44:18,140:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-26 20:44:18,140:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-26 20:44:18,144:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-26 20:44:18,145:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-26 20:44:18,147:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-26 20:44:18,611:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-26 20:44:18,612:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:44:58 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Wk3JjPdNpYw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-26 20:44:18,612:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-26 20:44:23,343:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7923_key-certbot.pem 2024-04-26 20:44:27,599:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7921_csr-certbot.pem 2024-04-26 20:44:27,599:DEBUG:acme.client:Requesting fresh nonce 2024-04-26 20:44:27,600:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-26 20:44:27,764:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-26 20:44:27,765:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:45:08 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: O0afatDIln1Bxs_Hg70rT3Wjt1edUXwbwgMkMDDc1wYQeEvsK5c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-26 20:44:27,765:DEBUG:acme.client:Storing nonce: O0afatDIln1Bxs_Hg70rT3Wjt1edUXwbwgMkMDDc1wYQeEvsK5c 2024-04-26 20:44:27,765:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-04-26 20:44:27,771:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiTzBhZmF0RElsbjFCeHNfSGc3MHJUM1dqdDFlZFVYd2J3Z01rTUREYzF3WVFlRXZzSzVjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "TxwprbKfdIfsEj2wUo9uhAVfI1Odri7RY5EqnWFf_46QL550tupmfdpZKxY7bULuRCZhJeSyVFtJXaGyJB42XFKEaK5VmDlUgzaswgUlRv4X9fI8xHMIBWpFeVkG9fowfVGiHjiKfJhLhdvbvYsti9UfSW5UBe5kPYHMppl7240J9AlIzWIR2qlf2O7IzTSOF1bsWzyGHFAFHPubJLqSo39g24EXR1eLYZ26o2rg32p3g59T9eL7hMP0DJ8168vrbPagl12x7UmarLmcHIzybhhxYqIxN6avo3veUSWTMz7xoTywhWMSQuv01p0nya8GM-CHawQDmLuIr_oJX2vGEA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-26 20:44:28,022:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-04-26 20:44:28,022:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Apr 2024 18:45:08 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263785936717 Replay-Nonce: O0afatDI87-V1aINN3eHwqkTF-6vax5OR0ZbQG5_i9QvXownVfI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:39:12Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342590959637" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263785936717" } 2024-04-26 20:44:28,023:DEBUG:acme.client:Storing nonce: O0afatDI87-V1aINN3eHwqkTF-6vax5OR0ZbQG5_i9QvXownVfI 2024-04-26 20:44:28,023:DEBUG:acme.client:JWS payload: b'' 2024-04-26 20:44:28,028:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342590959637: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiTzBhZmF0REk4Ny1WMWFJTk4zZUh3cWtURi02dmF4NU9SMFpiUUc1X2k5UXZYb3duVmZJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTA5NTk2MzcifQ", "signature": "hwccXkWZa-HFfIU9JxsOCDtw8wJ2-DMVco6PkZLGO27xTjwEEaczt7D1X9bREJw2-mncuCcx17KA_-7EJsmYi2klJv937NppOd7AeCCs_dpqgOR064aMmEGJbUTBnGbEbi3GTcDilP4saaLYFmrFvFshzOoYYyEBXu1-sXHlCIxZzengzx1hpQChl-MDGd0LlN6F2Y7HwXuH3NdOx0_Vb9-idT-Q5AC0lYD2adQTHhpYdR3KQdk0FwU3ZJvjYj93T5dx3Z6t7QTkad663T7Q4hsRd3Ju_XTyPqeN4mubEsc9oyvVeCHWlZokZIIKNU2zz_911DneGgK7QAT-WucxOA", "payload": "" } 2024-04-26 20:44:28,227:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342590959637 HTTP/1.1" 200 804 2024-04-26 20:44:28,227:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:45:08 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y_7AIQuUdC53LT3IGfjBRcbq3fDkuIeJctUQpZQelgPFsicSAiQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:39:12Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590959637/k2GELA", "token": "tJLK_l85tGGQh0-6L-WrXUa-odUx6APjgZ8B6_DGAB0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590959637/C9NXzA", "token": "tJLK_l85tGGQh0-6L-WrXUa-odUx6APjgZ8B6_DGAB0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590959637/N6vgRQ", "token": "tJLK_l85tGGQh0-6L-WrXUa-odUx6APjgZ8B6_DGAB0" } ] } 2024-04-26 20:44:28,227:DEBUG:acme.client:Storing nonce: Y_7AIQuUdC53LT3IGfjBRcbq3fDkuIeJctUQpZQelgPFsicSAiQ 2024-04-26 20:44:28,228:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-26 20:44:28,228:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-04-26 20:44:28,229:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-26 20:44:28,229:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-26 20:44:28,230:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 20:44:28,230:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-26 20:44:28,230:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-26 20:44:28,230:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-26 20:44:28,231:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 20:44:28,285:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-26 20:44:28,498:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-26 20:44:28,499:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-04-26 20:44:28,500:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-04-26 20:44:28,505:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:56 UTC. 2024-04-26 20:44:28,505:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 20:44:28,505:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-26 20:44:28,510:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-26 20:44:28,510:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-26 20:44:28,510:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-26 20:44:28,526:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-26 20:44:28,527:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-26 20:44:28,529:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-26 20:44:29,012:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-26 20:44:29,012:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:45:09 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "ina5BUbCbOI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-26 20:44:29,013:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-26 20:44:33,245:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7924_key-certbot.pem 2024-04-26 20:44:37,285:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7922_csr-certbot.pem 2024-04-26 20:44:37,285:DEBUG:acme.client:Requesting fresh nonce 2024-04-26 20:44:37,286:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-26 20:44:37,444:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-26 20:44:37,445:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:45:17 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gIMTIGxV3384tPhKTvK3YOmlg6tn0pDYT104PWJIABxTuliSXUA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-26 20:44:37,445:DEBUG:acme.client:Storing nonce: gIMTIGxV3384tPhKTvK3YOmlg6tn0pDYT104PWJIABxTuliSXUA 2024-04-26 20:44:37,445:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-04-26 20:44:37,451:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ0lNVElHeFYzMzg0dFBoS1R2SzNZT21sZzZ0bjBwRFlUMTA0UFdKSUFCeFR1bGlTWFVBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "wkH_s09BK_fMP2VZzZq_yKmXgByhNLySvhQCepbQXaiwB5Z-dK0J-U3LuUMxsdyzmyx4gUv8jzIUVVvRTBBeBZIzN3MOcb74R28u6keKgI9xSCeOidY6vkVyWFv8lthQlMCCDYjbsf6GLgvCUdM0lpX4AU1Z3bb36ojBZ15ZZxqrsZswQsl1BO8EZ9x-fYxQ8Bmp4sJfSfR5V6552Ne2ALLEYm0GotqBbdUJkxAmd8r-ojScFXj17bPDgdRP6GkKp_1iSuXlfJ28I3D9mYo0g3DJzvMcbJHZQ7pM0d__lbNxRuNfmRWOu7kBatWINLoAAOkB-13Wv1_vrqh6dOMq4w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-26 20:44:37,623:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-04-26 20:44:37,623:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Apr 2024 18:45:17 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263785966947 Replay-Nonce: gIMTIGxVDiW0Rd-pKc3nium8pwWpGMny_nyYGU9HPqVBZ3_t7NM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:39:24Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591007887" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263785966947" } 2024-04-26 20:44:37,623:DEBUG:acme.client:Storing nonce: gIMTIGxVDiW0Rd-pKc3nium8pwWpGMny_nyYGU9HPqVBZ3_t7NM 2024-04-26 20:44:37,624:DEBUG:acme.client:JWS payload: b'' 2024-04-26 20:44:37,628:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591007887: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ0lNVElHeFZEaVcwUmQtcEtjM25pdW04cHdXcEdNbnlfbnlZR1U5SFBxVkJaM190N05NIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEwMDc4ODcifQ", "signature": "EUOSha_0GkyGYCoMEvKx7mEXT9H1UbMAzlW21EvXQzKWVNxid36YjcYD01h60BLpcOl6O-drins6aGmPkQe7yQKVlDFovGRiJkME7ecDzEksT7AoK7sb_yCH1ivKewf0O-Tt9-mX3_3BgS21ZCCpEaqiB9muNfrHTJcW83ARu_kdXbAo3lTwkVvHwUc3A4bQoU5ng6X3x29uFsB95pp2JMBG4z5sxjH02zSkVuxtvxa3ICCXIGG5vngdig57to6ls5Ls3P1GNHczlRxgKmr2Gu94N8kZMVb_G8YB3UUU3lDMDy3AoyAQI_pXRGmai2dtStqydLgK4rZIfrrOYen83A", "payload": "" } 2024-04-26 20:44:37,792:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591007887 HTTP/1.1" 200 807 2024-04-26 20:44:37,792:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:45:18 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: GDpsvN1zc5DBsfl-XWYe679Pi8Ays329QOyszRgFQt6ngizheVc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:39:24Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591007887/PHBLZA", "token": "beB8Rj2vf_xsZdii23LrzSWxOGBiGEzmy54e95GXHoc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591007887/Lbw9kw", "token": "beB8Rj2vf_xsZdii23LrzSWxOGBiGEzmy54e95GXHoc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591007887/PJqcrw", "token": "beB8Rj2vf_xsZdii23LrzSWxOGBiGEzmy54e95GXHoc" } ] } 2024-04-26 20:44:37,793:DEBUG:acme.client:Storing nonce: GDpsvN1zc5DBsfl-XWYe679Pi8Ays329QOyszRgFQt6ngizheVc 2024-04-26 20:44:37,793:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-26 20:44:37,793:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-04-26 20:44:37,794:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-26 20:44:37,794:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-26 20:44:37,795:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 20:44:37,795:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-26 20:44:37,795:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-26 20:44:37,795:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-26 20:44:37,796:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 20:44:37,851:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-26 20:44:38,044:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-26 20:44:38,045:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-26 20:44:38,046:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-26 20:44:38,052:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:14 UTC. 2024-04-26 20:44:38,052:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 20:44:38,052:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-26 20:44:38,057:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-26 20:44:38,057:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-26 20:44:38,058:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-26 20:44:38,062:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-26 20:44:38,063:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-26 20:44:38,065:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-26 20:44:38,501:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-26 20:44:38,501:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:45:18 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Xw9jnyE_Pcs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-26 20:44:38,502:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-26 20:44:42,738:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7925_key-certbot.pem 2024-04-26 20:44:46,766:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7923_csr-certbot.pem 2024-04-26 20:44:46,767:DEBUG:acme.client:Requesting fresh nonce 2024-04-26 20:44:46,767:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-26 20:44:46,911:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-26 20:44:46,912:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:45:27 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: O0afatDI7_1XfVnX5rsKM8IhMBtekh1qvZTCDp-mZjECX4mXntk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-26 20:44:46,912:DEBUG:acme.client:Storing nonce: O0afatDI7_1XfVnX5rsKM8IhMBtekh1qvZTCDp-mZjECX4mXntk 2024-04-26 20:44:46,912:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-04-26 20:44:46,917:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiTzBhZmF0REk3XzFYZlZuWDVyc0tNOEloTUJ0ZWtoMXF2WlRDRHAtbVpqRUNYNG1YbnRrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "B27DxhejSAS9bAIbOuprRyf2QxsOQ3DAO8bRrL9ovw2mbrh__-56EBZnZWh0SG05iD5DYcOsw9VWq094quqmebcpZHQNUK3kgn11ATmORluxLcOeGg3PG-DMre_gjuK0kh5MeJYWNcVRevPKe0L4qmgnFoXZc9HrSsojd08MOP9Kzdz_eMw6kYcKHiRRoMYgqkowE2uDxCGjar9C39WPAjUWm-46oaGyQI-gJ3vFuN5uB_EkN7JAuefYljgQmN_qA1wsQLnOA1Sryle7dEZ4ywUw1vH_cI0qlxSCV93mUw3L_MkQP6kHUYBF_D9oY45W0YN8bHKhUv_xkBH63EfSFw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-26 20:44:47,079:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-04-26 20:44:47,079:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Apr 2024 18:45:27 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263785995757 Replay-Nonce: Y_7AIQuUsrPNl9cx_tcEE9Za0lLdl01Fy7K6ILxNQWBFnAuNhiQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:39:35Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591052317" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263785995757" } 2024-04-26 20:44:47,079:DEBUG:acme.client:Storing nonce: Y_7AIQuUsrPNl9cx_tcEE9Za0lLdl01Fy7K6ILxNQWBFnAuNhiQ 2024-04-26 20:44:47,080:DEBUG:acme.client:JWS payload: b'' 2024-04-26 20:44:47,085:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591052317: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWV83QUlRdVVzclBObDljeF90Y0VFOVphMGxMZGwwMUZ5N0s2SUx4TlFXQkZuQXVOaGlRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEwNTIzMTcifQ", "signature": "uJiLfzLFKRQXE_sUxvm39mpU5lLomp8kibENkCzdrXY7BfWLQZkSaPyOX2ZnPyntF80_qjHlIdSe82mCsb7jQFVDQjoTNJ-t4solUADSw191mx0yjx87fM6hFvZbhc38Om6YpXCQ617s15EQOjym0686Kwtp5ZMVfRAEr34GQLTWTfMvSCFFbsTMk-0mZBKDz6cEoJinSkgY5vIV8bKLU7YxHeCRb6n9snUIrAAjlcBskcUYZ0wUAofh_Y45iYBBsQZJvjKRG48nr1oA6pXAhcE-k05Xn1qTK7m54LTvM6njrp5TlDFyw4yMaojYpyQfca06T1-3eoOECkt5ua66nA", "payload": "" } 2024-04-26 20:44:47,254:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591052317 HTTP/1.1" 200 801 2024-04-26 20:44:47,255:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:45:27 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: O0afatDI0iNIyQkwC95WfVnFGzo0j9FmOPAHC-eD68UIt1hMpUk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:39:35Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591052317/nXYSvg", "token": "MIjKvMphRPU5OnxpnP63SaWPXmuRx-D-028G2__U8nQ" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591052317/lcK_gw", "token": "MIjKvMphRPU5OnxpnP63SaWPXmuRx-D-028G2__U8nQ" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591052317/A5w39g", "token": "MIjKvMphRPU5OnxpnP63SaWPXmuRx-D-028G2__U8nQ" } ] } 2024-04-26 20:44:47,255:DEBUG:acme.client:Storing nonce: O0afatDI0iNIyQkwC95WfVnFGzo0j9FmOPAHC-eD68UIt1hMpUk 2024-04-26 20:44:47,256:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-26 20:44:47,256:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-04-26 20:44:47,256:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-26 20:44:47,257:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-26 20:44:47,257:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 20:44:47,258:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-26 20:44:47,258:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-26 20:44:47,258:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-26 20:44:47,259:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 20:44:47,308:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-26 20:44:47,560:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-26 20:44:47,561:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-26 20:44:47,562:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-26 20:44:47,567:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:32 UTC. 2024-04-26 20:44:47,567:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 20:44:47,567:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-26 20:44:47,572:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-26 20:44:47,572:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-26 20:44:47,572:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-26 20:44:47,577:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-26 20:44:47,578:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-26 20:44:47,580:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-26 20:44:48,009:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-26 20:44:48,010:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:45:28 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "BpeqREh6CWA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-26 20:44:48,010:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-26 20:44:52,753:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7926_key-certbot.pem 2024-04-26 20:44:57,144:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7924_csr-certbot.pem 2024-04-26 20:44:57,145:DEBUG:acme.client:Requesting fresh nonce 2024-04-26 20:44:57,145:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-26 20:44:57,291:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-26 20:44:57,292:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:45:37 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y_7AIQuUxpFDADar60kvkNn0wUWUuu8sE0k6bOD3p2jXopE5AtM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-26 20:44:57,292:DEBUG:acme.client:Storing nonce: Y_7AIQuUxpFDADar60kvkNn0wUWUuu8sE0k6bOD3p2jXopE5AtM 2024-04-26 20:44:57,292:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-04-26 20:44:57,298:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWV83QUlRdVV4cEZEQURhcjYwa3ZrTm4wd1VXVXV1OHNFMGs2Yk9EM3AyalhvcEU1QXRNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "EHljF_C0UdX3VtA2F65dG7iYkP883-fJZ_0WC7p6alsLEFrXX3IEqKNXWAYOJM_8eLKXxrtsEAzwNu2d-PULMARjP1kcpdlLpKRx_jyKno7atyWje5OPHN5HL-KMu4HXvkB4gudmoZoGvS4gOzkW1LyLNkloFie_MLmo2axiwwjY8FMQiQz7jFYykfqbjDlW0mANGmTmKaLbRB66M270j9lvPayqCWicsMMRYmuqTfpEFHUedkXKAm-xCN8ST_OZHKppk9Id1ApZMeuv02FucQApF_mO6kdtblpolxEt5cQ3irjl4bcc-tCfg3UXLt-iXZ25zVki_CphEDIAogZ7Kw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-26 20:44:57,465:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-26 20:44:57,465:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Apr 2024 18:45:37 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786022187 Replay-Nonce: O0afatDIQj-7Kl1wqV-zZtr15GIp8VxI08ig1z98VrM2TNY7Nwg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:39:46Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591093777" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786022187" } 2024-04-26 20:44:57,465:DEBUG:acme.client:Storing nonce: O0afatDIQj-7Kl1wqV-zZtr15GIp8VxI08ig1z98VrM2TNY7Nwg 2024-04-26 20:44:57,466:DEBUG:acme.client:JWS payload: b'' 2024-04-26 20:44:57,473:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591093777: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiTzBhZmF0RElRai03S2wxd3FWLXpadHIxNUdJcDhWeEkwOGlnMXo5OFZyTTJUTlk3TndnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEwOTM3NzcifQ", "signature": "rlAQAJMU9ZCMqoPJHgmtU1wuHU3GPjrGScOXiRYH52R1AKqu__oOPOgUk8Au6qU-melrRtHlhfFAtI4cGw9AyWj8FPj0OqKVnWI3p4SSw5uKXQ6lrVDphcKlzDEqWLbYopmYiw_FUqrDQPWqcHK28V8yU9AhQ71Y-m4FYEDm0l04Z74pfWzao-qCHW7Wl0vAAz8pI1NF2q2uXMQgTqhMid8hBSPWeIHr-NdVWe_aQgmNx3uUp_EIbe5hwKCUBLWHXRGsRtnRN4ose1CGl4NJNhulhhZmYiGByBMtpKmrAwRC4q4OduUJl4dCvjiQeTF28ausGZO1Ij4GRlIGLN7mrA", "payload": "" } 2024-04-26 20:44:57,720:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591093777 HTTP/1.1" 200 805 2024-04-26 20:44:57,720:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:45:38 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y_7AIQuUlSRP-9FIoUzWdwHwNwp0O_tU3YVx1AeU3FVqMv8-cfM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:39:46Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591093777/5L951w", "token": "wULsoLc7wACByPCe5SgzOs2w85CZ8-Gr43fdXB5k6SA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591093777/egwr_w", "token": "wULsoLc7wACByPCe5SgzOs2w85CZ8-Gr43fdXB5k6SA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591093777/HMvVIg", "token": "wULsoLc7wACByPCe5SgzOs2w85CZ8-Gr43fdXB5k6SA" } ] } 2024-04-26 20:44:57,721:DEBUG:acme.client:Storing nonce: Y_7AIQuUlSRP-9FIoUzWdwHwNwp0O_tU3YVx1AeU3FVqMv8-cfM 2024-04-26 20:44:57,721:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-26 20:44:57,722:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-04-26 20:44:57,722:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-26 20:44:57,722:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-26 20:44:57,723:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 20:44:57,723:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-26 20:44:57,723:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-26 20:44:57,724:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-26 20:44:57,725:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 20:44:57,774:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-26 20:44:57,947:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-26 20:44:57,948:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-04-26 20:44:57,949:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-04-26 20:44:57,953:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:48 UTC. 2024-04-26 20:44:57,953:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 20:44:57,954:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-26 20:44:57,959:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-26 20:44:57,959:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-26 20:44:57,959:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-26 20:44:57,965:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-26 20:44:57,966:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-26 20:44:57,968:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-26 20:44:58,431:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-26 20:44:58,431:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:45:38 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "3zcT5Vu5BE4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-26 20:44:58,432:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-26 20:45:02,855:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7927_key-certbot.pem 2024-04-26 20:45:07,071:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7925_csr-certbot.pem 2024-04-26 20:45:07,072:DEBUG:acme.client:Requesting fresh nonce 2024-04-26 20:45:07,072:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-26 20:45:07,226:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-26 20:45:07,227:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:45:47 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: GDpsvN1z0FBvVVSP_q5Emvb-CysO-qvfG7BP_cfWshq4ts9kGRM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-26 20:45:07,227:DEBUG:acme.client:Storing nonce: GDpsvN1z0FBvVVSP_q5Emvb-CysO-qvfG7BP_cfWshq4ts9kGRM 2024-04-26 20:45:07,227:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-04-26 20:45:07,232:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiR0Rwc3ZOMXowRkJ2VlZTUF9xNUVtdmItQ3lzTy1xdmZHN0JQX2NmV3NocTR0czlrR1JNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "NM72nGtxIQWa_nd28H-MK0XynAlW4yxIrglRrI02RxikN3Bnl0suGxnRC-hzDrRGmySceevnLx8uI9HJqHsRafDYYyVTAOY3XQlpxC-V2S7Bq7eSs112bIvJxNsFOfSNv0GNu5dmRDalRZtFZUCsH_AZdhl7OjLnxnjquaP7ItmrIme1LAFFxY58rq6Wod1UMNvF3vQFnkZtkd4p-iO1LFg_A270-ehuv9UqJ7VKvn77xBEeAYhTRcPB8bFcNlTvpVTw__xEXGwxIntF9UshGEp6l-TwFUkLne2N5RhN1nWAURX-FlpiqsscuYlN19VhtNu7YRpmbuvR0LsoL1M3yQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-04-26 20:45:07,402:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-04-26 20:45:07,403:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Apr 2024 18:45:47 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786050437 Replay-Nonce: GDpsvN1zzmpOdm7MHu0NDRjSRU_YKUlsL5KVL0D8XQiD0EX_5Cw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:39:57Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591136247" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786050437" } 2024-04-26 20:45:07,403:DEBUG:acme.client:Storing nonce: GDpsvN1zzmpOdm7MHu0NDRjSRU_YKUlsL5KVL0D8XQiD0EX_5Cw 2024-04-26 20:45:07,404:DEBUG:acme.client:JWS payload: b'' 2024-04-26 20:45:07,410:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591136247: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiR0Rwc3ZOMXp6bXBPZG03TUh1ME5EUmpTUlVfWUtVbHNMNUtWTDBEOFhRaUQwRVhfNUN3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTExMzYyNDcifQ", "signature": "rnWHysYcVe7WcJt2Nhi4ONpS892osRNfeiNcpH15a8dE0-ur6fUh3k-9V2KRzVeua8dtnOxEMlEy_Gq_5Fbk_ulL2ajYIODYSG6OeiT_QXbcoDg0Dmc219IpUkGlr0gQ7dmOw-9-2B1rGOT3ZJjB2fztTNYO8SNQSz_5LCaOelrWgR3u5zI-1LHv6DJ84RGDFMwOhJGqv-YDWhULXzacRoY_1cnYkLy6X82DP0PYrkx7Ft7vRzQRunDsu9_HBT7xo4Y_qkVur14AWcS7HGQjrFt1O82yaplHKsDcVCoGbT4rwnjgNih82R84kzgaf0S6F-iAxeMVhtmtc6qdH9IUew", "payload": "" } 2024-04-26 20:45:07,569:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591136247 HTTP/1.1" 200 809 2024-04-26 20:45:07,569:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:45:47 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: GDpsvN1zyxO3r9Sc_1r8v17s6FzcfUx5ggGKuCUyXr9t5ceKw10 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:39:57Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591136247/jmrcew", "token": "dV2yZMj-jEV96xJosxLDIsbyMijaWSPD6FdtA3sRgXw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591136247/-o7nbg", "token": "dV2yZMj-jEV96xJosxLDIsbyMijaWSPD6FdtA3sRgXw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591136247/DEae2A", "token": "dV2yZMj-jEV96xJosxLDIsbyMijaWSPD6FdtA3sRgXw" } ] } 2024-04-26 20:45:07,569:DEBUG:acme.client:Storing nonce: GDpsvN1zyxO3r9Sc_1r8v17s6FzcfUx5ggGKuCUyXr9t5ceKw10 2024-04-26 20:45:07,570:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-26 20:45:07,570:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-04-26 20:45:07,571:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-26 20:45:07,571:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-26 20:45:07,572:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 20:45:07,572:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-26 20:45:07,572:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-26 20:45:07,573:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-26 20:45:07,574:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 20:45:07,624:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-26 20:45:07,834:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-26 20:45:07,835:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-26 20:45:07,836:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-26 20:45:07,840:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:06 UTC. 2024-04-26 20:45:07,840:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 20:45:07,841:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-26 20:45:07,845:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-26 20:45:07,846:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-26 20:45:07,846:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-26 20:45:07,862:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-26 20:45:07,863:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-26 20:45:07,865:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-26 20:45:08,310:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-26 20:45:08,310:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:45:48 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "VhvaKBWWNCs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-26 20:45:08,311:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-26 20:45:12,953:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7928_key-certbot.pem 2024-04-26 20:45:17,202:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7926_csr-certbot.pem 2024-04-26 20:45:17,203:DEBUG:acme.client:Requesting fresh nonce 2024-04-26 20:45:17,203:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-26 20:45:17,361:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-26 20:45:17,362:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:45:57 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y_7AIQuUy323Tnxhslb7m5NwUugnHv3Fu_6qBWP1CE-FXaO1upE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-26 20:45:17,362:DEBUG:acme.client:Storing nonce: Y_7AIQuUy323Tnxhslb7m5NwUugnHv3Fu_6qBWP1CE-FXaO1upE 2024-04-26 20:45:17,363:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-04-26 20:45:17,370:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWV83QUlRdVV5MzIzVG54aHNsYjdtNU53VXVnbkh2M0Z1XzZxQldQMUNFLUZYYU8xdXBFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "HtLNNeSlzTs8iSEF3xdmvCxQsy_NgxIAzOa8wOLwX7A99fzIA-BKT4tDUtjbrADGEHgXsK_5E9FW52NO2U-GAKQFYvbhbXqraDyl1rrQURLevlp5YMd1NmKx1Gi5rq2riQY767ZAMzyKFJNOxKd2SnOjd3Z-DTOVGZvv_MycfjO-51ncHuvf1qdjfP5ImoBP7SVkfuyalWY_EihacoWKQeUZxj7MVHPLZQ3sls85a-x2dBZcAbRkUoflZnQyRDk1r8F4eg4-dTSmwuLh67-YerKd7tcwobtrmRKd-fjoJDBdl_e9aBWTrf9xILh60t4OHkigGLLdvUY4cIiDEme6ag", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-04-26 20:45:17,541:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-04-26 20:45:17,541:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Apr 2024 18:45:57 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786101437 Replay-Nonce: Y_7AIQuUcG5gVOY1rOSb-vO-IGc2QvR2cuZXHIKQOdXtZoss1FE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:40:08Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591202447" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786101437" } 2024-04-26 20:45:17,541:DEBUG:acme.client:Storing nonce: Y_7AIQuUcG5gVOY1rOSb-vO-IGc2QvR2cuZXHIKQOdXtZoss1FE 2024-04-26 20:45:17,542:DEBUG:acme.client:JWS payload: b'' 2024-04-26 20:45:17,547:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591202447: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWV83QUlRdVVjRzVnVk9ZMXJPU2Itdk8tSUdjMlF2UjJjdVpYSElLUU9kWHRab3NzMUZFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEyMDI0NDcifQ", "signature": "BaSYq8Z6ldsweFqxACCu58Rc7UBRFEVHseyg-oTVKby-QULt2HKJcSpA3QKGXvt_ndupRPbnjAhmIvFm5nItnfds0sSkPhJ6L3VAjgW_vCcqJsF2adwywGtuvS0J1qBefmVEsJchLmH6QtCE34Pon_Pvdh5JDPj-hs8f78UWDmNH_zx9p5_EZIn5dJfzx35QZI83QEDvGvsA1sj9cH5ZHZ8lLlp9HPX1Ag2jf29W_sRww1n3IgT3fRk3ynePsA7NJQGbyX6A-0Q-iFgDwdY_rmqgqqBRX0k8W3ZddJtsvlEoyMXVXycnTzlLyc_QULwjLzDPcb1kAridbvXBYkKjRg", "payload": "" } 2024-04-26 20:45:17,719:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591202447 HTTP/1.1" 200 806 2024-04-26 20:45:17,720:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:45:58 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: O0afatDIGYI06bPVJA2ExTKxsZDxgl9PJtqG8O4fTy93n7-QNKg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:40:08Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591202447/8XsmxQ", "token": "G1AdFqNnmnT088RDP0J9KtOwA_p7D5YMb-gb1g7ExAc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591202447/a1GZzw", "token": "G1AdFqNnmnT088RDP0J9KtOwA_p7D5YMb-gb1g7ExAc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591202447/qG0r0A", "token": "G1AdFqNnmnT088RDP0J9KtOwA_p7D5YMb-gb1g7ExAc" } ] } 2024-04-26 20:45:17,720:DEBUG:acme.client:Storing nonce: O0afatDIGYI06bPVJA2ExTKxsZDxgl9PJtqG8O4fTy93n7-QNKg 2024-04-26 20:45:17,721:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-26 20:45:17,721:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-04-26 20:45:17,721:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-26 20:45:17,722:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-26 20:45:17,722:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 20:45:17,723:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-26 20:45:17,723:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-26 20:45:17,723:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-26 20:45:17,724:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 20:45:17,773:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-04-26 20:45:17,773:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 20:45:17,773:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-04-26 20:45:17,781:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-04-26 20:45:17,784:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-04-26 20:45:17,784:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-04-26 20:45:17,784:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-04-26 20:45:17,785:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-04-26 20:45:17,786:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-04-26 20:45:17,827:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-26 20:45:18,023:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-26 20:45:18,024:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-26 20:45:18,025:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-26 20:45:18,029:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:23 UTC. 2024-04-26 20:45:18,029:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 20:45:18,029:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-26 20:45:18,034:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-26 20:45:18,034:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-26 20:45:18,034:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-26 20:45:18,039:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-26 20:45:18,040:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-26 20:45:18,042:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-26 20:45:18,511:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-26 20:45:18,512:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:45:58 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "rDbDK8uq7SY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-26 20:45:18,512:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-26 20:45:22,934:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7929_key-certbot.pem 2024-04-26 20:45:27,202:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7927_csr-certbot.pem 2024-04-26 20:45:27,203:DEBUG:acme.client:Requesting fresh nonce 2024-04-26 20:45:27,203:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-26 20:45:27,381:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-26 20:45:27,382:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:46:07 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: GDpsvN1zYbdkBtnEFr-O_itJMjLpP7eMQP6JlQvatF00989J-2M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-26 20:45:27,382:DEBUG:acme.client:Storing nonce: GDpsvN1zYbdkBtnEFr-O_itJMjLpP7eMQP6JlQvatF00989J-2M 2024-04-26 20:45:27,383:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-04-26 20:45:27,388:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiR0Rwc3ZOMXpZYmRrQnRuRUZyLU9faXRKTWpMcFA3ZU1RUDZKbFF2YXRGMDA5ODlKLTJNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "KQ4_nXCWIvYLOV339yHDlWboOaKqlFce2i_Ok-Ja_E4klYrHv9dg4ZPL6UbKXB6znzNhEdgPiAc0OmWGXcajXF0SqzQ5Z1Vf1Ut-iaSAE82qH9C-z6vXJ8Us9xpHunAPBjZDcIV7mp6AJ6r3qPZiJwmVbekz1JKIrSGZ4itAmAZPHFDoWafV_PHD5eKuJL5WUF-Ox3luLkdHUUQ1RPeclU6eCmcYjWj9iubB__WsAFosFeuPFXH8_R0LF1o0b-HuzVLKxb6f94ew3M-McE6slTHUxgWTPdZN7bmNaUu89g0B9pw7TSxii2oDe2FnSuWSL7hyQ6Sis_9dZX2pb_rDLQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-26 20:45:27,552:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-04-26 20:45:27,552:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Apr 2024 18:46:07 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786138347 Replay-Nonce: GDpsvN1zO0JwDH-incWvUe61mncQ45N2DZgHiVtxCjMbDKTbL0E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:40:19Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591256287" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786138347" } 2024-04-26 20:45:27,553:DEBUG:acme.client:Storing nonce: GDpsvN1zO0JwDH-incWvUe61mncQ45N2DZgHiVtxCjMbDKTbL0E 2024-04-26 20:45:27,553:DEBUG:acme.client:JWS payload: b'' 2024-04-26 20:45:27,558:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591256287: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiR0Rwc3ZOMXpPMEp3REgtaW5jV3ZVZTYxbW5jUTQ1TjJEWmdIaVZ0eENqTWJES1RiTDBFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEyNTYyODcifQ", "signature": "p0XLi-cOKOM2lZ7rFhdEUFDbPcm87XXC7imHIbthKmwMwYVFGEV-m12_xF280bI8vcs1d9AXq2069IudCiCGUTLI-H9sBv3UEpKLFXkq1PY-Rggvo-RAsImQhPMKDl8j3uOVGxX7sCW448uVxFJxV72eYqJ-Yygz0Eyt0WNsMmHO280b7f7Tg-XW-QkWdWG7VLMNt4ti8Nz7BpbOBBMrj2kEpF034zen_TrJz3RIuY_Op8wY-rifjaxKjgRIIgDqXOKRqj-OrqJvH2_OTp9I0PhUqYLgtIXV0zm1iCER3raob45vCBJoorE-Ln8SmYd0ywRX4xZ-evNNi4BktynlrQ", "payload": "" } 2024-04-26 20:45:27,719:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591256287 HTTP/1.1" 200 811 2024-04-26 20:45:27,720:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:46:08 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: GDpsvN1z6z_mtwIBI_AKqieY7RD_fhQt7FCGqLYX8SLJSBz_nzo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:40:19Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591256287/K-RCZw", "token": "VNACvIqg7Fgn_WHq8b2_oKzrZYhRTgcu5X8dE-g-JYI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591256287/Qx_SSA", "token": "VNACvIqg7Fgn_WHq8b2_oKzrZYhRTgcu5X8dE-g-JYI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591256287/92J4RA", "token": "VNACvIqg7Fgn_WHq8b2_oKzrZYhRTgcu5X8dE-g-JYI" } ] } 2024-04-26 20:45:27,720:DEBUG:acme.client:Storing nonce: GDpsvN1z6z_mtwIBI_AKqieY7RD_fhQt7FCGqLYX8SLJSBz_nzo 2024-04-26 20:45:27,720:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-26 20:45:27,721:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-04-26 20:45:27,721:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-26 20:45:27,721:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-26 20:45:27,722:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 20:45:27,722:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-26 20:45:27,722:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-26 20:45:27,723:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-26 20:45:27,724:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 20:45:27,776:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-26 20:45:28,050:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-26 20:45:28,052:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-26 20:45:28,052:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-26 20:45:28,057:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:41 UTC. 2024-04-26 20:45:28,057:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 20:45:28,057:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-26 20:45:28,062:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-26 20:45:28,062:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-26 20:45:28,062:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-26 20:45:28,079:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-26 20:45:28,079:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-26 20:45:28,081:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-26 20:45:28,569:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-26 20:45:28,570:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:46:08 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Owpr-XSSlH0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-26 20:45:28,570:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-26 20:45:32,976:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7930_key-certbot.pem 2024-04-26 20:45:37,165:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7928_csr-certbot.pem 2024-04-26 20:45:37,166:DEBUG:acme.client:Requesting fresh nonce 2024-04-26 20:45:37,166:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-26 20:45:37,312:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-26 20:45:37,312:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:46:17 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y_7AIQuUGjDqxoPgtdn2L3zvZWEtBH8-ESFQd__u5eXaUomAk4M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-26 20:45:37,313:DEBUG:acme.client:Storing nonce: Y_7AIQuUGjDqxoPgtdn2L3zvZWEtBH8-ESFQd__u5eXaUomAk4M 2024-04-26 20:45:37,313:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-04-26 20:45:37,320:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWV83QUlRdVVHakRxeG9QZ3RkbjJMM3p2WldFdEJIOC1FU0ZRZF9fdTVlWGFVb21BazRNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "LT44X6oaU5f9NbHpwk7_zSbQgU4sy2VdZdxZWpa3u2zzr-CvYxhblbk9AytuuocBiOSW5hi4ly94YCwE0JHc6JLpSAL6chjB5vnGBepEi-1No8sF8Fv2xmqYPOnps6aTN0hGSTpgQ4bSlLATKEMBHsebdZEB-2ZEc1ZXHS6J3lwLrmXuXU_dkQN3Rly2kds7MXx1NcGjxiwGJAYj-uphY2VDVpDD0SbmSAwtDVMgrhQMTSil-3jTWRI9raoa0DvrQTdJEYODOuOjjR2daIQhgb2wODFaEW4Z9ObTN_hOA-zV09X8SYMfAJ8IBz3rgOR-S1C1qJcVJl8NFL8Lg2-ocQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-26 20:45:37,530:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-04-26 20:45:37,531:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Apr 2024 18:46:17 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786169497 Replay-Nonce: O0afatDIVVnganlOf6fugEIyQTxndh3YWtH-ElFNof0sT-QaTag X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:40:30Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591303867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786169497" } 2024-04-26 20:45:37,531:DEBUG:acme.client:Storing nonce: O0afatDIVVnganlOf6fugEIyQTxndh3YWtH-ElFNof0sT-QaTag 2024-04-26 20:45:37,531:DEBUG:acme.client:JWS payload: b'' 2024-04-26 20:45:37,536:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591303867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiTzBhZmF0RElWVm5nYW5sT2Y2ZnVnRUl5UVR4bmRoM1lXdEgtRWxGTm9mMHNULVFhVGFnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEzMDM4NjcifQ", "signature": "BZoutu6Ms4c0ns1WHIlKmQ5S0AMMkga0LRavPsXKh1qLsscI5fBhpSDXrXojQcHQ37Za3pq4V-x9D-sMWRh713aGy_q_A-dcq4rlXflrzDXTdXYrI5uo8SUPp9q1j7zIABeLgCHxeFb3V8JqVed-4cxyiweW1vuR7ARft0WPc1eb97y841f9ZcUNNva4MfWhv-uzxa2mRiZvt4WBXYsVj8r9zVcKljaA69tHam1BZmP20XTIPXfeopKDbPTM9gC-hGRgf-8IYhJnNthh9ju76NYFk4zluxIoudi4k0l1d4aECILO0l3_NWjLD4_rhPG3zVNSpKqwuLaD_C2_WMtLyw", "payload": "" } 2024-04-26 20:45:37,703:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591303867 HTTP/1.1" 200 810 2024-04-26 20:45:37,704:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:46:17 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y_7AIQuUWj-tvISDHsTxD92zgeUigyQE85Vjm3u1K7X41-y0Aho X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:40:30Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591303867/fVMRLg", "token": "v7V3rLmlxo6NcGbELkoNnlOhXK0p8NRQZV8Vqx6IRq0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591303867/q_0-Ew", "token": "v7V3rLmlxo6NcGbELkoNnlOhXK0p8NRQZV8Vqx6IRq0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591303867/G3BN_A", "token": "v7V3rLmlxo6NcGbELkoNnlOhXK0p8NRQZV8Vqx6IRq0" } ] } 2024-04-26 20:45:37,704:DEBUG:acme.client:Storing nonce: Y_7AIQuUWj-tvISDHsTxD92zgeUigyQE85Vjm3u1K7X41-y0Aho 2024-04-26 20:45:37,705:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-26 20:45:37,705:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-04-26 20:45:37,706:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-26 20:45:37,706:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-26 20:45:37,707:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 20:45:37,707:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-26 20:45:37,707:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-26 20:45:37,708:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-26 20:45:37,709:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 20:45:37,758:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-26 20:45:37,953:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-26 20:45:37,954:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-04-26 20:45:37,954:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-04-26 20:45:37,959:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:58 UTC. 2024-04-26 20:45:37,959:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 20:45:37,959:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-26 20:45:37,964:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-26 20:45:37,964:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-26 20:45:37,964:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-26 20:45:37,969:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-26 20:45:37,970:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-26 20:45:37,972:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-26 20:45:38,446:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-26 20:45:38,446:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:46:18 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "cBifEZJkgOY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-26 20:45:38,447:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-26 20:45:42,716:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7931_key-certbot.pem 2024-04-26 20:45:46,661:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7929_csr-certbot.pem 2024-04-26 20:45:46,662:DEBUG:acme.client:Requesting fresh nonce 2024-04-26 20:45:46,662:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-26 20:45:46,820:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-26 20:45:46,821:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:46:27 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gIMTIGxV3waXiG2pXMaM51dXE8EbLyu-HQl3ZQ9yhhOa2W2hxzw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-26 20:45:46,821:DEBUG:acme.client:Storing nonce: gIMTIGxV3waXiG2pXMaM51dXE8EbLyu-HQl3ZQ9yhhOa2W2hxzw 2024-04-26 20:45:46,821:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-04-26 20:45:46,827:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ0lNVElHeFYzd2FYaUcycFhNYU01MWRYRThFYkx5dS1IUWwzWlE5eWhoT2EyVzJoeHp3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "HsSTgxqWZIJdc_yGQoLabtevDSM5LKKEAPQfcMcAfMQORUkskAu2_TiIG8QEStbt2RkAnU-thDZ-Naooj1d9xMbWiKMlFVXh4chKI1_Uajt3aVcmbG_EWqBdxykygNlLWsb2dcK3mfXUiEMtczJsuI0oFPSBQrohBeTYDA3YKoKSu0p8BZuWrn6uU69TN6hKSfg1FRkoE3N_LcM5vv2sQRPJdT5W8HaiJVXsrYlVBrGu8mmjE-9FgyuAqoEVGcj1LCVVCXAiMU_4C97Q_P450IhVQ_H5_AjF5px3bDtDDq7TeMpmeX14zdpy2pqePiTlgfV-TNWI0cqig4QtnWcG5w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-04-26 20:45:47,000:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-04-26 20:45:47,001:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Apr 2024 18:46:27 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786200537 Replay-Nonce: GDpsvN1zX9UwhAtNyNR18zACvV3Cy0Y_Z6efuD9iLXupc_O2R7s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:40:41Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591349607" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786200537" } 2024-04-26 20:45:47,001:DEBUG:acme.client:Storing nonce: GDpsvN1zX9UwhAtNyNR18zACvV3Cy0Y_Z6efuD9iLXupc_O2R7s 2024-04-26 20:45:47,001:DEBUG:acme.client:JWS payload: b'' 2024-04-26 20:45:47,007:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591349607: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiR0Rwc3ZOMXpYOVV3aEF0TnlOUjE4ekFDdlYzQ3kwWV9aNmVmdUQ5aUxYdXBjX08yUjdzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEzNDk2MDcifQ", "signature": "fAXJj8JzGuXrhdBZYjEJb9bxpuK8y4Ivv4NKfcJh-17nRVpBncAjThN_FCErJTwH_H5OakZRJV1tKx8tuv0FgpVww7HX9Np-SR5gOHXyspwuCyRFvjQvqNgYDFSTiAhW5QAYkZJSUUaODM3czzS_uqiAWpGiUa1Oh5KZrtQMbaUJjusSVmEV-nu29cowpGaS3Ebp9AbxowNBJDRmqQYkOFnzBDVTTLu4MWThRy5ahM-P5fVgqQlEoRasOhb033Ik-xKtOGI3pBW20EGPKXWtYstIfhvYnSuVUkE-V3qRC77p--eeGV_rUIn9pvz8ob0KunFjTyDCOTpTxi_vU9hKYA", "payload": "" } 2024-04-26 20:45:47,169:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591349607 HTTP/1.1" 200 809 2024-04-26 20:45:47,170:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:46:27 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gIMTIGxVDqPl4JH6NKxhC9IO6bOP-R6vvO_7zAVPgPjjobDHi8o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:40:41Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591349607/oncY-g", "token": "lEKPgmmcYCfvrPlwwVhh1yovbIr4Hpj5_O2FYaxZFKY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591349607/YKDY0A", "token": "lEKPgmmcYCfvrPlwwVhh1yovbIr4Hpj5_O2FYaxZFKY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591349607/Xd0Giw", "token": "lEKPgmmcYCfvrPlwwVhh1yovbIr4Hpj5_O2FYaxZFKY" } ] } 2024-04-26 20:45:47,170:DEBUG:acme.client:Storing nonce: gIMTIGxVDqPl4JH6NKxhC9IO6bOP-R6vvO_7zAVPgPjjobDHi8o 2024-04-26 20:45:47,171:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-26 20:45:47,171:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-04-26 20:45:47,172:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-26 20:45:47,172:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-26 20:45:47,173:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 20:45:47,173:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-26 20:45:47,173:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-26 20:45:47,173:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-26 20:45:47,175:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 20:45:47,227:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-26 20:45:47,439:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-26 20:45:47,440:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2024-04-26 20:45:47,441:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2024-04-26 20:45:47,446:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:17 UTC. 2024-04-26 20:45:47,446:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 20:45:47,446:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-26 20:45:47,454:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-26 20:45:47,454:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-26 20:45:47,454:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-26 20:45:47,460:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-26 20:45:47,461:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-26 20:45:47,463:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-26 20:45:47,925:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-26 20:45:47,926:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:46:28 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Ic25ln-D6kE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-26 20:45:47,926:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-26 20:45:52,081:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7932_key-certbot.pem 2024-04-26 20:45:56,212:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7930_csr-certbot.pem 2024-04-26 20:45:56,213:DEBUG:acme.client:Requesting fresh nonce 2024-04-26 20:45:56,213:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-26 20:45:56,368:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-26 20:45:56,369:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:46:36 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gIMTIGxVXyx1w9iYpkI_nKhPIcG8eN8zlBf9BdR8Y1P4JvSbsuQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-26 20:45:56,369:DEBUG:acme.client:Storing nonce: gIMTIGxVXyx1w9iYpkI_nKhPIcG8eN8zlBf9BdR8Y1P4JvSbsuQ 2024-04-26 20:45:56,369:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-04-26 20:45:56,375:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ0lNVElHeFZYeXgxdzlpWXBrSV9uS2hQSWNHOGVOOHpsQmY5QmRSOFkxUDRKdlNic3VRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "vh1CIaYq0598AUtIU7kC6JiMqc_eKlLBh7wo7v2gpjTABc4eP1fAtJmThpq7MDJnwKZsIu_-yOJY4tYz1iMonVCBWYW2QoFEO69rynczs2h6NiUXTstr5FnlrMM_3CxRmrP_ltiy2qgdYCd2sBupzMNje0usQvpZLN64scjTVHoLGCJYzGrAwFXaM9cDY-Ekit18r8ZEjHkNT8zLXA5DR6_fWUzjkC2TQIjHhzbmTF0IM5mHbiFtRQjFNiG-3TMzzgQ2ix0fjmWJPbsm5lpwb1EB_dbg4dkfPrr69Zq4N4LQCETO15qW8AqSQaqcLnab36zn_yakF-Xyx590yhiByw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-26 20:45:56,541:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-26 20:45:56,541:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Apr 2024 18:46:36 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786231497 Replay-Nonce: GDpsvN1z__eshs77WpI3v1guhsXwb11cV6fy3wJBaVPyDIK3cgo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:40:52Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591394247" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786231497" } 2024-04-26 20:45:56,542:DEBUG:acme.client:Storing nonce: GDpsvN1z__eshs77WpI3v1guhsXwb11cV6fy3wJBaVPyDIK3cgo 2024-04-26 20:45:56,542:DEBUG:acme.client:JWS payload: b'' 2024-04-26 20:45:56,547:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591394247: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiR0Rwc3ZOMXpfX2VzaHM3N1dwSTN2MWd1aHNYd2IxMWNWNmZ5M3dKQmFWUHlESUszY2dvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEzOTQyNDcifQ", "signature": "kO8IGKurIdA6tshQUn0RWfpK1NemCEwOJ8SngngCqLLI6Z08nxDOeE6d4fIJUkk4qci_Ye6VrG3dZmWErDlyjcz0-BxFP2yzYc_k3Yd-bY0hKj7IXoxZOgJ5aJZfsdFib2XaluNbcymQhPR10Qhi3TsjBONQjCHBjMQHg4qO135ZuHKGMFUMMXJh7RCsJAx0uyKdR6Hb2b8KwSF4hKnI2pFzpSu0lzuMSIb6FQFwpoAX78Ay0fjgKr6XFm22QhmhWEDCJXJtQsenU8Hs5SVxXzu6_dFsBFxEG7Cif5C2P_pTBmybEA8d9EdbcQ2pO-93qZsPgD5ggYS1k5clWBy5Qw", "payload": "" } 2024-04-26 20:45:56,705:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591394247 HTTP/1.1" 200 805 2024-04-26 20:45:56,706:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:46:36 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gIMTIGxV-74r-LpiYMkkl2fNhM9dRau96-nhdDOtzSthJt5n2s0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:40:52Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591394247/ePyIlw", "token": "oYmgBuOUaoivOJK8eY4kz7MGDKSVo32OgAN5bzlC-mY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591394247/TCtJEA", "token": "oYmgBuOUaoivOJK8eY4kz7MGDKSVo32OgAN5bzlC-mY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591394247/RorkVg", "token": "oYmgBuOUaoivOJK8eY4kz7MGDKSVo32OgAN5bzlC-mY" } ] } 2024-04-26 20:45:56,706:DEBUG:acme.client:Storing nonce: gIMTIGxV-74r-LpiYMkkl2fNhM9dRau96-nhdDOtzSthJt5n2s0 2024-04-26 20:45:56,707:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-26 20:45:56,707:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-04-26 20:45:56,708:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-26 20:45:56,709:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-26 20:45:56,710:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 20:45:56,711:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-26 20:45:56,711:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-26 20:45:56,712:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-26 20:45:56,713:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 20:45:56,761:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-26 20:45:56,955:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-26 20:45:56,956:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-26 20:45:56,957:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-26 20:45:56,961:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:34 UTC. 2024-04-26 20:45:56,962:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 20:45:56,962:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-26 20:45:56,966:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-26 20:45:56,967:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-26 20:45:56,967:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-26 20:45:56,982:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-26 20:45:56,983:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-26 20:45:56,986:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-26 20:45:57,462:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-26 20:45:57,463:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:46:37 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "S7myLDNfXTM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-26 20:45:57,463:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-26 20:46:01,767:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7933_key-certbot.pem 2024-04-26 20:46:05,884:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7931_csr-certbot.pem 2024-04-26 20:46:05,885:DEBUG:acme.client:Requesting fresh nonce 2024-04-26 20:46:05,885:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-26 20:46:06,044:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-26 20:46:06,044:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:46:46 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gIMTIGxV2-Rx6SszJ5MpL6EfVxLnhqsVFys3FrITe5gJ2I4IWtE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-26 20:46:06,044:DEBUG:acme.client:Storing nonce: gIMTIGxV2-Rx6SszJ5MpL6EfVxLnhqsVFys3FrITe5gJ2I4IWtE 2024-04-26 20:46:06,045:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-04-26 20:46:06,052:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ0lNVElHeFYyLVJ4NlNzeko1TXBMNkVmVnhMbmhxc1ZGeXMzRnJJVGU1Z0oySTRJV3RFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "xjiCch2rkTe52d076vxMW4YLlP_MCKy0PKEHEFbxHg9K4ac5b-WiPT7OYJPKs4jvSpQwm84RlJfcoxvQFbXK7vgWwy5EzDhAFntVrQQ61eQUxINTLs7b4_QeXg7OpO1kjVW6EEelenqvp39PsGd24uOkCJuxyp2Y2V9anGbuSpQZkN8pkbBh3nJAMlfa-PVqmNdqzythz_Mp3HdQaObfmuFitAShyeJRG4rAcv0kNeZysRp5k9kcD777sstEDLu9-ES2BzL68DcXJIcjyJHvEQwxQIi0iFiVZQLjKdpHUVnOAXvGm22ZiPrCBHpomhHMCVF7BokY7QaQnl5l9T5fyA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-26 20:46:06,222:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-26 20:46:06,223:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Apr 2024 18:46:46 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786267447 Replay-Nonce: gIMTIGxVTgPb2j8brB1uRQCWJzV_AlUkgs0qGZxqK7ftyHyZneI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:41:03Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591444387" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786267447" } 2024-04-26 20:46:06,223:DEBUG:acme.client:Storing nonce: gIMTIGxVTgPb2j8brB1uRQCWJzV_AlUkgs0qGZxqK7ftyHyZneI 2024-04-26 20:46:06,223:DEBUG:acme.client:JWS payload: b'' 2024-04-26 20:46:06,229:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591444387: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ0lNVElHeFZUZ1BiMmo4YnJCMXVSUUNXSnpWX0FsVWtnczBxR1p4cUs3ZnR5SHlabmVJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTE0NDQzODcifQ", "signature": "Nwhw6O8gFLorrDYk3ygQYco36hdC3jGFcey_tWDEFvw1MeUgPAiSi9kzx0qwkFAUgslWHfRVSGMqEj95AjL_Gjr1TIRfsKrreze24YVleW5JQGuU4b9NaPuG1KjQKF6koecvSau_bM-Ufa8WmRHPVQ0u-jKiiw1wbxTfTuR1rssqXtE6Cywj8VGc0sYmjKzQZBCV0uH6aslTY-8UZqHnN3CfwvZhjNDQucG73YhnNQRXR6YpYVTELizNU8WEytDX9ji_EtCEJri4NmS7Zsf97qsD39rT18vlGayESlm_dy4RHjxYtCC1ZmjTUEnrmQqIkaFkD_S7R-YK6MoLIcLHuQ", "payload": "" } 2024-04-26 20:46:06,391:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591444387 HTTP/1.1" 200 805 2024-04-26 20:46:06,391:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:46:46 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: GDpsvN1z8j_D0McqfAkkDMt8RRNau32XALLQbt4QOXDEWmIWK34 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:41:03Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591444387/VwZ0tQ", "token": "z8Ul1zMz25vACMWktTfhRv_JHgA52ZiTFMeRSlTIJNg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591444387/OQQw2Q", "token": "z8Ul1zMz25vACMWktTfhRv_JHgA52ZiTFMeRSlTIJNg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591444387/x6ddUg", "token": "z8Ul1zMz25vACMWktTfhRv_JHgA52ZiTFMeRSlTIJNg" } ] } 2024-04-26 20:46:06,392:DEBUG:acme.client:Storing nonce: GDpsvN1z8j_D0McqfAkkDMt8RRNau32XALLQbt4QOXDEWmIWK34 2024-04-26 20:46:06,392:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-26 20:46:06,393:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-04-26 20:46:06,393:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-26 20:46:06,393:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-26 20:46:06,394:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 20:46:06,394:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-26 20:46:06,394:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-26 20:46:06,395:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-26 20:46:06,396:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 20:46:06,446:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-26 20:46:06,669:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-26 20:46:06,671:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-04-26 20:46:06,673:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-04-26 20:46:06,682:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:48 UTC. 2024-04-26 20:46:06,682:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 20:46:06,683:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-26 20:46:06,687:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-26 20:46:06,687:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-26 20:46:06,687:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-26 20:46:06,703:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-26 20:46:06,704:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-26 20:46:06,706:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-26 20:46:07,134:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-26 20:46:07,134:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:46:47 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "a8axHrvuR2A": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-26 20:46:07,135:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-26 20:46:11,353:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7934_key-certbot.pem 2024-04-26 20:46:15,314:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7932_csr-certbot.pem 2024-04-26 20:46:15,315:DEBUG:acme.client:Requesting fresh nonce 2024-04-26 20:46:15,315:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-26 20:46:15,491:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-26 20:46:15,491:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:46:55 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y_7AIQuU6sdn-v8_avSodgH6lcbED1TXC4EsO_gpJH1oU5tFQk4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-26 20:46:15,491:DEBUG:acme.client:Storing nonce: Y_7AIQuU6sdn-v8_avSodgH6lcbED1TXC4EsO_gpJH1oU5tFQk4 2024-04-26 20:46:15,492:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-04-26 20:46:15,497:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWV83QUlRdVU2c2RuLXY4X2F2U29kZ0g2bGNiRUQxVFhDNEVzT19ncEpIMW9VNXRGUWs0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "JXZVqYz7eLtlriUH7T-2kub1-2KGstACBmi2dwCkFT4JXEJsooZ1fcFOdRevNrwdBS4T7kGtSaYHSHlepgtmpUDmjzgJ5kG2Z_J9V64ytJPWtkRD7g8_teN8xRNXZpXLhP57Luso8safLdH-LrWgf2irou1_Bf6AFz5m7TxCmZzDRAaNB47qo6wVZacpVvnKmxPyrPIg7wnvtJe4ytiJXqFsGUky18bWozsgYmbslspiol66lP_jXO5vHAKTlSi3ZZEqPjZI8-J8EFkpTWdC2vzgaEgTIUhk7TJk7f-q18UkPe2r-bBK4jEonvgaZdxiJiU9ADwjbU1lUrEUh1v8cQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-26 20:46:15,690:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-26 20:46:15,690:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Apr 2024 18:46:55 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786306657 Replay-Nonce: O0afatDIFOEkUAe99XhnVSmtRTMSULO3PEdWmX7tu_E7s3JJFDs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:41:14Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591499197" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786306657" } 2024-04-26 20:46:15,690:DEBUG:acme.client:Storing nonce: O0afatDIFOEkUAe99XhnVSmtRTMSULO3PEdWmX7tu_E7s3JJFDs 2024-04-26 20:46:15,691:DEBUG:acme.client:JWS payload: b'' 2024-04-26 20:46:15,696:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591499197: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiTzBhZmF0RElGT0VrVUFlOTlYaG5WU210UlRNU1VMTzNQRWRXbVg3dHVfRTdzM0pKRkRzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTE0OTkxOTcifQ", "signature": "qT9ArdEEG7C_CImFpArx88AJv1PgZ2Kgde31QmG1LIbJkHHArAMFo5yCGLh1CZ33YAqAY4lBoRTKlYA0FNKzVkZE78NQVcLGauNvheTERubkdua0oWoYeH4zyMR5rp9JgRYtYhJNkJzi-01s5BzShjwo9eeO9B_tbyyVFGIo6rHNw76TPTf-9QmSgnKLWIAbHkv1aGhH8_LCU3k_1ND5G1MYI2ubtHNpOT46jZ8eewmK2zkNvdDEJPTOHlNsRCLFytnLEAdkOgyo-Ix3vU2Gu7AaeDNgAQiGYzKq6LpBsr5Yz97LMiLMA9AXsVHUvr6bOoml04GkoieCy6SuQFkFbg", "payload": "" } 2024-04-26 20:46:15,843:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591499197 HTTP/1.1" 200 805 2024-04-26 20:46:15,844:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 18:46:56 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: O0afatDIUws4qvgLfGaq5pHf6rW1heCy4E3mWJ49a3gKgFN7DhA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:41:14Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591499197/wllBug", "token": "Fd-9sA7qPZwOOCczOUvR-JOGAFcVsaub88OTZRhbpbo" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591499197/l8TEMw", "token": "Fd-9sA7qPZwOOCczOUvR-JOGAFcVsaub88OTZRhbpbo" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591499197/3h01xg", "token": "Fd-9sA7qPZwOOCczOUvR-JOGAFcVsaub88OTZRhbpbo" } ] } 2024-04-26 20:46:15,844:DEBUG:acme.client:Storing nonce: O0afatDIUws4qvgLfGaq5pHf6rW1heCy4E3mWJ49a3gKgFN7DhA 2024-04-26 20:46:15,845:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-26 20:46:15,845:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-04-26 20:46:15,845:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-26 20:46:15,846:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-26 20:46:15,846:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 20:46:15,846:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-26 20:46:15,847:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-26 20:46:15,847:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-26 20:46:15,848:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 20:46:15,848:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-04-26 20:46:15,849:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-04-26 20:46:15,859:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-04-26 20:46:15,861:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)