2024-04-26 11:06:17,207:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-04-26 11:06:17,207:DEBUG:certbot._internal.main:Arguments: [] 2024-04-26 11:06:17,207:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-04-26 11:06:18,292:DEBUG:certbot._internal.log:Root logging level set at 20 2024-04-26 11:06:18,293:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-04-26 11:06:18,331:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-04-26 11:06:18,373:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-26 11:06:18,589:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-26 11:06:18,590:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert9.pem is signed by the certificate's issuer. 2024-04-26 11:06:18,593:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert9.pem is: OCSPCertStatus.GOOD 2024-04-26 11:06:18,601:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:24 UTC. 2024-04-26 11:06:18,601:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 11:06:18,601:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-26 11:06:18,606:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-26 11:06:18,607:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-26 11:06:18,607:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-26 11:06:18,613:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-26 11:06:18,614:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-26 11:06:18,616:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-26 11:06:19,116:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-26 11:06:19,117:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:06:59 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "uN0QUqPrr6k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-04-26 11:06:19,118:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-26 11:06:24,437:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7909_key-certbot.pem 2024-04-26 11:06:29,155:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7907_csr-certbot.pem 2024-04-26 11:06:29,155:DEBUG:acme.client:Requesting fresh nonce 2024-04-26 11:06:29,155:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-26 11:06:29,313:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-26 11:06:29,314:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:07:09 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: GDpsvN1z56xBLU2Jy-qzgYALqkU3KAJLAwCkSyRTMdgue7K0KLw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-26 11:06:29,314:DEBUG:acme.client:Storing nonce: GDpsvN1z56xBLU2Jy-qzgYALqkU3KAJLAwCkSyRTMdgue7K0KLw 2024-04-26 11:06:29,314:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-04-26 11:06:29,320:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiR0Rwc3ZOMXo1NnhCTFUySnktcXpnWUFMcWtVM0tBSkxBd0NrU3lSVE1kZ3VlN0swS0x3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "MDeXPVIH-cx8DhY-AMFWEr9pjuLtMSjO_VlfCtX0DF6eRQdUQmkUN8j3Y4nC02tYGITEuwwGHbE68GtcK4rbTMy8eNULoOSsgBks3_C6pMOpwySJHwGAAv-CSDeqMBr7hb4ANRt6dWYFrkU8ZF18faXfo5c_GObQdvR158r-ewMyM7F-nqr-mOjykJR5nmE-xJIENN1voWF6FMAGyivhKloBwZwsDqMsxc1mimImYKMlafwhl88nkhmFfe5ppv2gWB7dKDmOoB43a3PPIlIFNlTH04Ejbbk9_h5M5Y2fTCHr4BJNE1bMEo6k5w1fL4QjCgW8wcv5bTr_82SeBSqZrg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-26 11:06:29,490:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-04-26 11:06:29,490:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Apr 2024 09:07:10 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263785897197 Replay-Nonce: GDpsvN1zdykjzxeXGC-4PXie5eCk8lV__RfnaudwDImAwg_nPCc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:39:02Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342590903587" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263785897197" } 2024-04-26 11:06:29,491:DEBUG:acme.client:Storing nonce: GDpsvN1zdykjzxeXGC-4PXie5eCk8lV__RfnaudwDImAwg_nPCc 2024-04-26 11:06:29,491:DEBUG:acme.client:JWS payload: b'' 2024-04-26 11:06:29,496:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342590903587: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiR0Rwc3ZOMXpkeWtqenhlWEdDLTRQWGllNWVDazhsVl9fUmZuYXVkd0RJbUF3Z19uUENjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTA5MDM1ODcifQ", "signature": "TBe5chMnLeRPn_3W4obOEjtbj1eBmTa7NOkYMgstTQc7S_aWJ5cmQdATA_fH958rDqK3jq6Dtc4oiRNIXdosWM41rd8ijCT1OcqOT4QPkjB3pfnuzopGdLD9uwuwZOzOQ97nZKGOerFkBZBWbxrWIhRjmbvkPkFJTv9kCsKVOlokar0syBdt1esP_gVl-O33xGVkT7WYUJy3ZEIESmu9Z82fTMFeS-iutYmsPaqviGVTG5DvwOTEBrfVySDpKKOCskz-dlaMWOEHFGw0utEx3Cv6kqumDvGHZeQVMwmQDXcvpM2aT_O9b-40SRAmv_Uy5eZf8LUvd69aeFqixvucpw", "payload": "" } 2024-04-26 11:06:29,659:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342590903587 HTTP/1.1" 200 810 2024-04-26 11:06:29,659:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:07:10 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: GDpsvN1zewSJgmhnpQuj-So_9ze7119BgmYD8AepcstUU912kpw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:39:02Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590903587/yQQlQg", "token": "_cYaZQFxe65pnQBqTdAB7A2ly3NXiqxedIi23pGjVI4" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590903587/fshO_g", "token": "_cYaZQFxe65pnQBqTdAB7A2ly3NXiqxedIi23pGjVI4" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590903587/Ovx7gQ", "token": "_cYaZQFxe65pnQBqTdAB7A2ly3NXiqxedIi23pGjVI4" } ] } 2024-04-26 11:06:29,660:DEBUG:acme.client:Storing nonce: GDpsvN1zewSJgmhnpQuj-So_9ze7119BgmYD8AepcstUU912kpw 2024-04-26 11:06:29,660:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-26 11:06:29,660:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-04-26 11:06:29,661:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-26 11:06:29,661:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-26 11:06:29,675:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 11:06:29,676:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-26 11:06:29,676:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-26 11:06:29,676:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-26 11:06:29,681:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 11:06:29,719:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-26 11:06:29,905:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-26 11:06:29,907:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-26 11:06:29,907:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-26 11:06:29,912:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:42 UTC. 2024-04-26 11:06:29,912:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 11:06:29,913:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-26 11:06:29,917:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-26 11:06:29,918:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-26 11:06:29,918:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-26 11:06:29,922:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-26 11:06:29,923:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-26 11:06:29,925:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-26 11:06:30,365:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-26 11:06:30,366:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:07:10 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "jNkeia8e4w0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-26 11:06:30,366:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-26 11:06:34,750:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7910_key-certbot.pem 2024-04-26 11:06:38,801:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7908_csr-certbot.pem 2024-04-26 11:06:38,801:DEBUG:acme.client:Requesting fresh nonce 2024-04-26 11:06:38,801:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-26 11:06:38,948:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-26 11:06:38,949:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:07:19 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: O0afatDIk4qluynWELsIFqNPXW4e6VZpVxUUf7ZVg9FY-dgIvk0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-26 11:06:38,949:DEBUG:acme.client:Storing nonce: O0afatDIk4qluynWELsIFqNPXW4e6VZpVxUUf7ZVg9FY-dgIvk0 2024-04-26 11:06:38,949:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-04-26 11:06:38,955:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiTzBhZmF0RElrNHFsdXluV0VMc0lGcU5QWFc0ZTZWWnBWeFVVZjdaVmc5RlktZGdJdmswIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "D6U-uSVKFz1MHUfCYx7OyC3kFrDQQXBL2Hcnnc6rKEu3ruon4QZj6-Y_zWaNPyFPm0lYzHkxOqhKGVFFHs9xomPViOiWZfKTsXgGAGAs-m5cm6EYDIkmwFsIpcFA0wqCtIDna62XlsxJq39geVVD5dXIOd5UFQYsi5hyezyD8HZ6CCr6s71nTGWGR_Z-DTEt0SN0Smwg_Y_7n3JRLT4uniIE_HJ20V9Ax3nXo6bL2zjkzMJTaiSX0Z9U01UE6uk5Vg7x7g8fA83Sp0Tw4JEPtYWEKJhsicHnE1KiWq9tXF2ubUDLLMjhTn40FbVn16yNPZaBvGxfVLrBaBgoLlzvPw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-26 11:06:39,202:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-04-26 11:06:39,203:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Apr 2024 09:07:19 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263785936717 Replay-Nonce: Y_7AIQuUDzTAcLpyfdD-Voc4WAaAD6ACyLD5fiKBu21HuCkm-JA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:39:12Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342590959637" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263785936717" } 2024-04-26 11:06:39,203:DEBUG:acme.client:Storing nonce: Y_7AIQuUDzTAcLpyfdD-Voc4WAaAD6ACyLD5fiKBu21HuCkm-JA 2024-04-26 11:06:39,203:DEBUG:acme.client:JWS payload: b'' 2024-04-26 11:06:39,208:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342590959637: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWV83QUlRdVVEelRBY0xweWZkRC1Wb2M0V0FhQUQ2QUN5TEQ1ZmlLQnUyMUh1Q2ttLUpBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTA5NTk2MzcifQ", "signature": "VHSnSc_p94dh6bfMQCYuV2p108DE6DAm2x-Lsn7_3x4HZ7hicNGxsvpwFyURP-Cttgl-RG7nWtH3FpHmpps6pVc8dVHuDHUmSAMU4avbxjgfmQ5ZGgLLT4C1oUkWr92yHWB--lwb79M0WnMdVjVn07x80R7bQ1523vcnSjNHisfPXvGMk_RiISgTO82qMabwzLKO4tKyANTs_9HJtxQnp7KKSUAsPvPh4yvG3n_VVLxwBqT_mY3kuptMLCpZEBRE9YQSPTYH7UDveISAs5jQrYl4sWzht6E2UpAPX8gOhkVIiVPQZbGeBH1PXqtCYixq0S2CxTRUyBZxQyWaosdyNQ", "payload": "" } 2024-04-26 11:06:39,376:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342590959637 HTTP/1.1" 200 804 2024-04-26 11:06:39,376:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:07:20 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: O0afatDIe50uR9ODfeXUQ6EgwHDQJKDKduHBk1co-S5mejmp4kA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:39:12Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590959637/k2GELA", "token": "tJLK_l85tGGQh0-6L-WrXUa-odUx6APjgZ8B6_DGAB0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590959637/C9NXzA", "token": "tJLK_l85tGGQh0-6L-WrXUa-odUx6APjgZ8B6_DGAB0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590959637/N6vgRQ", "token": "tJLK_l85tGGQh0-6L-WrXUa-odUx6APjgZ8B6_DGAB0" } ] } 2024-04-26 11:06:39,377:DEBUG:acme.client:Storing nonce: O0afatDIe50uR9ODfeXUQ6EgwHDQJKDKduHBk1co-S5mejmp4kA 2024-04-26 11:06:39,377:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-26 11:06:39,377:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-04-26 11:06:39,378:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-26 11:06:39,378:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-26 11:06:39,379:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 11:06:39,379:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-26 11:06:39,379:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-26 11:06:39,379:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-26 11:06:39,380:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 11:06:39,421:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-26 11:06:39,613:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-26 11:06:39,614:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-04-26 11:06:39,615:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-04-26 11:06:39,620:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:56 UTC. 2024-04-26 11:06:39,620:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 11:06:39,620:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-26 11:06:39,624:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-26 11:06:39,624:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-26 11:06:39,624:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-26 11:06:39,638:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-26 11:06:39,639:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-26 11:06:39,641:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-26 11:06:40,103:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-26 11:06:40,104:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:07:20 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "oaNYO5DIQMw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-26 11:06:40,104:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-26 11:06:44,377:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7911_key-certbot.pem 2024-04-26 11:06:48,229:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7909_csr-certbot.pem 2024-04-26 11:06:48,229:DEBUG:acme.client:Requesting fresh nonce 2024-04-26 11:06:48,229:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-26 11:06:48,384:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-26 11:06:48,385:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:07:29 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gIMTIGxVhW6HbswhFr7uiRPUXKqa3a_tk7F7FD4mqVnCwf0yJZs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-26 11:06:48,385:DEBUG:acme.client:Storing nonce: gIMTIGxVhW6HbswhFr7uiRPUXKqa3a_tk7F7FD4mqVnCwf0yJZs 2024-04-26 11:06:48,385:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-04-26 11:06:48,391:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ0lNVElHeFZoVzZIYnN3aEZyN3VpUlBVWEtxYTNhX3RrN0Y3RkQ0bXFWbkN3ZjB5SlpzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "eEUKUHz71rvzKkO_Y_DVmvJ_aekXqLPhlrBUUXVXpJeFZvR7XcPLHoFCUhYfV8GiD8Xs4t2ylpaufI7px2if4VUg-FFxDv4A0o2dVIYPaMlEphLm6Xex7ven7gfVUQ9jX5iXZjE5fc1V_vTjGBuHeJMqA05va8sm7kvNSUMomEJrkU-X-7PEsl01LARLMm7peEvgj6Li58gKJ7iBBw6daM-TDKlqTqaZ-b2wJuNQ2eqchMDuXWsSZfkICjG6W02kh02xqL7-5dwqa6R23ymJpZOvtL0lOIDAQyHIAYtZ0mHhZ3FZYprudKlcgSNJ3K2Xa20RCBhHLFxBoX7NMVQKoA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-26 11:06:48,555:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-04-26 11:06:48,556:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Apr 2024 09:07:29 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263785966947 Replay-Nonce: GDpsvN1zos3g1xd3z2X51j91BO54A7l8TQwPYuNvGEphy0azsPw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:39:24Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591007887" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263785966947" } 2024-04-26 11:06:48,556:DEBUG:acme.client:Storing nonce: GDpsvN1zos3g1xd3z2X51j91BO54A7l8TQwPYuNvGEphy0azsPw 2024-04-26 11:06:48,557:DEBUG:acme.client:JWS payload: b'' 2024-04-26 11:06:48,562:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591007887: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiR0Rwc3ZOMXpvczNnMXhkM3oyWDUxajkxQk81NEE3bDhUUXdQWXVOdkdFcGh5MGF6c1B3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEwMDc4ODcifQ", "signature": "G_nBE6PSI5whbstPETy3skpsRrjkiKAnFyA4i4Eqb55nN7-L8pfdd4yPiOSkf9RLdq-ht8Rb4fEM1gEJdak3dPLBJ5ZNW5hFcSlq40vTsnjFe8o2-rGYxzK4cEuL1ox2oPi_jBefK2-GO-zgGB82vDNMtc3q3Yy2szv5zESmNW2ug-nOBrtSW-V0OsoDC-r1teTX6dUAe0h9ImjWCJ2SmNjUT4yFl3domuEYxAOcT4b9VwKxIfLBEU4MQ55GtDzfBhmTazcTd26h5nigvJF840903RxY_OuTuJ1ftMWSBg6fV9tmYueQ3MfSEc08Z2zLjSYSEpZngOlW6VFU55M_VA", "payload": "" } 2024-04-26 11:06:48,720:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591007887 HTTP/1.1" 200 807 2024-04-26 11:06:48,721:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:07:29 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gIMTIGxVbu75_joSNIItMtMnUsdz4s47jd0gcVj8fSj_UqhIHag X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:39:24Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591007887/PHBLZA", "token": "beB8Rj2vf_xsZdii23LrzSWxOGBiGEzmy54e95GXHoc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591007887/Lbw9kw", "token": "beB8Rj2vf_xsZdii23LrzSWxOGBiGEzmy54e95GXHoc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591007887/PJqcrw", "token": "beB8Rj2vf_xsZdii23LrzSWxOGBiGEzmy54e95GXHoc" } ] } 2024-04-26 11:06:48,721:DEBUG:acme.client:Storing nonce: gIMTIGxVbu75_joSNIItMtMnUsdz4s47jd0gcVj8fSj_UqhIHag 2024-04-26 11:06:48,721:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-26 11:06:48,722:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-04-26 11:06:48,722:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-26 11:06:48,722:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-26 11:06:48,723:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 11:06:48,723:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-26 11:06:48,723:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-26 11:06:48,724:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-26 11:06:48,725:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 11:06:48,765:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-26 11:06:49,041:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-26 11:06:49,042:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-26 11:06:49,043:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-26 11:06:49,048:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:14 UTC. 2024-04-26 11:06:49,048:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 11:06:49,048:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-26 11:06:49,052:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-26 11:06:49,052:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-26 11:06:49,052:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-26 11:06:49,056:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-26 11:06:49,057:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-26 11:06:49,059:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-26 11:06:49,521:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-26 11:06:49,522:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:07:30 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "fn_WBfOy4F4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-26 11:06:49,522:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-26 11:06:53,741:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7912_key-certbot.pem 2024-04-26 11:06:57,629:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7910_csr-certbot.pem 2024-04-26 11:06:57,630:DEBUG:acme.client:Requesting fresh nonce 2024-04-26 11:06:57,630:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-26 11:06:57,784:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-26 11:06:57,785:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:07:38 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gIMTIGxVDv5yx-iah4cfxxQIyIriIgN_oKEhSgtd9rK1USkndWI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-26 11:06:57,785:DEBUG:acme.client:Storing nonce: gIMTIGxVDv5yx-iah4cfxxQIyIriIgN_oKEhSgtd9rK1USkndWI 2024-04-26 11:06:57,785:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-04-26 11:06:57,790:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ0lNVElHeFZEdjV5eC1pYWg0Y2Z4eFFJeUlyaUlnTl9vS0VoU2d0ZDlySzFVU2tuZFdJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "LhzQ0aUAzxFFG-twO9imrzBL7zubViGYDopg5JiL5dkqW3tkkNUEbSIlJHfasJeFpvwEqkGKB1ppjeZdhcLds4l4_o93_CBEH-PHSA6uq1MFaC_PjaxPv7zzaJMgkBZoFj46wxXq_vy71ooDNhCokpJrODBkgW68zBqW59CFbWABAf7Gvmigc2oZDmLBHLB0E06nc3aFOjJKWWc2XCe58vCW83jA3TD2o5PsEjsMCT1H9BG8x53dzwbbRfAGUXqtBthoJvTc_puw810Sa-WOIh4s8qoxlauBkua6u94_MRyV4qPWzNKuf0lR2l-fsotcSd4PkwWMEg59DIPO-ot5jA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-26 11:06:57,957:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-04-26 11:06:57,957:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Apr 2024 09:07:38 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263785995757 Replay-Nonce: gIMTIGxV8C6673OFwwS_eqTt4Fevo5xOS2-e4uAFZJ4ZhHuNTgI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:39:35Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591052317" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263785995757" } 2024-04-26 11:06:57,957:DEBUG:acme.client:Storing nonce: gIMTIGxV8C6673OFwwS_eqTt4Fevo5xOS2-e4uAFZJ4ZhHuNTgI 2024-04-26 11:06:57,958:DEBUG:acme.client:JWS payload: b'' 2024-04-26 11:06:57,963:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591052317: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ0lNVElHeFY4QzY2NzNPRnd3U19lcVR0NEZldm81eE9TMi1lNHVBRlpKNFpoSHVOVGdJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEwNTIzMTcifQ", "signature": "T19Zh99KKN8oUyqLv2rvx0_3MXQsI9TWQu32gMLivNwjYy-2DoAfs_tzHQhgJwfFjnixSk8U-XBZNxGkTrN4lezFZPwFAsmgallruA50bo93QeraUUL9knF6P6Vs4EP93CAeRavC9504DDR-lrsWeF2l0BQrBuGt5ibJH3I72S8h0f3wj4lEjYGBw0xfR5JsCic25r3k-89SrQ35K_IE0GsbmLF62bAtmThXbYoz6R-IqNQzuaDYXism5sFej9qMe-_orr57sxOS1oopo4tOINwSI2sebY6pyqAsftQkFR07V072KTOrijcY7r34VOdZkd_gwj5yqBaAwzamtHwmJA", "payload": "" } 2024-04-26 11:06:58,123:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591052317 HTTP/1.1" 200 801 2024-04-26 11:06:58,123:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:07:38 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gIMTIGxVk42jUPoM--LK3n_BCmjIQIXoUKB9sdG2ZzOgQwAYqnU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:39:35Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591052317/nXYSvg", "token": "MIjKvMphRPU5OnxpnP63SaWPXmuRx-D-028G2__U8nQ" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591052317/lcK_gw", "token": "MIjKvMphRPU5OnxpnP63SaWPXmuRx-D-028G2__U8nQ" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591052317/A5w39g", "token": "MIjKvMphRPU5OnxpnP63SaWPXmuRx-D-028G2__U8nQ" } ] } 2024-04-26 11:06:58,123:DEBUG:acme.client:Storing nonce: gIMTIGxVk42jUPoM--LK3n_BCmjIQIXoUKB9sdG2ZzOgQwAYqnU 2024-04-26 11:06:58,124:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-26 11:06:58,124:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-04-26 11:06:58,124:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-26 11:06:58,124:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-26 11:06:58,124:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 11:06:58,125:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-26 11:06:58,125:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-26 11:06:58,125:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-26 11:06:58,126:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 11:06:58,180:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-26 11:06:58,435:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-26 11:06:58,436:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-26 11:06:58,437:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-26 11:06:58,441:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:32 UTC. 2024-04-26 11:06:58,441:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 11:06:58,442:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-26 11:06:58,445:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-26 11:06:58,446:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-26 11:06:58,446:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-26 11:06:58,462:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-26 11:06:58,462:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-26 11:06:58,463:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-26 11:06:58,936:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-26 11:06:58,937:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:07:39 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "GidLkD7xJuw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-26 11:06:58,937:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-26 11:07:03,696:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7913_key-certbot.pem 2024-04-26 11:07:07,667:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7911_csr-certbot.pem 2024-04-26 11:07:07,668:DEBUG:acme.client:Requesting fresh nonce 2024-04-26 11:07:07,668:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-26 11:07:07,826:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-26 11:07:07,826:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:07:48 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gIMTIGxVWBfN867IMXqRntZQ4oMWDoVvdPpIt4r2A1NkMbqoh1U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-26 11:07:07,826:DEBUG:acme.client:Storing nonce: gIMTIGxVWBfN867IMXqRntZQ4oMWDoVvdPpIt4r2A1NkMbqoh1U 2024-04-26 11:07:07,827:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-04-26 11:07:07,832:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ0lNVElHeFZXQmZOODY3SU1YcVJudFpRNG9NV0RvVnZkUHBJdDRyMkExTmtNYnFvaDFVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "CNxLp25jm2uiPYKZ1aEPYFLKhaWytHw80otBDVnSYlLPOX7u_1VFsl2H3XGs7JCGvP5gPXn7pqXoxpZtBNlCs0XF79VdX9IlecUFmXoKRAtxXJbQxnxn6XrpZC3cLggE7o6VDfqW4UQrRQTqOcZEec6e5WqPzTxqTu2Ti0UIJg8vgT32XB1m_tyV72nhN1rNfNBensGlfin_HnvlY6xMs103W6YgAMcghIGw7-a73VBzf3Gnh3PPMUESiiPfPqrKaP9QudUK2RVQLe4NvvJJlv7RyAWkXcdw8euc7FfoJU-UR4WWzvGDK180W5qmtmYBm70x4JiNoY1g-NhT3s5Hjw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-26 11:07:08,010:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-26 11:07:08,011:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Apr 2024 09:07:48 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786022187 Replay-Nonce: gIMTIGxV86U2NRDZIJXG8TsDGVeOMqU0I6ayfpoyUInPpsNU5_k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:39:46Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591093777" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786022187" } 2024-04-26 11:07:08,011:DEBUG:acme.client:Storing nonce: gIMTIGxV86U2NRDZIJXG8TsDGVeOMqU0I6ayfpoyUInPpsNU5_k 2024-04-26 11:07:08,011:DEBUG:acme.client:JWS payload: b'' 2024-04-26 11:07:08,017:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591093777: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ0lNVElHeFY4NlUyTlJEWklKWEc4VHNER1ZlT01xVTBJNmF5ZnBveVVJblBwc05VNV9rIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEwOTM3NzcifQ", "signature": "Td-ucA0J4avFkTL_3HuDhRW1tajnUvj4Kt2yxe-jYYQ31WvR1em8b2tEAS3KOgXF-_q2-UJjxVwPko8ueEkQ853nF3--fIuPpsky63kNoh-0d8XcyjuBcKRaS32gttCCassV13mZ9Q63_rEIB2EFvYZU5-pCTcXSZFVHdWaSfaJGoWeXuKbfHzsWywB1b7arOATiX33j3YBunDiCnua4dgXslqxi-mOXGqe2HJ244WDpL0nQy_Lcc3jNLzYaa8Jclxs99-KCVo59qObTP4u8oqWaQUgM-MYEboHZe4ife0WLLmfGUwTOupSPeYiBojNT4ywwtnsK_uRkNEUbXgClfw", "payload": "" } 2024-04-26 11:07:08,178:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591093777 HTTP/1.1" 200 805 2024-04-26 11:07:08,179:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:07:48 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gIMTIGxV26eOYH13_pYFjWMoyu0bPUqSUmX9L9cG4AmwGEOFp5k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:39:46Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591093777/5L951w", "token": "wULsoLc7wACByPCe5SgzOs2w85CZ8-Gr43fdXB5k6SA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591093777/egwr_w", "token": "wULsoLc7wACByPCe5SgzOs2w85CZ8-Gr43fdXB5k6SA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591093777/HMvVIg", "token": "wULsoLc7wACByPCe5SgzOs2w85CZ8-Gr43fdXB5k6SA" } ] } 2024-04-26 11:07:08,179:DEBUG:acme.client:Storing nonce: gIMTIGxV26eOYH13_pYFjWMoyu0bPUqSUmX9L9cG4AmwGEOFp5k 2024-04-26 11:07:08,180:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-26 11:07:08,180:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-04-26 11:07:08,181:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-26 11:07:08,181:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-26 11:07:08,182:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 11:07:08,182:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-26 11:07:08,182:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-26 11:07:08,182:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-26 11:07:08,183:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 11:07:08,221:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-26 11:07:08,406:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-26 11:07:08,407:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-04-26 11:07:08,408:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-04-26 11:07:08,411:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:48 UTC. 2024-04-26 11:07:08,411:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 11:07:08,411:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-26 11:07:08,416:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-26 11:07:08,416:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-26 11:07:08,416:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-26 11:07:08,421:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-26 11:07:08,422:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-26 11:07:08,424:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-26 11:07:08,878:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-26 11:07:08,878:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:07:49 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "7vm3YATBJTE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-26 11:07:08,879:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-26 11:07:12,880:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7914_key-certbot.pem 2024-04-26 11:07:16,787:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7912_csr-certbot.pem 2024-04-26 11:07:16,788:DEBUG:acme.client:Requesting fresh nonce 2024-04-26 11:07:16,788:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-26 11:07:16,939:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-26 11:07:16,939:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:07:57 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y_7AIQuU_NT_ixnSWlOeuCdk3LDzxtHj8M9nw-S2_OloXWJOLf8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-26 11:07:16,940:DEBUG:acme.client:Storing nonce: Y_7AIQuU_NT_ixnSWlOeuCdk3LDzxtHj8M9nw-S2_OloXWJOLf8 2024-04-26 11:07:16,940:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-04-26 11:07:16,944:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWV83QUlRdVVfTlRfaXhuU1dsT2V1Q2RrM0xEenh0SGo4TTludy1TMl9PbG9YV0pPTGY4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "HShzqNnO_AnWkFMOyn048iAcmAe2D-weqn4CPCbrRStOrXLalhd81MXc6a_N_x5ap6dS7PngjJU9ELf5LLxRai89ERG1RISI7yTdkQ4EK8ManJzi620j_4Kwo837fnz9a3YCaIThrrwls0pacviFhoJmc9nn-KdJlSJy2JCXBFnXBGG7p_PXo0VSODZ2ZlN8r7-XO_IunIxPWXUY35lTukFE0dQIZDCb7e-1kO0TXcmysYzAjc0MGquGhiuLL65D6w8YgZtiVys2aBj86HIPZ7ciVUwAQQc3RFdi3mFAbMVKU3vg_f5zPJ2-99b84PScYAfx0BfpUVj3_ZoqjgiJPw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-04-26 11:07:17,124:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-04-26 11:07:17,124:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Apr 2024 09:07:57 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786050437 Replay-Nonce: Y_7AIQuU5j5acSzMqafU6lTO7_7-SHHeq5THTRH6V0HPjMlDhfQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:39:57Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591136247" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786050437" } 2024-04-26 11:07:17,125:DEBUG:acme.client:Storing nonce: Y_7AIQuU5j5acSzMqafU6lTO7_7-SHHeq5THTRH6V0HPjMlDhfQ 2024-04-26 11:07:17,125:DEBUG:acme.client:JWS payload: b'' 2024-04-26 11:07:17,131:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591136247: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWV83QUlRdVU1ajVhY1N6TXFhZlU2bFRPN183LVNISGVxNVRIVFJINlYwSFBqTWxEaGZRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTExMzYyNDcifQ", "signature": "faI7fl_9KR59W86DhyjDS9SQUJQLwf_P9Cg8i320zDGwdC8DC5yllwjhwQAE52Oi1jYQSf1jQ0XgzXWEUsnqNQSWZYMAlQw946sPSMls-kEJv0OxcdKfztKraGa-Ol1rjhvREPTp9wrxLgPq3sLemYkSlCTb8qWGoFhv92k-J2iFEhYf8JaXnq15cWz9scAFuOZYtTjEhpZvsuG-b06GJiqks2_7vDFqS_g8Wq7wxBHwJ8hPlx2n8iXq4Ols4Jg1fLR1j2V49dYqi8gFa8DwFWdlLsBP9jcmdIBsUshO354b5jgyqUav0G-zNhWHFcKt-nUd6jlze4A4ObtpxUIGwg", "payload": "" } 2024-04-26 11:07:17,328:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591136247 HTTP/1.1" 200 809 2024-04-26 11:07:17,329:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:07:57 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: O0afatDIMhoPyZJ8h3xsKeIYV_z8hoEK9SeUolT0BozNmV_Btow X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:39:57Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591136247/jmrcew", "token": "dV2yZMj-jEV96xJosxLDIsbyMijaWSPD6FdtA3sRgXw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591136247/-o7nbg", "token": "dV2yZMj-jEV96xJosxLDIsbyMijaWSPD6FdtA3sRgXw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591136247/DEae2A", "token": "dV2yZMj-jEV96xJosxLDIsbyMijaWSPD6FdtA3sRgXw" } ] } 2024-04-26 11:07:17,329:DEBUG:acme.client:Storing nonce: O0afatDIMhoPyZJ8h3xsKeIYV_z8hoEK9SeUolT0BozNmV_Btow 2024-04-26 11:07:17,329:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-26 11:07:17,330:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-04-26 11:07:17,330:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-26 11:07:17,330:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-26 11:07:17,331:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 11:07:17,331:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-26 11:07:17,331:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-26 11:07:17,332:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-26 11:07:17,333:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 11:07:17,373:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-26 11:07:17,572:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-26 11:07:17,573:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-26 11:07:17,574:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-26 11:07:17,579:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:06 UTC. 2024-04-26 11:07:17,579:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 11:07:17,580:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-26 11:07:17,585:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-26 11:07:17,585:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-26 11:07:17,586:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-26 11:07:17,591:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-26 11:07:17,591:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-26 11:07:17,592:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-26 11:07:18,067:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-26 11:07:18,067:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:07:58 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "wUWMLT9fcA0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-04-26 11:07:18,067:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-26 11:07:22,133:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7915_key-certbot.pem 2024-04-26 11:07:26,096:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7913_csr-certbot.pem 2024-04-26 11:07:26,096:DEBUG:acme.client:Requesting fresh nonce 2024-04-26 11:07:26,096:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-26 11:07:26,254:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-26 11:07:26,255:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:08:06 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: GDpsvN1zMEA7XfrFwUIq2kxd4yPVvHJ_1wbrfTNXQX0lkvfj-cM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-26 11:07:26,255:DEBUG:acme.client:Storing nonce: GDpsvN1zMEA7XfrFwUIq2kxd4yPVvHJ_1wbrfTNXQX0lkvfj-cM 2024-04-26 11:07:26,255:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-04-26 11:07:26,261:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiR0Rwc3ZOMXpNRUE3WGZyRndVSXEya3hkNHlQVnZISl8xd2JyZlROWFFYMGxrdmZqLWNNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "pEd-Be_BJGdMsx-iYXEA5uC_cP5mMxZhUlNaL3g_DFJQoPhWxL_KJ528drVPJ6KHFhD-dHKo6kGMvvMyPCZsGmzfMusjdRb4QvNznruho4pSYMs1hioBJDZA3I28ZJ0U1OJ5UFIwX5eeOVkaS9pUF_Me0xF_7kldG8F2fF7LzCcj2abQU4PDNo5w91DgUjN2_-wsRNYqj55NGYpRilTHcZ9dedNxvmddUQbGDANwQI_GLk2dfWvaIV1DmRlpAvHLDJb-VmGe9YBMd0pN-YGaj-hx2PUtDoaAPO2nHL1ZRL7gN7IBfkHO_OQYeEaAPvSR7e5vFHlAFNtXxBuvuQffaw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-04-26 11:07:26,429:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-04-26 11:07:26,430:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Apr 2024 09:08:07 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786101437 Replay-Nonce: GDpsvN1zf-Y1ePO5FMQgcReRApGFEKmHydywGTYtcFaqDIEhbNo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:40:08Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591202447" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786101437" } 2024-04-26 11:07:26,430:DEBUG:acme.client:Storing nonce: GDpsvN1zf-Y1ePO5FMQgcReRApGFEKmHydywGTYtcFaqDIEhbNo 2024-04-26 11:07:26,431:DEBUG:acme.client:JWS payload: b'' 2024-04-26 11:07:26,436:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591202447: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiR0Rwc3ZOMXpmLVkxZVBPNUZNUWdjUmVSQXBHRkVLbUh5ZHl3R1RZdGNGYXFESUVoYk5vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEyMDI0NDcifQ", "signature": "Y-gHC23fmFh26yhdIGj-1yUr4SqvGnFG12Ll9Mwl4fODXG2ynbqm1UqS4yiWxmqzdbqcA5IDKQ5e3dINmwg-IId30rgZzWJtmhiQt0RSJV7gLx1xmrPBbTDfKfudwUDWhybYhWEaQINTEpoyfHf_FfqcEGpP4Br-QkwMGoXUqpQqmtkeIg49ojrKDjvdbPXiiqXxI7r1YYZ9QsbAwcNE_EjZHnGnLhF1_gloG6eK81v1jSNvm2x21NXF3nFfaYx85uqkRR0JPx5a35-rigmarvIRirTWzpZfhhI_2GwzoD9eMadU8H1AaXhfCJQVMmxYkJisE94tNzCjRwC0IabDOQ", "payload": "" } 2024-04-26 11:07:26,598:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591202447 HTTP/1.1" 200 806 2024-04-26 11:07:26,598:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:08:07 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: GDpsvN1ziw5CnJdFYxdKEJHkDLa7fTFiVHhf8SNWfmuxxUYCzUg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:40:08Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591202447/8XsmxQ", "token": "G1AdFqNnmnT088RDP0J9KtOwA_p7D5YMb-gb1g7ExAc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591202447/a1GZzw", "token": "G1AdFqNnmnT088RDP0J9KtOwA_p7D5YMb-gb1g7ExAc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591202447/qG0r0A", "token": "G1AdFqNnmnT088RDP0J9KtOwA_p7D5YMb-gb1g7ExAc" } ] } 2024-04-26 11:07:26,598:DEBUG:acme.client:Storing nonce: GDpsvN1ziw5CnJdFYxdKEJHkDLa7fTFiVHhf8SNWfmuxxUYCzUg 2024-04-26 11:07:26,599:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-26 11:07:26,599:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-04-26 11:07:26,600:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-26 11:07:26,600:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-26 11:07:26,601:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 11:07:26,601:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-26 11:07:26,601:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-26 11:07:26,601:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-26 11:07:26,602:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 11:07:26,649:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-04-26 11:07:26,649:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 11:07:26,649:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-04-26 11:07:26,656:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-04-26 11:07:26,659:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-04-26 11:07:26,659:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-04-26 11:07:26,659:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-04-26 11:07:26,660:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-04-26 11:07:26,661:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-04-26 11:07:26,702:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-26 11:07:26,907:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-26 11:07:26,908:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-26 11:07:26,909:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-26 11:07:26,914:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:23 UTC. 2024-04-26 11:07:26,914:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 11:07:26,914:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-26 11:07:26,918:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-26 11:07:26,918:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-26 11:07:26,919:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-26 11:07:26,924:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-26 11:07:26,925:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-26 11:07:26,927:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-26 11:07:27,372:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-26 11:07:27,373:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:08:07 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Z8ttTAFyIp0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-26 11:07:27,373:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-26 11:07:31,592:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7916_key-certbot.pem 2024-04-26 11:07:35,427:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7914_csr-certbot.pem 2024-04-26 11:07:35,427:DEBUG:acme.client:Requesting fresh nonce 2024-04-26 11:07:35,427:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-26 11:07:35,598:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-26 11:07:35,598:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:08:16 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y_7AIQuUmxsc-dvI4ye7a-y42HJ7U4nmqfNiW1KIfTzQQY_NJvA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-26 11:07:35,598:DEBUG:acme.client:Storing nonce: Y_7AIQuUmxsc-dvI4ye7a-y42HJ7U4nmqfNiW1KIfTzQQY_NJvA 2024-04-26 11:07:35,599:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-04-26 11:07:35,604:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWV83QUlRdVVteHNjLWR2STR5ZTdhLXk0MkhKN1U0bm1xZk5pVzFLSWZUelFRWV9OSnZBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "wmFTPq2HOHorFSR-2dQx5ocWEmTIGdV9Jlpu_beSlnJlsBQPGiHSxR_gYt9Ry_yZnRP8sxabwMGPimXii3H9pIZVFH8g45kGgKoU2pP3ZGlopNQRV3MNtY_aUsaMmHRMzdBchkOswcfSPyef8-PY7oNHaSUNEVxtmsHuxfR_tR_w17ygWGGGVQykmjkV3Pp8WEJdOTp1MGck5j4QJnNX-HnzblYDebCu_D-ny__-UOptuOyrnSkXn9-Dt7nymt3dhvhy1ZJX-py5PvBDlBrObPcXlkyBKoJiYZhfRfeKwnoeDEdg0ZrY-zrOW2Jwmou-GsoQoigG1WSFvxBL-KiLMQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-26 11:07:35,792:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-04-26 11:07:35,792:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Apr 2024 09:08:16 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786138347 Replay-Nonce: Y_7AIQuUFlGf0M9lJWSZpCFjNu-Z2w74q2ATNEcgeWZ7fWvnWOo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:40:19Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591256287" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786138347" } 2024-04-26 11:07:35,792:DEBUG:acme.client:Storing nonce: Y_7AIQuUFlGf0M9lJWSZpCFjNu-Z2w74q2ATNEcgeWZ7fWvnWOo 2024-04-26 11:07:35,793:DEBUG:acme.client:JWS payload: b'' 2024-04-26 11:07:35,798:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591256287: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWV83QUlRdVVGbEdmME05bEpXU1pwQ0ZqTnUtWjJ3NzRxMkFUTkVjZ2VXWjdmV3ZuV09vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEyNTYyODcifQ", "signature": "gDXKsCHRqYJ2Jk-Mvj1yZ22cNTzcNytViCSQQHF4Z4jFRGxRsDgVLuCWVcYvU_aPCY3A7jsFwY7ljRTaiqYNHfbmdQ-dV0MG1UbjrI4ioo24WgTvCsnte8fyWHTNKzUbL9Z_2ov9Bu_DZEekkDD79sH4Fx_Wxm2tzXJV1Ze6f1je9Tjs0GKPmcsfNwTC0rNubxFT-5VgfvfvDKG4Z1V-RhifWv266esId1mCqXH24kjZg8QlaM7KMt46JeFnir7amfQ991NXS78Of6wa7fGzQXmz3GJrDnYQZNvdLvkB1kil1gsCi4hVyP-03gXPG06bw1mgn5cW66JrIlMl87cGaQ", "payload": "" } 2024-04-26 11:07:35,950:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591256287 HTTP/1.1" 200 811 2024-04-26 11:07:35,951:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:08:16 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: O0afatDI6AZOuKOJSuySghaqpwZKnv0PeAaFAkxVb0C_-MDjoFQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:40:19Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591256287/K-RCZw", "token": "VNACvIqg7Fgn_WHq8b2_oKzrZYhRTgcu5X8dE-g-JYI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591256287/Qx_SSA", "token": "VNACvIqg7Fgn_WHq8b2_oKzrZYhRTgcu5X8dE-g-JYI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591256287/92J4RA", "token": "VNACvIqg7Fgn_WHq8b2_oKzrZYhRTgcu5X8dE-g-JYI" } ] } 2024-04-26 11:07:35,951:DEBUG:acme.client:Storing nonce: O0afatDI6AZOuKOJSuySghaqpwZKnv0PeAaFAkxVb0C_-MDjoFQ 2024-04-26 11:07:35,952:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-26 11:07:35,952:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-04-26 11:07:35,953:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-26 11:07:35,953:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-26 11:07:35,954:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 11:07:35,954:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-26 11:07:35,954:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-26 11:07:35,954:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-26 11:07:35,955:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 11:07:36,006:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-26 11:07:36,213:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-26 11:07:36,214:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-26 11:07:36,214:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-26 11:07:36,219:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:41 UTC. 2024-04-26 11:07:36,219:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 11:07:36,219:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-26 11:07:36,224:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-26 11:07:36,224:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-26 11:07:36,224:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-26 11:07:36,229:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-26 11:07:36,229:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-26 11:07:36,231:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-26 11:07:36,723:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-26 11:07:36,723:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:08:17 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "S5bK0cjihGo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-26 11:07:36,724:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-26 11:07:40,806:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7917_key-certbot.pem 2024-04-26 11:07:44,637:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7915_csr-certbot.pem 2024-04-26 11:07:44,638:DEBUG:acme.client:Requesting fresh nonce 2024-04-26 11:07:44,638:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-26 11:07:44,798:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-26 11:07:44,798:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:08:25 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gIMTIGxV_7_BslnkNTZN5oXEwQct4VxFRtQOpwwZJIFCQ_gjGnw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-26 11:07:44,798:DEBUG:acme.client:Storing nonce: gIMTIGxV_7_BslnkNTZN5oXEwQct4VxFRtQOpwwZJIFCQ_gjGnw 2024-04-26 11:07:44,801:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-04-26 11:07:44,806:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZ0lNVElHeFZfN19Cc2xua05UWk41b1hFd1FjdDRWeEZSdFFPcHd3WkpJRkNRX2dqR253IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "wdMzCRecgEVdMfmWro1IOdbSKHcwfCbSuPpQwXn_t8N4bKxM7_TSeT-Pjzyj-FEECyVT0dzUXUqof-rqkCKMVq7-CaxsQNpmdrY9i5YnoT_B1SIIgqkl3th0tMYC5_52cjZgCfmtqSMx581PqUpQmdpJ3ogeBBH1wiZNinZX7TDfgaxyZxvEN0RoKh6gWnzMfWretF713-VPi6l_xOoKn0foSVzrn90H_HIvyPmIN4bUbnC_GYFA3stm4DkSnqI2Ot8ZRyjQX9mgizrIqzdXEHlIwrNPfuLwZI8SmQynP8O180xdQyyGGe_Cv3Z7UNLiJCSDw7ar9De-VvKWKfuS3Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-26 11:07:44,975:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-04-26 11:07:44,976:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Apr 2024 09:08:25 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786169497 Replay-Nonce: GDpsvN1zP2OgCzF0yAT5zS9vIyQXEWhsLFn5VHPJW8eaWee-ieI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:40:30Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591303867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786169497" } 2024-04-26 11:07:44,976:DEBUG:acme.client:Storing nonce: GDpsvN1zP2OgCzF0yAT5zS9vIyQXEWhsLFn5VHPJW8eaWee-ieI 2024-04-26 11:07:44,976:DEBUG:acme.client:JWS payload: b'' 2024-04-26 11:07:44,982:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591303867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiR0Rwc3ZOMXpQMk9nQ3pGMHlBVDV6Uzl2SXlRWEVXaHNMRm41VkhQSlc4ZWFXZWUtaWVJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEzMDM4NjcifQ", "signature": "RklqiiDeengITBfrhlScBfBEJkxrPrGyVxOBZTFwn39e9aXRAIYK39TDOgQiQtq1jr8im9PQKThiG6SWmV548J1pqsQ4V2VsgZFGVPQIMTfRC-2sp0vHEMVfcT5OqtgNV7stpTKTJtz-LP6Y9mLsiZzQXw3WB2upw3ywPzOxGYs1zM0SZ_7iOFJhGmtxZUGG9ZqJlyA7-Csfe1a0yxBVg-z3NI84sUYnfV3zbeJ0eRfwG3cU3DUncofbgbCLJ9LIXhFZ1YBXu9eMJCBHhDalbKSBW1WD4aoaV5lWb-hpR8TW74diNZaAlDrMzUtAwtdoThU162iRtnVQtBpVMRPRMg", "payload": "" } 2024-04-26 11:07:45,144:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591303867 HTTP/1.1" 200 810 2024-04-26 11:07:45,145:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:08:25 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: GDpsvN1z8RNQtkAJ3-0inVrBOaYc_2SX549_f5hnK3L2JNX3AOc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:40:30Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591303867/fVMRLg", "token": "v7V3rLmlxo6NcGbELkoNnlOhXK0p8NRQZV8Vqx6IRq0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591303867/q_0-Ew", "token": "v7V3rLmlxo6NcGbELkoNnlOhXK0p8NRQZV8Vqx6IRq0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591303867/G3BN_A", "token": "v7V3rLmlxo6NcGbELkoNnlOhXK0p8NRQZV8Vqx6IRq0" } ] } 2024-04-26 11:07:45,145:DEBUG:acme.client:Storing nonce: GDpsvN1z8RNQtkAJ3-0inVrBOaYc_2SX549_f5hnK3L2JNX3AOc 2024-04-26 11:07:45,145:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-26 11:07:45,146:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-04-26 11:07:45,147:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-26 11:07:45,147:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-26 11:07:45,149:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 11:07:45,149:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-26 11:07:45,150:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-26 11:07:45,150:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-26 11:07:45,151:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 11:07:45,199:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-26 11:07:45,488:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-26 11:07:45,489:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-04-26 11:07:45,490:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-04-26 11:07:45,494:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:58 UTC. 2024-04-26 11:07:45,494:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 11:07:45,495:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-26 11:07:45,508:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-26 11:07:45,508:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-26 11:07:45,509:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-26 11:07:45,513:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-26 11:07:45,514:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-26 11:07:45,516:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-26 11:07:46,009:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-26 11:07:46,010:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:08:26 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "aF7UsMvTTrg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-26 11:07:46,011:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-26 11:07:50,673:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7918_key-certbot.pem 2024-04-26 11:07:55,578:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7916_csr-certbot.pem 2024-04-26 11:07:55,579:DEBUG:acme.client:Requesting fresh nonce 2024-04-26 11:07:55,579:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-26 11:07:55,725:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-26 11:07:55,726:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:08:36 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: O0afatDIeUmIphC9EPp0ml7_7z7sN9oTjk_kO7zpFb_W4EJZI08 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-26 11:07:55,726:DEBUG:acme.client:Storing nonce: O0afatDIeUmIphC9EPp0ml7_7z7sN9oTjk_kO7zpFb_W4EJZI08 2024-04-26 11:07:55,726:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-04-26 11:07:55,732:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiTzBhZmF0REllVW1JcGhDOUVQcDBtbDdfN3o3c045b1Rqa19rTzd6cEZiX1c0RUpaSTA4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "uNxzSSC5q15edoCBK9fQ3iNXXZ474RB4pbNg1KYg7Mdx2W2Xtkc2wl9EYVvzqGJFvmLX3lOCtqUfjvUlvcdIgajEyNEoa9ZeFl-5bGhIuxmkFzV7Kz8UJoA1z2MimtcqoXjs_IT_pRUMODRalCXnkOrZ17hW4GJaHODkcuyfZy1FKpBqYyKe-kuG-BZo_O5HNA76ijzA2ptqMlTo4nvscG4ekMAB0nfkx4QIC-RN0DuIci1-2Xmbwb1oDO89cK8qkkEaqrWhgPGOCkXe632EImBjb1cz8gEo_frxCT_QMCOszoVvq3NJ2BnrauijD27xphN9_9mhEbydm7WyBpRDpQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-04-26 11:07:55,914:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-04-26 11:07:55,915:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Apr 2024 09:08:36 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786200537 Replay-Nonce: Y_7AIQuUBURG0Z4URfmR6Q4oHbdiiBgPdH700kAYF6Fq0n2RX9s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:40:41Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591349607" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786200537" } 2024-04-26 11:07:55,915:DEBUG:acme.client:Storing nonce: Y_7AIQuUBURG0Z4URfmR6Q4oHbdiiBgPdH700kAYF6Fq0n2RX9s 2024-04-26 11:07:55,915:DEBUG:acme.client:JWS payload: b'' 2024-04-26 11:07:55,921:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591349607: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWV83QUlRdVVCVVJHMFo0VVJmbVI2UTRvSGJkaWlCZ1BkSDcwMGtBWUY2RnEwbjJSWDlzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEzNDk2MDcifQ", "signature": "sDNRKBl9Jd7QdCuDEPLeWb8PFJvbPSp4-FoMUa3mRqjChdzQTXiFIDhFovaX0fLlIORivM7nJyRJwfgCLm-fOKa3O8xmFyeAXWSnSkZQR23_9f9fDGHzUyBC7FuEzarI1_burpcLMLwjgvqwbYi_WtKZ3YGOdW12GEmk7ENSUNrmvaYXQgwazvUDxv-SQ5-Ykpub-DmIR5cRL_IhKOD3ogdpu47gh3790EWdWGQOflhP4IL-pERvau1kjM5K_1HNndP1x0F-7lmjtgzvgX1zWSu4bdfAAgM7hUTNkR4JlU3A_UrxIZhqnFBrGHk7mtOldq1tUSI_qapwzQ9Icb5BFA", "payload": "" } 2024-04-26 11:07:56,073:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591349607 HTTP/1.1" 200 809 2024-04-26 11:07:56,074:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:08:36 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: O0afatDIyh_Y7b9EH2rbc7cqGOtU8YXx-THBPv94YWh4cszesaI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:40:41Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591349607/oncY-g", "token": "lEKPgmmcYCfvrPlwwVhh1yovbIr4Hpj5_O2FYaxZFKY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591349607/YKDY0A", "token": "lEKPgmmcYCfvrPlwwVhh1yovbIr4Hpj5_O2FYaxZFKY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591349607/Xd0Giw", "token": "lEKPgmmcYCfvrPlwwVhh1yovbIr4Hpj5_O2FYaxZFKY" } ] } 2024-04-26 11:07:56,074:DEBUG:acme.client:Storing nonce: O0afatDIyh_Y7b9EH2rbc7cqGOtU8YXx-THBPv94YWh4cszesaI 2024-04-26 11:07:56,075:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-26 11:07:56,075:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-04-26 11:07:56,075:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-26 11:07:56,076:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-26 11:07:56,076:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 11:07:56,077:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-26 11:07:56,077:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-26 11:07:56,077:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-26 11:07:56,078:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 11:07:56,119:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-26 11:07:56,300:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-26 11:07:56,301:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2024-04-26 11:07:56,301:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2024-04-26 11:07:56,306:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:17 UTC. 2024-04-26 11:07:56,306:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 11:07:56,307:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-26 11:07:56,311:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-26 11:07:56,311:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-26 11:07:56,311:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-26 11:07:56,316:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-26 11:07:56,317:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-26 11:07:56,319:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-26 11:07:56,753:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-26 11:07:56,754:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:08:37 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "GQsC7TT_T68": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-26 11:07:56,754:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-26 11:08:02,933:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7919_key-certbot.pem 2024-04-26 11:08:09,780:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7917_csr-certbot.pem 2024-04-26 11:08:09,781:DEBUG:acme.client:Requesting fresh nonce 2024-04-26 11:08:09,781:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-26 11:08:09,943:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-26 11:08:09,944:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:08:50 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: O0afatDIsdailALWF_bAh2GHydt-4uGtu5ryQk21ot8ZFq_wRYs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-26 11:08:09,944:DEBUG:acme.client:Storing nonce: O0afatDIsdailALWF_bAh2GHydt-4uGtu5ryQk21ot8ZFq_wRYs 2024-04-26 11:08:09,944:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-04-26 11:08:09,950:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiTzBhZmF0RElzZGFpbEFMV0ZfYkFoMkdIeWR0LTR1R3R1NXJ5UWsyMW90OFpGcV93UllzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "UeMGWyTHZuAIFFAa7SnwYj6Wtx9dNWaVfoN6XK1mFMZCZ6I0qWv4Dtcf-aGbqakjMI5zaHnCVn8x-Z-KoIztVfMRvLQWtZvayxl0EcKsielX3e8bT1uwwiS2VfYPQTJMQQm0S3I9NgkEHuq1VPv-MSRwTijQqER79Z5md49kcEGPvzzkv5S8CJrXwIKC59EseSMFrJIhVDWBNDW6B5dGSQfNpr_zGI8L5Xl0XhA2UK3XXYq5EOo1ljQgfUL7Y-dkPeHNK8nI9Nmzhk1x6CVFVzD8lgZVOd48I51iEXy6UsScSBzTLSZbXgqtGS0kZuBqh2z2Smch2NNIXQLZjInq2A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-26 11:08:10,114:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-26 11:08:10,115:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Apr 2024 09:08:50 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786231497 Replay-Nonce: Y_7AIQuUGAD6wiJIaLFkOiENhuPC5BoMPRlKqfhj1cdmRUibRYw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:40:52Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591394247" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786231497" } 2024-04-26 11:08:10,115:DEBUG:acme.client:Storing nonce: Y_7AIQuUGAD6wiJIaLFkOiENhuPC5BoMPRlKqfhj1cdmRUibRYw 2024-04-26 11:08:10,115:DEBUG:acme.client:JWS payload: b'' 2024-04-26 11:08:10,121:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591394247: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWV83QUlRdVVHQUQ2d2lKSWFMRmtPaUVOaHVQQzVCb01QUmxLcWZoajFjZG1SVWliUll3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEzOTQyNDcifQ", "signature": "IYw_nKfIFd8ZCmQgDJmxb_MKKZZbGcHndkmD28pPjZT4IsngvVNDORXTlvcDF6cGXadCSfcFWD85t16VMwdn4u4bzbEiltQTB5J8OAwS_32wGY1YXI6RJ9K9cm4bsX-fPZ7X75gMTKw3X1qMuVrIWAw4qg5y8PncJ-GKAD5Mflx_lXu0MD9BgbVGSqKiQwzc-q62LDbgJo86TGj062sRSho2wYSkH1qQ68tvYwMst8OibsBXxb9JEc6n3Kw6R868GKcAqjRRa5MpyY1R8VAnDs0D8JMpRaDZsfR9fcNIQGU3u9Vny75nr3AO2Cn-3qJyD9fC3hYso39CeWuEjJ7i1Q", "payload": "" } 2024-04-26 11:08:10,295:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591394247 HTTP/1.1" 200 805 2024-04-26 11:08:10,295:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:08:50 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y_7AIQuUIBCy4Xu5C3ZrzTdxCj7Osd3-8wmmPxmJ8rPdLiOkOsQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:40:52Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591394247/ePyIlw", "token": "oYmgBuOUaoivOJK8eY4kz7MGDKSVo32OgAN5bzlC-mY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591394247/TCtJEA", "token": "oYmgBuOUaoivOJK8eY4kz7MGDKSVo32OgAN5bzlC-mY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591394247/RorkVg", "token": "oYmgBuOUaoivOJK8eY4kz7MGDKSVo32OgAN5bzlC-mY" } ] } 2024-04-26 11:08:10,296:DEBUG:acme.client:Storing nonce: Y_7AIQuUIBCy4Xu5C3ZrzTdxCj7Osd3-8wmmPxmJ8rPdLiOkOsQ 2024-04-26 11:08:10,296:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-26 11:08:10,296:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-04-26 11:08:10,297:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-26 11:08:10,297:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-26 11:08:10,298:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 11:08:10,298:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-26 11:08:10,298:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-26 11:08:10,299:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-26 11:08:10,300:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 11:08:10,521:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-26 11:08:10,709:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-26 11:08:10,710:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-26 11:08:10,710:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-26 11:08:10,715:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:34 UTC. 2024-04-26 11:08:10,715:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 11:08:10,716:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-26 11:08:10,720:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-26 11:08:10,720:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-26 11:08:10,721:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-26 11:08:10,787:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-26 11:08:10,788:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-26 11:08:10,789:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-26 11:08:11,982:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-26 11:08:11,983:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:08:52 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Ise1Yf7dBww": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-26 11:08:11,984:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-26 11:08:17,429:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7920_key-certbot.pem 2024-04-26 11:08:21,506:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7918_csr-certbot.pem 2024-04-26 11:08:21,507:DEBUG:acme.client:Requesting fresh nonce 2024-04-26 11:08:21,507:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-26 11:08:21,657:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-26 11:08:21,658:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:09:02 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: O0afatDI1PrbOxP7dIcPHaDjRSS1Bq90rAXKOI_yW9q8wz6bYRk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-26 11:08:21,658:DEBUG:acme.client:Storing nonce: O0afatDI1PrbOxP7dIcPHaDjRSS1Bq90rAXKOI_yW9q8wz6bYRk 2024-04-26 11:08:21,658:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-04-26 11:08:21,665:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiTzBhZmF0REkxUHJiT3hQN2RJY1BIYURqUlNTMUJxOTByQVhLT0lfeVc5cTh3ejZiWVJrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "bfy_WWE48USIXxY8GWhwbtl7eAHuYK42KCoeWGWnFhlgCH0aRjGlEvTF5EWaRrlFTvcbShFTtEcg771pn-7giu_AIo9bNhaVG8a_5KOd1yb8NFLT4Qt7MKmuDETGHxxSbQN0yxP9rvaSAO69gH3Y8cjH0I0iq6n2M281nd4tlqKMUUO2V3hJNEq6WFyMkuWzfpQDJQRWy2ae6QGVrtP7Srf_Bxl1RH137Mp31K_7A1mzWLJh9USzasC4-RH5ibIBXXawbhb383Gpd65nbbYSux-gsLE6fvVStZ7zsQ2Y9YM1b7I8QpodXkh-pJmyeBH6HQj8oESiKMtTU9O7jNrIwA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-26 11:08:21,841:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-26 11:08:21,842:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Apr 2024 09:09:02 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786267447 Replay-Nonce: O0afatDIqlZojBCLWp7NMxMG-mWImcUx2ZX-2bKlELR2SOL2ylM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:41:03Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591444387" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786267447" } 2024-04-26 11:08:21,842:DEBUG:acme.client:Storing nonce: O0afatDIqlZojBCLWp7NMxMG-mWImcUx2ZX-2bKlELR2SOL2ylM 2024-04-26 11:08:21,842:DEBUG:acme.client:JWS payload: b'' 2024-04-26 11:08:21,847:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591444387: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiTzBhZmF0RElxbFpvakJDTFdwN05NeE1HLW1XSW1jVXgyWlgtMmJLbEVMUjJTT0wyeWxNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTE0NDQzODcifQ", "signature": "nhMjQq0ZIP8-XPG0A_7wYYSwYjHUOt6wQMjzPjBiqjuTwAJWY7TnBMG6kKGRJEaASB2YhikccQ4RIADmtv5JvIwykDoylqBn1vUOrzNbiDkJYRKjUZVJp_OBBGbGh1MyGn58nsKFhJP7qFhuz_BYRX2q3h_mUNhgsoI6hqfEun5P4Ijfbckry_XAhstmvyGYyczup80nZX6Ty-f9GC7GvPxW5U11bTe5k-xVH5Ip8Rw_dSmuOKJCo6yHAwjPZ6shk23-O0Jxx6Afmn6Mw0T_QHTmFOxXv7CL1KUOM_zMqcAOZZ1dhf9hHJa7lHVFjBupGgQZ4J8_ajJMIrb3tx-nHw", "payload": "" } 2024-04-26 11:08:22,013:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591444387 HTTP/1.1" 200 805 2024-04-26 11:08:22,014:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:09:02 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: O0afatDIeYzoqlSO7sl06RGVSBZUOPc3Iofdr7GOdCKRrq1UR6E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:41:03Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591444387/VwZ0tQ", "token": "z8Ul1zMz25vACMWktTfhRv_JHgA52ZiTFMeRSlTIJNg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591444387/OQQw2Q", "token": "z8Ul1zMz25vACMWktTfhRv_JHgA52ZiTFMeRSlTIJNg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591444387/x6ddUg", "token": "z8Ul1zMz25vACMWktTfhRv_JHgA52ZiTFMeRSlTIJNg" } ] } 2024-04-26 11:08:22,014:DEBUG:acme.client:Storing nonce: O0afatDIeYzoqlSO7sl06RGVSBZUOPc3Iofdr7GOdCKRrq1UR6E 2024-04-26 11:08:22,015:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-26 11:08:22,015:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-04-26 11:08:22,015:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-26 11:08:22,016:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-26 11:08:22,016:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 11:08:22,016:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-26 11:08:22,017:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-26 11:08:22,017:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-26 11:08:22,019:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 11:08:22,058:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-26 11:08:22,291:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-26 11:08:22,292:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-04-26 11:08:22,293:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-04-26 11:08:22,297:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:48 UTC. 2024-04-26 11:08:22,297:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-26 11:08:22,297:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-26 11:08:22,304:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-26 11:08:22,305:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-26 11:08:22,305:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-26 11:08:22,310:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-26 11:08:22,310:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-26 11:08:22,313:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-26 11:08:22,777:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-26 11:08:22,778:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:09:03 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "h-AORGvLQqc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-26 11:08:22,779:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-26 11:08:27,104:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7921_key-certbot.pem 2024-04-26 11:08:31,126:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7919_csr-certbot.pem 2024-04-26 11:08:31,127:DEBUG:acme.client:Requesting fresh nonce 2024-04-26 11:08:31,127:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-26 11:08:31,280:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-26 11:08:31,281:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:09:11 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: GDpsvN1zY3gu0-Bu8-HWdipWi_jeFwKjh0LrlV7jMO03NB3OGQM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-26 11:08:31,281:DEBUG:acme.client:Storing nonce: GDpsvN1zY3gu0-Bu8-HWdipWi_jeFwKjh0LrlV7jMO03NB3OGQM 2024-04-26 11:08:31,281:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-04-26 11:08:31,287:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiR0Rwc3ZOMXpZM2d1MC1CdTgtSFdkaXBXaV9qZUZ3S2poMExybFY3ak1PMDNOQjNPR1FNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "YRe8u8hQrab6yeQ5MKar_NQh-f_5QrAmFU2P82iws4LqpLZuu3cm4tbiV5C9cDTVzUY549jp7NuM_SGGLIBL9bPu4k8-0YBhy5hOsx-ieZD9Sd3StgOo_TixRaI1o5Xkg7WBnS7QVDuNRc0r6Fuz1DMjT2pYf41j_IORPZshmb2pbhRo0zwOXJCAO8-ZNulATkJVQwE4H6nRaCLa6JOnm_WvohbZB4RDpfHsBQ7PTowfTWi4wSrBHHVsC_fOPbaybP_i_GIcpoj3jqnx8Ej5pPAoqM2jU5opjnmgmsdZD8WD-8AnQqnc28GZc0E4W8ReTbEfzjpg3R5ZoDbyzFneQg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-26 11:08:31,456:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-26 11:08:31,456:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Apr 2024 09:09:12 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786306657 Replay-Nonce: GDpsvN1ztjkXw3ze-A57IEIJ603yjTxhHVsdvaA-GTqE8HSqqOQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:41:14Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591499197" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786306657" } 2024-04-26 11:08:31,457:DEBUG:acme.client:Storing nonce: GDpsvN1ztjkXw3ze-A57IEIJ603yjTxhHVsdvaA-GTqE8HSqqOQ 2024-04-26 11:08:31,457:DEBUG:acme.client:JWS payload: b'' 2024-04-26 11:08:31,465:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591499197: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiR0Rwc3ZOMXp0amtYdzN6ZS1BNTdJRUlKNjAzeWpUeGhIVnNkdmFBLUdUcUU4SFNxcU9RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTE0OTkxOTcifQ", "signature": "EJ56_E68NlRiHhC7wpGpcg5Ks_WhBZQlsZv_JabOMz7GD-wvFaQUvVSAWN1wD2HIlMCs3tq2mqX_BfANPPqtxeU3Lx88nkZgYYJ1CE8Al8KQjkatF887e8_smQfSY-qBreclw4ryk6XAfNBw_5Tez1Sqh6XLfgoZ3pI1ok-yCZj9dheBv7MbEGvxXENUV4Z8OWJWOlFbLPZp4wb_Pr-Y-Tm1_iBMK8spnMd3ftY0BdADvsVhKCWRi-0q1qxJm2IIVm905vtYtNhTgwaoICm8G1pvc9TZx7Rokzuqhr5Ldef7KfBmBComDD4SAvvJkm924Gyps9z4AbCMVevhNBcVzQ", "payload": "" } 2024-04-26 11:08:31,622:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591499197 HTTP/1.1" 200 805 2024-04-26 11:08:31,623:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Apr 2024 09:09:12 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: gIMTIGxVwgcqFQG4RgxV4Qg_2UZ_uDkyC4ua74p0AIxSLKlcxQs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:41:14Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591499197/wllBug", "token": "Fd-9sA7qPZwOOCczOUvR-JOGAFcVsaub88OTZRhbpbo" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591499197/l8TEMw", "token": "Fd-9sA7qPZwOOCczOUvR-JOGAFcVsaub88OTZRhbpbo" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591499197/3h01xg", "token": "Fd-9sA7qPZwOOCczOUvR-JOGAFcVsaub88OTZRhbpbo" } ] } 2024-04-26 11:08:31,623:DEBUG:acme.client:Storing nonce: gIMTIGxVwgcqFQG4RgxV4Qg_2UZ_uDkyC4ua74p0AIxSLKlcxQs 2024-04-26 11:08:31,624:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-26 11:08:31,624:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-04-26 11:08:31,625:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-26 11:08:31,625:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-26 11:08:31,626:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 11:08:31,626:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-26 11:08:31,626:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-26 11:08:31,627:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-26 11:08:31,628:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-26 11:08:31,628:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-04-26 11:08:31,628:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-04-26 11:08:31,639:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-04-26 11:08:31,641:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)