2024-04-25 13:23:22,269:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-04-25 13:23:22,269:DEBUG:certbot._internal.main:Arguments: [] 2024-04-25 13:23:22,269:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-04-25 13:23:23,519:DEBUG:certbot._internal.log:Root logging level set at 20 2024-04-25 13:23:23,520:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-04-25 13:23:23,562:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-04-25 13:23:23,605:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-25 13:23:23,887:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-25 13:23:23,898:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert9.pem is signed by the certificate's issuer. 2024-04-25 13:23:23,902:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert9.pem is: OCSPCertStatus.GOOD 2024-04-25 13:23:23,911:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:24 UTC. 2024-04-25 13:23:23,911:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-25 13:23:23,911:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-25 13:23:23,916:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-25 13:23:23,916:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-25 13:23:23,917:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-25 13:23:23,923:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-25 13:23:23,924:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-25 13:23:23,927:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-25 13:23:24,439:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-25 13:23:24,440:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:24:05 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Maro-OLziiU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-25 13:23:24,440:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-25 13:23:30,232:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7896_key-certbot.pem 2024-04-25 13:23:35,323:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7894_csr-certbot.pem 2024-04-25 13:23:35,324:DEBUG:acme.client:Requesting fresh nonce 2024-04-25 13:23:35,324:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-25 13:23:35,478:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-25 13:23:35,479:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:24:16 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43NqB_1rdpPq9BP1G68Nyf2EfaNrHLkJUNOklUOCR-JrjU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-25 13:23:35,479:DEBUG:acme.client:Storing nonce: sW-8q43NqB_1rdpPq9BP1G68Nyf2EfaNrHLkJUNOklUOCR-JrjU 2024-04-25 13:23:35,479:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-04-25 13:23:35,486:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M05xQl8xcmRwUHE5QlAxRzY4TnlmMkVmYU5ySExrSlVOT2tsVU9DUi1KcmpVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Fl-ozgz_uaJ9C0_-3guITu5LKA6kGQjxR5WLgz-0o8lK0agkC_SzBLQ2r_kSoFSAKrxhce_QRKUY5woMMMNoFid6UqQWSca_2twCXlaYsddiIbutXoo508rBDoAN0Cv2i2dJk8IXsJ64Q6pHICBwVV8SBaKp_50Thy3CuZ0XJKu14ivKrIC-y_GkJtz5sonXzp6xcv1Ok2Fr8Mv-NBjxyxJw-wNk8DvdWg4pLxFIuk6erEWw1DYXIE8geYjiMX3y6YvJ_aExAqr8V5XnxPLCljDoaBwxzdeDGSN0Zg52dSOYSzNNsZn2diidHmadbLr11-vTZ6wHKSP8IhLdnFOozw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-25 13:23:35,651:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-04-25 13:23:35,651:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 25 Apr 2024 11:24:17 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263785897197 Replay-Nonce: 1Th9Qjup89cvX9h4oYW2oOCoeigdVXLFLCEi7QOUFDogW81xrdw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:39:02Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342590903587" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263785897197" } 2024-04-25 13:23:35,651:DEBUG:acme.client:Storing nonce: 1Th9Qjup89cvX9h4oYW2oOCoeigdVXLFLCEi7QOUFDogW81xrdw 2024-04-25 13:23:35,652:DEBUG:acme.client:JWS payload: b'' 2024-04-25 13:23:35,657:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342590903587: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXA4OWN2WDloNG9ZVzJvT0NvZWlnZFZYTEZMQ0VpN1FPVUZEb2dXODF4cmR3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTA5MDM1ODcifQ", "signature": "g7qKiZ2Q46IjEBJPOxnsrlek3aD9JxToMWiMxYETv5fTXvr_L9zr_mAzln4aVTYZV3GYyTzTU6iUD7brNXIT4Y4OcBHs6zWMgQUazU0K0Av2PhrST1XDzZv3paWtKujARohMEUkQEg8WzCXsVREb1mlCrVPHlkXGo8yHl6Hlyn9RauXiDIRRaFUJMc3UtdB777WG0OK2TXB6GIZs_Q8RJ5UYyMtcirjjmkGfgd2QTJvf4zzQqsE1XzBQCoZPTzK6m8Lufd6dErCKTeLb7lzxnOuhxQL5u4x31vnEChrRZnY3aOavhWHrT4hRKKUmERSrfEuc9RR3HXrcQfmwwG-2ow", "payload": "" } 2024-04-25 13:23:35,816:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342590903587 HTTP/1.1" 200 810 2024-04-25 13:23:35,817:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:24:17 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43N6XTqSyuONEFRCgF5FRbpAKPWjwjteO_NQewJXdPoiUE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:39:02Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590903587/yQQlQg", "token": "_cYaZQFxe65pnQBqTdAB7A2ly3NXiqxedIi23pGjVI4" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590903587/fshO_g", "token": "_cYaZQFxe65pnQBqTdAB7A2ly3NXiqxedIi23pGjVI4" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590903587/Ovx7gQ", "token": "_cYaZQFxe65pnQBqTdAB7A2ly3NXiqxedIi23pGjVI4" } ] } 2024-04-25 13:23:35,817:DEBUG:acme.client:Storing nonce: sW-8q43N6XTqSyuONEFRCgF5FRbpAKPWjwjteO_NQewJXdPoiUE 2024-04-25 13:23:35,817:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-25 13:23:35,818:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-04-25 13:23:35,818:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-25 13:23:35,818:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-25 13:23:35,833:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-25 13:23:35,833:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-25 13:23:35,833:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-25 13:23:35,834:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-25 13:23:35,840:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-25 13:23:35,878:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-25 13:23:36,132:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-25 13:23:36,133:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-25 13:23:36,134:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-25 13:23:36,138:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:42 UTC. 2024-04-25 13:23:36,138:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-25 13:23:36,138:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-25 13:23:36,143:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-25 13:23:36,143:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-25 13:23:36,143:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-25 13:23:36,148:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-25 13:23:36,149:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-25 13:23:36,152:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-25 13:23:36,609:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-25 13:23:36,609:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:24:17 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Ii3wAYoPI_o": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-25 13:23:36,610:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-25 13:23:40,955:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7897_key-certbot.pem 2024-04-25 13:23:45,025:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7895_csr-certbot.pem 2024-04-25 13:23:45,025:DEBUG:acme.client:Requesting fresh nonce 2024-04-25 13:23:45,025:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-25 13:23:45,184:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-25 13:23:45,184:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:24:26 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMpl8a3plxRZblmollpYAUAFT9_cykXF4uepy2Ci3r61C8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-25 13:23:45,184:DEBUG:acme.client:Storing nonce: FUnC6kMpl8a3plxRZblmollpYAUAFT9_cykXF4uepy2Ci3r61C8 2024-04-25 13:23:45,185:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-04-25 13:23:45,190:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBsOGEzcGx4UlpibG1vbGxwWUFVQUZUOV9jeWtYRjR1ZXB5MkNpM3I2MUM4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "va68VeD5Xl6YmyfzaY6Mk1CNN0NcNEjFgXKJS_7ZfffFOesoNXgVlGHEcgnjXE8Rp38p68kZgEOW5Z1U2CsVqpjlCnrvuvZnTL_B51LdN1qOdEcKoAS27KleP3TVUN1TVZe5kTRAofa_T8GDZaFMT19032ZYXKEbPux0JI1sCmFP7crD6-lkgU8L6I4QVCWltAPL2QiTIPHNLTgS750x1eyqJtVlkmmDJD7Xcl2IKvTNOF1oEtv24Ge9i1biM36267Bc_C3P3a5ZT2a68VNW7lU4nwt3Wh95UpjLx1yInfjD03r0WsdravV9NMu3j2Klc7EkGEK1dtX7LzMg39Gt0w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-25 13:23:45,370:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-04-25 13:23:45,371:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 25 Apr 2024 11:24:26 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263785936717 Replay-Nonce: FUnC6kMpHyl4hV3ySSsVqSvQK17U_GKsG6GC993YmJG6W0s_XKQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:39:12Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342590959637" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263785936717" } 2024-04-25 13:23:45,371:DEBUG:acme.client:Storing nonce: FUnC6kMpHyl4hV3ySSsVqSvQK17U_GKsG6GC993YmJG6W0s_XKQ 2024-04-25 13:23:45,371:DEBUG:acme.client:JWS payload: b'' 2024-04-25 13:23:45,377:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342590959637: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBIeWw0aFYzeVNTc1ZxU3ZRSzE3VV9HS3NHNkdDOTkzWW1KRzZXMHNfWEtRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTA5NTk2MzcifQ", "signature": "qFR6tUe1TyFFSg9kkpsFpu5lO7eMVxWr_SVMlkTZdMYoV4KrJ-DpDjoI4Z2-QiiGQyjf5a7llvg3iEV15L9wwwGwqZ0REke1TSMRh-Xoju46zJWF6pBTQIAsxAV0EShFSsGkjR7zrScOVbWUc1-FHk262usmH5w6ffUJKPTaEs_NW0Rmolvg4Z3JbXP9KCHwR6b9ajrYo79aRsdW75mC4WmeBrgwWlGy08NeOEPYdM3PXCPZiSSkODoZGBbPItGSAFmPUF0vW7w_OaithkHd5MabknTiV2f3UfDnbKqiXOg8gc2T_Vr8n81LVlOPROnXhy8SuscGLDOcJuzTQIQ6MA", "payload": "" } 2024-04-25 13:23:45,532:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342590959637 HTTP/1.1" 200 804 2024-04-25 13:23:45,533:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:24:26 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMpvmjOPOVav6BAFGkaOCl777PZH_dgbR_PpX74qbegKAY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:39:12Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590959637/k2GELA", "token": "tJLK_l85tGGQh0-6L-WrXUa-odUx6APjgZ8B6_DGAB0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590959637/C9NXzA", "token": "tJLK_l85tGGQh0-6L-WrXUa-odUx6APjgZ8B6_DGAB0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590959637/N6vgRQ", "token": "tJLK_l85tGGQh0-6L-WrXUa-odUx6APjgZ8B6_DGAB0" } ] } 2024-04-25 13:23:45,533:DEBUG:acme.client:Storing nonce: FUnC6kMpvmjOPOVav6BAFGkaOCl777PZH_dgbR_PpX74qbegKAY 2024-04-25 13:23:45,534:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-25 13:23:45,534:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-04-25 13:23:45,535:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-25 13:23:45,535:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-25 13:23:45,535:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-25 13:23:45,536:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-25 13:23:45,536:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-25 13:23:45,536:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-25 13:23:45,537:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-25 13:23:45,589:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-25 13:23:45,878:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-25 13:23:45,879:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-04-25 13:23:45,880:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-04-25 13:23:45,884:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:56 UTC. 2024-04-25 13:23:45,884:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-25 13:23:45,885:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-25 13:23:45,889:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-25 13:23:45,890:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-25 13:23:45,890:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-25 13:23:45,894:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-25 13:23:45,895:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-25 13:23:45,897:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-25 13:23:46,325:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-25 13:23:46,325:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:24:27 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "zifRl8B-CgE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-04-25 13:23:46,326:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-25 13:23:50,596:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7898_key-certbot.pem 2024-04-25 13:23:54,630:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7896_csr-certbot.pem 2024-04-25 13:23:54,631:DEBUG:acme.client:Requesting fresh nonce 2024-04-25 13:23:54,631:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-25 13:23:54,777:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-25 13:23:54,777:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:24:36 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyaviSp8c_CiDwF-Mxj_lOoWX_tMfiZ4DyqZ01vFI8CpUQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-25 13:23:54,777:DEBUG:acme.client:Storing nonce: Y89UXNyaviSp8c_CiDwF-Mxj_lOoWX_tMfiZ4DyqZ01vFI8CpUQ 2024-04-25 13:23:54,778:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-04-25 13:23:54,783:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWF2aVNwOGNfQ2lEd0YtTXhqX2xPb1dYX3RNZmlaNER5cVowMXZGSThDcFVRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "OQwQYSbmmw1zLuR05kgk9oDe2ebje7FB5pKflBwE5sw4YxQPWkddI_-QIyzzPYIS6qlMmnFWDj88KMiPZgMF7rhNQUq7IWEOLa85O79oyTsKF_54osK53-7DqDQRqKX7Umz3A3r5n3AvRsxTOGqZbg2_drJZBa34zkGExm3lA3eMUgOLMfk0XcgujQPrGBkW7o7KF5BRGj2nOb7gOzRUQ7OlyidzUNCtJ8EML8xTeK7QsQxBTR1nvSsR0OogmG8TPsr4I5HJoQdFyHVxnAiUvQ_dJIWg02TgI5Y_1EraKz0OAWn8R10xnm-2Uv1nFwaOmdEEl4tzJGbwfxlrC2Tsgg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-25 13:23:55,075:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-04-25 13:23:55,075:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 25 Apr 2024 11:24:36 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263785966947 Replay-Nonce: FUnC6kMpMr-eX5uS8gjwMeBbvsrh1o6zo4JBbSZJcxqjr_S1R00 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:39:24Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591007887" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263785966947" } 2024-04-25 13:23:55,076:DEBUG:acme.client:Storing nonce: FUnC6kMpMr-eX5uS8gjwMeBbvsrh1o6zo4JBbSZJcxqjr_S1R00 2024-04-25 13:23:55,076:DEBUG:acme.client:JWS payload: b'' 2024-04-25 13:23:55,082:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591007887: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBNci1lWDV1UzhnandNZUJidnNyaDFvNnpvNEpCYlNaSmN4cWpyX1MxUjAwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEwMDc4ODcifQ", "signature": "RYzT6IOt3WBNibIe4My9bABxwLFceIPyOy-qyFwuxqYJwoJUXqkvmKj8pvYoL5nXyKcrUJpQ7ro4Vx6jV0AdDZ_EU6G4Zo5AvFOGJWSFkoJwUfkctygn5vBxOSe4nFdEiGhx3b3As4FJ5QTgLaHCJwQX-77WQaupRYcT1luXgXTyC6yLu4ARIRe-6H2qHlpLAwe3e53XS-mVWbJPF8VbBLGNaeHzzwSIeA-IL87q-s3CEf_w8EcdXFu1cVLmKhqz1dFYa3E-6jRO62xr1lasRn9ybx8xFYUcntFoUlY7sdO51TaB1WCmaAkAcCrgEegEAxGLN75RqtSP5GAcy1ZSjg", "payload": "" } 2024-04-25 13:23:55,233:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591007887 HTTP/1.1" 200 807 2024-04-25 13:23:55,234:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:24:36 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNya05me22dGHuyTh0oAs9oHcB0dpOqYS8_JEa180EKtWT4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:39:24Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591007887/PHBLZA", "token": "beB8Rj2vf_xsZdii23LrzSWxOGBiGEzmy54e95GXHoc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591007887/Lbw9kw", "token": "beB8Rj2vf_xsZdii23LrzSWxOGBiGEzmy54e95GXHoc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591007887/PJqcrw", "token": "beB8Rj2vf_xsZdii23LrzSWxOGBiGEzmy54e95GXHoc" } ] } 2024-04-25 13:23:55,234:DEBUG:acme.client:Storing nonce: Y89UXNya05me22dGHuyTh0oAs9oHcB0dpOqYS8_JEa180EKtWT4 2024-04-25 13:23:55,235:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-25 13:23:55,235:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-04-25 13:23:55,236:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-25 13:23:55,236:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-25 13:23:55,237:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-25 13:23:55,237:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-25 13:23:55,237:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-25 13:23:55,237:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-25 13:23:55,238:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-25 13:23:55,293:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-25 13:23:55,421:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-25 13:23:55,422:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-25 13:23:55,423:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-25 13:23:55,428:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:14 UTC. 2024-04-25 13:23:55,428:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-25 13:23:55,428:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-25 13:23:55,433:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-25 13:23:55,433:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-25 13:23:55,433:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-25 13:23:55,438:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-25 13:23:55,439:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-25 13:23:55,440:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-25 13:23:55,902:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-25 13:23:55,903:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:24:37 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "TInOD1wsDPA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-25 13:23:55,903:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-25 13:24:00,064:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7899_key-certbot.pem 2024-04-25 13:24:04,096:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7897_csr-certbot.pem 2024-04-25 13:24:04,096:DEBUG:acme.client:Requesting fresh nonce 2024-04-25 13:24:04,096:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-25 13:24:04,252:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-25 13:24:04,252:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:24:45 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43NmvHaKCjSapXG0wV736FnGtrez9fhlupQF3eObw0UT5Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-25 13:24:04,253:DEBUG:acme.client:Storing nonce: sW-8q43NmvHaKCjSapXG0wV736FnGtrez9fhlupQF3eObw0UT5Q 2024-04-25 13:24:04,253:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-04-25 13:24:04,258:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M05tdkhhS0NqU2FwWEcwd1Y3MzZGbkd0cmV6OWZobHVwUUYzZU9idzBVVDVRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "yRrhf_TpL5sDXjT-uiRHrYNM3vT8o_h8eG5brHPFyJBm_GTK_imWgp8frHfmxMo-0PIfPiXbAjrFTfO0DaOs9Q5Va63za6CGf5D5-ZBIYeKF1TD1oAzjvYCqGO3Ps8DkkEMwHMPHRVqOY7wNIQxuD9vMNk5WkqyJ6kuJbOiYLmtk1Bbqi5JjXTvIN5EyvMk2GIbpj6mSbxRGrY3ePbE04_Iwwit0Zp8iebPQRrR4eMv0V26wqaTWzOLGhjcvNh_pjCzLg0mQ4GzS6uDCudCsv-u3zInaNklbka9HHHFqxbku3qVvEOG7rGyYpiA5Sh27gmKHRxzvijlr4w5pJ084Qw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-25 13:24:04,425:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-04-25 13:24:04,426:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 25 Apr 2024 11:24:45 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263785995757 Replay-Nonce: 1Th9QjupdJsfJRoSifbaVZaEA3ZrFsl7_8Jk4rOHZs-lAUhcvuI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:39:35Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591052317" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263785995757" } 2024-04-25 13:24:04,426:DEBUG:acme.client:Storing nonce: 1Th9QjupdJsfJRoSifbaVZaEA3ZrFsl7_8Jk4rOHZs-lAUhcvuI 2024-04-25 13:24:04,426:DEBUG:acme.client:JWS payload: b'' 2024-04-25 13:24:04,432:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591052317: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBkSnNmSlJvU2lmYmFWWmFFQTNackZzbDdfOEprNHJPSFpzLWxBVWhjdnVJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEwNTIzMTcifQ", "signature": "K1mUzEHKOt-jACQomC1yaKp0tgFB8G6Rb3wPxLXb8BIlbB7Ec8NR--oIze9uBMK2jZX_MiGxyllWz_2rifQdjdNPaWiNsdpZO5chQSsZFGehrXTHLBq6u2-a74YNZEZL43DGlNBsZjqlaqboRm5b_Js7HKlzG2VvuHF7WMvV2Ip-viB3lbAJcJH4lHwjwnhYYyBJ1yZNx4_-QV4wtEiswmUL_w4Tt8Y-y2BMWiPD_X2Ycpu5STpPCgQkoriylzvZgYJLoXO_UFM2cTQjDxdaGl5xQtVYFExoKeoF7M8BaZ5GOyYQtWRcMxXoYKYUF986RQpGHMxK7cM2OCtHCfKNmw", "payload": "" } 2024-04-25 13:24:04,604:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591052317 HTTP/1.1" 200 801 2024-04-25 13:24:04,605:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:24:45 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9Qjup9QeYzi_JnrZhuMRry6sJe5mJed5vOCAhjOKSfMdQZ7Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:39:35Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591052317/nXYSvg", "token": "MIjKvMphRPU5OnxpnP63SaWPXmuRx-D-028G2__U8nQ" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591052317/lcK_gw", "token": "MIjKvMphRPU5OnxpnP63SaWPXmuRx-D-028G2__U8nQ" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591052317/A5w39g", "token": "MIjKvMphRPU5OnxpnP63SaWPXmuRx-D-028G2__U8nQ" } ] } 2024-04-25 13:24:04,605:DEBUG:acme.client:Storing nonce: 1Th9Qjup9QeYzi_JnrZhuMRry6sJe5mJed5vOCAhjOKSfMdQZ7Q 2024-04-25 13:24:04,606:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-25 13:24:04,606:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-04-25 13:24:04,607:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-25 13:24:04,607:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-25 13:24:04,608:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-25 13:24:04,608:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-25 13:24:04,608:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-25 13:24:04,609:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-25 13:24:04,610:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-25 13:24:04,661:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-25 13:24:04,893:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-25 13:24:04,894:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-25 13:24:04,895:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-25 13:24:04,899:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:32 UTC. 2024-04-25 13:24:04,900:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-25 13:24:04,900:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-25 13:24:04,905:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-25 13:24:04,905:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-25 13:24:04,906:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-25 13:24:04,910:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-25 13:24:04,911:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-25 13:24:04,913:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-25 13:24:05,379:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-25 13:24:05,379:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:24:46 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "KvOTNAdbxtc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-25 13:24:05,380:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-25 13:24:09,872:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7900_key-certbot.pem 2024-04-25 13:24:13,919:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7898_csr-certbot.pem 2024-04-25 13:24:13,919:DEBUG:acme.client:Requesting fresh nonce 2024-04-25 13:24:13,920:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-25 13:24:14,074:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-25 13:24:14,074:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:24:55 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43NPR3gYUMz9PtJNKb61dUrYjaKl7KPM8TVF3ZhHEVU_TM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-25 13:24:14,075:DEBUG:acme.client:Storing nonce: sW-8q43NPR3gYUMz9PtJNKb61dUrYjaKl7KPM8TVF3ZhHEVU_TM 2024-04-25 13:24:14,075:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-04-25 13:24:14,080:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M05QUjNnWVVNejlQdEpOS2I2MWRVcllqYUtsN0tQTThUVkYzWmhIRVZVX1RNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "adlGF9YfcrTzcLwMemsYEZc_F1IL4uKJhFtsKB8lQBfJ4605-hfRZb2FtPwdEBTjTXZ9uR6O9Zt_KG6V4TNgAMzV_Mv1N--QyOfLJAzMlcHBnFCaSJeE_Zq58AMWEBKYnwF1kAcWqKH9drLO3MKrEynQATRQiFgcQG_EromN2Aw2cB3s28tg6oo-2Zt-EuIflCMQF26yK1o53lsBvirfu_9FPHM53HdYFTzLRuj6AF7SF_E4yh8hYrcX2ZrBlBnqjChbP8phNEF2Pb4AMORQygZ7wM0Lw6uQ_9BNZFm1YG21LAQR_BPmKG6RThCCP7WTgic2aEVmnf3GOlhwQzo_vw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-25 13:24:14,245:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-25 13:24:14,246:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 25 Apr 2024 11:24:55 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786022187 Replay-Nonce: 1Th9QjupekBUEZOradn4eQElP7_q_BBKM6A8xDvcXJAIKcRF3D0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:39:46Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591093777" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786022187" } 2024-04-25 13:24:14,246:DEBUG:acme.client:Storing nonce: 1Th9QjupekBUEZOradn4eQElP7_q_BBKM6A8xDvcXJAIKcRF3D0 2024-04-25 13:24:14,246:DEBUG:acme.client:JWS payload: b'' 2024-04-25 13:24:14,252:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591093777: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBla0JVRVpPcmFkbjRlUUVsUDdfcV9CQktNNkE4eER2Y1hKQUlLY1JGM0QwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEwOTM3NzcifQ", "signature": "REfhG8tkfjy1TSIXll7f7-eyxuIVPzXWOkCGFCM0qdxtR7Xe7FtrgE3dwdV7C25u3lI-emBwis8MyiJvmrjhEXEyIf6RZ4u0ZQ87FNcGIWHr5p6YkblRrt56TRRLTYEgy37HAoJHq9p2DXm8q6Smt_Xt77a2FBkdNS8kwpaVMuSQoamemDR_D3JMTArG-XOiPRA5m7qI-aeYQNBar6bBbZShVOh0QWttEHspH9nZR71P4c054Jw1NEbRHOQNrZBDHq4ARrpeh_sJsyEd2j2PjJFcnmAn4cMYHrnoAV_jPxsJC0TQ7Hw1CZPllD0KzBQpjnAq_kBk7_qKjGZJEBSkGw", "payload": "" } 2024-04-25 13:24:14,412:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591093777 HTTP/1.1" 200 805 2024-04-25 13:24:14,412:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:24:55 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43NNwXXMi1joX749hwM61qjbKWLy-aU0mytUR-8NG1jFw0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:39:46Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591093777/5L951w", "token": "wULsoLc7wACByPCe5SgzOs2w85CZ8-Gr43fdXB5k6SA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591093777/egwr_w", "token": "wULsoLc7wACByPCe5SgzOs2w85CZ8-Gr43fdXB5k6SA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591093777/HMvVIg", "token": "wULsoLc7wACByPCe5SgzOs2w85CZ8-Gr43fdXB5k6SA" } ] } 2024-04-25 13:24:14,413:DEBUG:acme.client:Storing nonce: sW-8q43NNwXXMi1joX749hwM61qjbKWLy-aU0mytUR-8NG1jFw0 2024-04-25 13:24:14,413:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-25 13:24:14,413:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-04-25 13:24:14,414:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-25 13:24:14,414:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-25 13:24:14,415:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-25 13:24:14,415:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-25 13:24:14,415:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-25 13:24:14,416:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-25 13:24:14,417:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-25 13:24:14,465:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-25 13:24:14,726:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-25 13:24:14,727:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-04-25 13:24:14,727:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-04-25 13:24:14,732:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:48 UTC. 2024-04-25 13:24:14,732:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-25 13:24:14,732:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-25 13:24:14,737:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-25 13:24:14,737:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-25 13:24:14,737:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-25 13:24:14,742:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-25 13:24:14,743:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-25 13:24:14,744:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-25 13:24:15,219:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-25 13:24:15,219:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:24:56 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "D39ukM0JT_w": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-25 13:24:15,220:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-25 13:24:19,341:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7901_key-certbot.pem 2024-04-25 13:24:23,466:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7899_csr-certbot.pem 2024-04-25 13:24:23,466:DEBUG:acme.client:Requesting fresh nonce 2024-04-25 13:24:23,466:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-25 13:24:23,626:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-25 13:24:23,627:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:25:04 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43NfBaVYiQ5hbkdTdfovfNGsfdrkwDOCyR-CFzm6bEUunw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-25 13:24:23,627:DEBUG:acme.client:Storing nonce: sW-8q43NfBaVYiQ5hbkdTdfovfNGsfdrkwDOCyR-CFzm6bEUunw 2024-04-25 13:24:23,627:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-04-25 13:24:23,633:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M05mQmFWWWlRNWhia2RUZGZvdmZOR3NmZHJrd0RPQ3lSLUNGem02YkVVdW53IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "CPEcpHgjSHPvrwcPXToapKsZdQVSyemTiQsdRi4XJpsDtXwBSUh9fyzeD9Y_cz9xk30dtx6J-j5eNdZZGYIbFAsainqNC7wCY4Lxm0QomJkCCez6bVanVcyaurZfPvSzHDJR_4k6qYRZj76mXB_w68u1sVtfcldX11o7rvHMlYGEsC5SlHzBaIhQBEKZbuZY879MYOWoKJgy4hfNDz4o057VDokt-NZyd5ymp5MAxxM8PEvzEVRABGi_CDVF4j7-G3HFAc5bIHcQeAYv3p-R4eaZChYWO3wZcWpPDlYdT08w0adoqKUQhqkByUsCeQA0veDQ9NevF8vylYW5XEofLw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-04-25 13:24:23,804:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-04-25 13:24:23,805:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 25 Apr 2024 11:25:05 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786050437 Replay-Nonce: 1Th9QjupMwpdePAwKg8qTCD8fvXbhx3XkVETfOf5Cg-YPFn6nJA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:39:57Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591136247" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786050437" } 2024-04-25 13:24:23,805:DEBUG:acme.client:Storing nonce: 1Th9QjupMwpdePAwKg8qTCD8fvXbhx3XkVETfOf5Cg-YPFn6nJA 2024-04-25 13:24:23,805:DEBUG:acme.client:JWS payload: b'' 2024-04-25 13:24:23,811:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591136247: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBNd3BkZVBBd0tnOHFUQ0Q4ZnZYYmh4M1hrVkVUZk9mNUNnLVlQRm42bkpBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTExMzYyNDcifQ", "signature": "kQ1tksHN4Ua2rMdJPiH0AiB880a4Qgy_6AgeXqaJxTQSXxyd6YTuQFkPkYcQHKVRgt35w25Xm8jSKuaZ0iekWesDDFNRb3oHqsWsNydhjPYTj5BzkQG4EfiFSm9u5OqQRb9X9_pomPWvUXLvV7_4Wtkq5UZfSPcWLWTohQ3IydDtnWTYqRnOR5xl_6twIuffercsJgTMctrWpTiQckvhcIAQE8HBRukrad0rNBLhGnyhxSq29KA6Bz951Z-x9DyD6Hz8ns0mLofWR4MS73pW-Jlr7qJ-oj42SWGl8BfxbdGUYYX-uXXrm5yaDOGSDcC7d8ipGPEHyqBbkBf7JFsE6g", "payload": "" } 2024-04-25 13:24:23,986:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591136247 HTTP/1.1" 200 809 2024-04-25 13:24:23,987:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:25:05 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9Qjup7iYibhKpTqN7AZo6YrUNu60_g6nR0WD7a8oezx-iQQs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:39:57Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591136247/jmrcew", "token": "dV2yZMj-jEV96xJosxLDIsbyMijaWSPD6FdtA3sRgXw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591136247/-o7nbg", "token": "dV2yZMj-jEV96xJosxLDIsbyMijaWSPD6FdtA3sRgXw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591136247/DEae2A", "token": "dV2yZMj-jEV96xJosxLDIsbyMijaWSPD6FdtA3sRgXw" } ] } 2024-04-25 13:24:23,987:DEBUG:acme.client:Storing nonce: 1Th9Qjup7iYibhKpTqN7AZo6YrUNu60_g6nR0WD7a8oezx-iQQs 2024-04-25 13:24:23,988:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-25 13:24:23,988:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-04-25 13:24:23,989:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-25 13:24:23,989:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-25 13:24:23,990:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-25 13:24:23,990:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-25 13:24:23,990:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-25 13:24:23,990:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-25 13:24:23,991:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-25 13:24:24,030:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-25 13:24:24,276:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-25 13:24:24,278:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-25 13:24:24,278:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-25 13:24:24,283:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:06 UTC. 2024-04-25 13:24:24,283:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-25 13:24:24,283:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-25 13:24:24,288:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-25 13:24:24,289:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-25 13:24:24,289:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-25 13:24:24,293:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-25 13:24:24,294:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-25 13:24:24,295:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-25 13:24:24,740:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-25 13:24:24,740:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:25:06 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "w06jggZUA9w": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-04-25 13:24:24,741:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-25 13:24:29,016:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7902_key-certbot.pem 2024-04-25 13:24:33,125:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7900_csr-certbot.pem 2024-04-25 13:24:33,125:DEBUG:acme.client:Requesting fresh nonce 2024-04-25 13:24:33,125:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-25 13:24:33,273:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-25 13:24:33,274:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:25:14 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyaf78VLP5BaN9DpRHbafxnLhcOzQ1I3NFSFy0d_MFxOME X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-25 13:24:33,274:DEBUG:acme.client:Storing nonce: Y89UXNyaf78VLP5BaN9DpRHbafxnLhcOzQ1I3NFSFy0d_MFxOME 2024-04-25 13:24:33,274:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-04-25 13:24:33,280:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWFmNzhWTFA1QmFOOURwUkhiYWZ4bkxoY096UTFJM05GU0Z5MGRfTUZ4T01FIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "iBNT114Cw2nzlh2K9hN-hoSrpxVuo6xpA3eelaY4GC-ak2nKiNUS4H1PA9LKljd2PC1_Mw0uWkjb-3a9meGp4ReTubvbD7j3ywsattsCWO3uLVO_5iwY8xsvlN4Ag5dhScHnfeSZ-fQICU54hZ3OdEEzOwjY-sAaCeu289zkXn6sbP7Z_kpgEBH-SyrNhVkMJitJw5_iN1InThexlSKhw5zGY76-vjaOeOD1SUYAzZwa7-lOlWtDG4boGy6djxW67D9gzC3u-ioWR8lKFeiBUWY_on7Hi1HR0jFnwencFqnNYm6jeEkgCGNAHQmYDscMLpUfGNCgkwnB6o16USkTFA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-04-25 13:24:33,449:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-04-25 13:24:33,449:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 25 Apr 2024 11:25:14 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786101437 Replay-Nonce: FUnC6kMpkL0qvU27fCX3ZTWJ-eieRclzuqTFQOkwRVbMpq1IRHw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:40:08Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591202447" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786101437" } 2024-04-25 13:24:33,449:DEBUG:acme.client:Storing nonce: FUnC6kMpkL0qvU27fCX3ZTWJ-eieRclzuqTFQOkwRVbMpq1IRHw 2024-04-25 13:24:33,450:DEBUG:acme.client:JWS payload: b'' 2024-04-25 13:24:33,455:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591202447: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBrTDBxdlUyN2ZDWDNaVFdKLWVpZVJjbHp1cVRGUU9rd1JWYk1wcTFJUkh3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEyMDI0NDcifQ", "signature": "Pkdnqtu-HZxIE_KzxPa28lAuc0ilW9_OF10V-xR-L0V9LxFpoAFJ-Bno0PmI-LUPXJ2CnSZLY5kjzZIHwhZ2VtlhpgPGoMeCAFDjYHddhQMO6Xd7cW3Cs1jqgOCuoDSi0K4xL3yKVdILYaoCWk3_w-14ngWCuent7-9PdWDqD6GctVBDOB4mJx4MVPJWMDbG1N38beZUMEpk4WxnCqMCEnHkvOBBWGVF0eNi_VE8JY3svO62PMYJC95_hHLYRYbJRQLYYwuwRQAZTv1_QqdxKPz0FkDOVfktRIwxLplexooIPjLMhXPbz-HHujFNIwET7T-V4zlIErrRs2W2Ur-DEg", "payload": "" } 2024-04-25 13:24:33,617:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591202447 HTTP/1.1" 200 806 2024-04-25 13:24:33,618:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:25:14 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyaBaQkcloy5TwV94xgbln1_WRxL5TUYcVDBYcW39yYvvY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:40:08Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591202447/8XsmxQ", "token": "G1AdFqNnmnT088RDP0J9KtOwA_p7D5YMb-gb1g7ExAc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591202447/a1GZzw", "token": "G1AdFqNnmnT088RDP0J9KtOwA_p7D5YMb-gb1g7ExAc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591202447/qG0r0A", "token": "G1AdFqNnmnT088RDP0J9KtOwA_p7D5YMb-gb1g7ExAc" } ] } 2024-04-25 13:24:33,618:DEBUG:acme.client:Storing nonce: Y89UXNyaBaQkcloy5TwV94xgbln1_WRxL5TUYcVDBYcW39yYvvY 2024-04-25 13:24:33,619:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-25 13:24:33,619:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-04-25 13:24:33,620:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-25 13:24:33,620:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-25 13:24:33,621:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-25 13:24:33,621:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-25 13:24:33,621:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-25 13:24:33,621:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-25 13:24:33,622:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-25 13:24:33,661:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-04-25 13:24:33,661:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-25 13:24:33,661:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-04-25 13:24:33,669:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-04-25 13:24:33,672:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-04-25 13:24:33,672:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-04-25 13:24:33,672:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-04-25 13:24:33,673:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-04-25 13:24:33,675:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-04-25 13:24:33,721:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-25 13:24:33,998:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-25 13:24:33,999:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-25 13:24:34,000:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-25 13:24:34,005:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:23 UTC. 2024-04-25 13:24:34,005:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-25 13:24:34,005:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-25 13:24:34,010:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-25 13:24:34,010:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-25 13:24:34,010:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-25 13:24:34,014:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-25 13:24:34,015:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-25 13:24:34,017:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-25 13:24:34,464:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-25 13:24:34,464:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:25:15 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "gJTtYjLQYRo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-25 13:24:34,465:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-25 13:24:38,808:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7903_key-certbot.pem 2024-04-25 13:24:42,856:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7901_csr-certbot.pem 2024-04-25 13:24:42,856:DEBUG:acme.client:Requesting fresh nonce 2024-04-25 13:24:42,857:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-25 13:24:43,008:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-25 13:24:43,009:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:25:24 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyaT3lDH0VGtTddAboOqKkOiPxo6Jv4lPq627oUNs4terE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-25 13:24:43,009:DEBUG:acme.client:Storing nonce: Y89UXNyaT3lDH0VGtTddAboOqKkOiPxo6Jv4lPq627oUNs4terE 2024-04-25 13:24:43,009:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-04-25 13:24:43,015:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWFUM2xESDBWR3RUZGRBYm9PcUtrT2lQeG82SnY0bFBxNjI3b1VOczR0ZXJFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "IbM9y7mMVaI6fTeNxgEIbQyQ88XoCIGizz0cpGwlBQfhgCKt_q2gImB9ka0An6EDGACAD2TR6h7Tdra2JBABGowqS_ekVnlsTMYPnjuNG0VGU6-j6om6MCD0U9aFpbxCDUNxjvbN3QPB3t4wfvJrk_mxMbwRYGc9_nbXF5X-ddSoZkRm6p46OaWVF8z1UaGT21enWx0Vbt8u3Q-uWTtn8Bg1-2v7PYd2xU3SpHLaHklISI6INtBDK-g-a2c-Kn7bvcN_ToUyy14T-6zOEmrQGp--aEY11fb6DzMaf-JzVNZpmwtxkGWvckNANDUxerssz383qCtPJrckKjitqH6HXQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-25 13:24:43,182:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-04-25 13:24:43,183:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 25 Apr 2024 11:25:24 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786138347 Replay-Nonce: Y89UXNyanbSVx8CKr4SUQOcXsRUAlgMnPcn7dhRp7qkmykQT3l4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:40:19Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591256287" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786138347" } 2024-04-25 13:24:43,183:DEBUG:acme.client:Storing nonce: Y89UXNyanbSVx8CKr4SUQOcXsRUAlgMnPcn7dhRp7qkmykQT3l4 2024-04-25 13:24:43,184:DEBUG:acme.client:JWS payload: b'' 2024-04-25 13:24:43,189:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591256287: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWFuYlNWeDhDS3I0U1VRT2NYc1JVQWxnTW5QY243ZGhScDdxa215a1FUM2w0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEyNTYyODcifQ", "signature": "vdWfDNSkeyA4ITPBOQOsNWpsHnVDvl5rXE50cUg17E-T6cHhnQI7OA2bb64AAZvEH9esgpbQkvIUbn_uqAFNfWyoirGQZaIXZtJTuwKr93O8oeTWw2qtOGU6lxuQuW8cEYeVEMW1VRGg8BDBwlSAgz0CLCZG69FpV7RZRcAaQEbzFmcOtxgsqKIvxv8eJvCinQFzUloobym5Ld__RLkLfOSSW1yHodpAPk27k0xgbDFys14EdCbJrG6gv3CRIim2A0yNQwvfuefNv_l45Br7KU8NlJW9zLJ9Ix5k0VfHGK9eN4yZKycmk4ASMcehLNr8GYFJIGMULe3y2jpCYCuQfg", "payload": "" } 2024-04-25 13:24:43,379:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591256287 HTTP/1.1" 200 811 2024-04-25 13:24:43,379:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:25:24 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNya2OLe3s51_n5uTDl13TggTu7RayaqDGcD2UXc-MMCySI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:40:19Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591256287/K-RCZw", "token": "VNACvIqg7Fgn_WHq8b2_oKzrZYhRTgcu5X8dE-g-JYI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591256287/Qx_SSA", "token": "VNACvIqg7Fgn_WHq8b2_oKzrZYhRTgcu5X8dE-g-JYI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591256287/92J4RA", "token": "VNACvIqg7Fgn_WHq8b2_oKzrZYhRTgcu5X8dE-g-JYI" } ] } 2024-04-25 13:24:43,380:DEBUG:acme.client:Storing nonce: Y89UXNya2OLe3s51_n5uTDl13TggTu7RayaqDGcD2UXc-MMCySI 2024-04-25 13:24:43,380:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-25 13:24:43,381:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-04-25 13:24:43,381:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-25 13:24:43,381:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-25 13:24:43,382:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-25 13:24:43,382:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-25 13:24:43,382:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-25 13:24:43,383:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-25 13:24:43,384:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-25 13:24:43,435:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-25 13:24:43,730:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-25 13:24:43,731:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-25 13:24:43,732:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-25 13:24:43,736:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:41 UTC. 2024-04-25 13:24:43,736:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-25 13:24:43,736:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-25 13:24:43,741:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-25 13:24:43,741:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-25 13:24:43,741:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-25 13:24:43,746:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-25 13:24:43,747:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-25 13:24:43,749:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-25 13:24:44,184:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-25 13:24:44,185:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:25:25 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "G2asPc_aK90": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-25 13:24:44,185:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-25 13:24:48,463:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7904_key-certbot.pem 2024-04-25 13:24:52,456:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7902_csr-certbot.pem 2024-04-25 13:24:52,457:DEBUG:acme.client:Requesting fresh nonce 2024-04-25 13:24:52,457:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-25 13:24:52,627:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-25 13:24:52,628:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:25:33 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMpXzIQxc6QVZPi-MIiTkQqmIsuo2EU-Fxk-o7wLxaDdQE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-25 13:24:52,628:DEBUG:acme.client:Storing nonce: FUnC6kMpXzIQxc6QVZPi-MIiTkQqmIsuo2EU-Fxk-o7wLxaDdQE 2024-04-25 13:24:52,631:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-04-25 13:24:52,637:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBYeklReGM2UVZaUGktTUlpVGtRcW1Jc3VvMkVVLUZ4ay1vN3dMeGFEZFFFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "HeWbw1nqCUyCb0x6gYCRLGbPKAiEPrad6X7Ex_r36JGicn7ihfwyg4T8gEu16SD_Wo4hYiAxyGapGFWcnsjnwwvTbkJgAMXGneEyoqtaIZQqieK8dviICJKQGMVr9nO55eMM5NFHQgXZkvBZrZdklnAgAwhd8DA-qRfslzHlh7zvV2VlS02TJzctOfF5jkLALWADtReYbs4tzP0EFL2lRrkPQlAYrS1v37seJyu7qzF1cPZJeP9XSjkOxmN6K_VAsHnbQ5kKqcLS6jESOkYS_dRO5KyIEn-x-yLbO7rC5_0MpNK4-3yY9R8y9c9HxFc5OW6iGp55hGBxkXphin0odQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-25 13:24:52,792:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-04-25 13:24:52,793:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 25 Apr 2024 11:25:34 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786169497 Replay-Nonce: Y89UXNyaBGaQWR-KdtA4neVrW2NDM9baOzJf-ce_1XoqoGxbW9w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:40:30Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591303867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786169497" } 2024-04-25 13:24:52,793:DEBUG:acme.client:Storing nonce: Y89UXNyaBGaQWR-KdtA4neVrW2NDM9baOzJf-ce_1XoqoGxbW9w 2024-04-25 13:24:52,794:DEBUG:acme.client:JWS payload: b'' 2024-04-25 13:24:52,799:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591303867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWFCR2FRV1ItS2R0QTRuZVZyVzJORE05YmFPekpmLWNlXzFYb3FvR3hiVzl3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEzMDM4NjcifQ", "signature": "ipswhDBzPdb0YMGX2GeY-snoXM1u1Xkg2AN2aRRZbE8xkNJyviEB7wVDV5EIHU8my8vTvTgh8NFAyuNvrsj2CBnDv3Kx18e6JNBP6O3SuhMMsur2NHpE6ukmLoUIoerR-1XM0pWstMSnU4LDRrmlUn1d2UZyl6SEdQZjoQHImqL4FIhaxBwfXzh8dbQ6KqsnMMRg_jsOLfqHpyH0bfClBlAanRGyzHznTG-TT-2aWsqv7494Zd6YiuqOOjcSymQhqiwT2rK1qSr7lW25phwIyJmVvDtv1uycdm2tDxBfxIjF8cUab357RahQREKCBkT2Aucat6O_vepO-XrNpn2a7w", "payload": "" } 2024-04-25 13:24:52,950:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591303867 HTTP/1.1" 200 810 2024-04-25 13:24:52,951:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:25:34 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyaZ3C2I4LCt23illu4kMGrKqCqF0MxN1m5HlJ_LwDNitM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:40:30Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591303867/fVMRLg", "token": "v7V3rLmlxo6NcGbELkoNnlOhXK0p8NRQZV8Vqx6IRq0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591303867/q_0-Ew", "token": "v7V3rLmlxo6NcGbELkoNnlOhXK0p8NRQZV8Vqx6IRq0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591303867/G3BN_A", "token": "v7V3rLmlxo6NcGbELkoNnlOhXK0p8NRQZV8Vqx6IRq0" } ] } 2024-04-25 13:24:52,951:DEBUG:acme.client:Storing nonce: Y89UXNyaZ3C2I4LCt23illu4kMGrKqCqF0MxN1m5HlJ_LwDNitM 2024-04-25 13:24:52,952:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-25 13:24:52,952:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-04-25 13:24:52,953:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-25 13:24:52,953:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-25 13:24:52,954:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-25 13:24:52,954:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-25 13:24:52,954:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-25 13:24:52,955:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-25 13:24:52,956:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-25 13:24:53,004:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-25 13:24:53,223:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-25 13:24:53,224:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-04-25 13:24:53,225:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-04-25 13:24:53,229:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:58 UTC. 2024-04-25 13:24:53,229:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-25 13:24:53,230:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-25 13:24:53,235:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-25 13:24:53,235:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-25 13:24:53,235:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-25 13:24:53,240:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-25 13:24:53,240:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-25 13:24:53,242:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-25 13:24:53,708:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-25 13:24:53,709:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:25:35 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "1ERW3L5WEc4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-25 13:24:53,709:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-25 13:24:57,894:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7905_key-certbot.pem 2024-04-25 13:25:01,930:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7903_csr-certbot.pem 2024-04-25 13:25:01,930:DEBUG:acme.client:Requesting fresh nonce 2024-04-25 13:25:01,930:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-25 13:25:02,087:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-25 13:25:02,088:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:25:43 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43NgNYRHJBMCHGZlFwTI9h85RNa9x2lE6M7T22LbS5lA0I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-25 13:25:02,088:DEBUG:acme.client:Storing nonce: sW-8q43NgNYRHJBMCHGZlFwTI9h85RNa9x2lE6M7T22LbS5lA0I 2024-04-25 13:25:02,088:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-04-25 13:25:02,094:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M05nTllSSEpCTUNIR1psRndUSTloODVSTmE5eDJsRTZNN1QyMkxiUzVsQTBJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "sxh5k3J9AZPcRZBulj278gEBBn23t2uHEfDdiUYJ7wAsJUBVqn7Stj7bnSdcASKfX2U2sKzMuR9Y4_0_Q94KY2qr9TKD6AMgx_9eh1vA8mhVvFH2PrjMsRox-osTZOyiA7RhXRP_heuMIqnn_y0ryR9fZjwwGFobfqld0loTchFYjyabGP-BDJNAwIxleCXbcFbf6e89ANRuJIAV39UDMyxDZgLL0HPOt9ySOmeoqGHd67zrdhrGoB66X9hfMV_cwWhbyzFxZ9QRM97iprFJtpU2ITwu_ZvNAsSPkBp9sm7guwIhRV-tVXHDlJo3ejC2C5vKJAsr00_MBsQsV_zq0g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-04-25 13:25:02,273:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-04-25 13:25:02,274:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 25 Apr 2024 11:25:43 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786200537 Replay-Nonce: 1Th9Qjup8fIQrpFqlovUY_3Ra7riXKmyCtsFuF77TDVgHrbNGSE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:40:41Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591349607" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786200537" } 2024-04-25 13:25:02,274:DEBUG:acme.client:Storing nonce: 1Th9Qjup8fIQrpFqlovUY_3Ra7riXKmyCtsFuF77TDVgHrbNGSE 2024-04-25 13:25:02,275:DEBUG:acme.client:JWS payload: b'' 2024-04-25 13:25:02,281:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591349607: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXA4ZklRcnBGcWxvdlVZXzNSYTdyaVhLbXlDdHNGdUY3N1REVmdIcmJOR1NFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEzNDk2MDcifQ", "signature": "YIlkgaT18yXpBIPgZkopP2_AwvLt54OAS32l5sAjaSZr8nWfR67Q_FWJGDebXcT5YCqBxsmmpE7TXHpkG7u68YfzrNNaLmP7ISQiN3EAqMBmwIvItUedYI_ktxakz7TdCyOJF4HN_38y-4LsI-TNvJZ6fOwDH1houytkhelKHW1Y07JFxyY6GRpUZ0WGmQTu4UpmED3zFNS-HCRaesrcGV5AVAjdTw9Vn613abkP-l6Sa1NFKxgaW-WkDEZwGFRay-fjcmfBilH_wtLSCLTbJa41mLMCoXTGdiBdgDMJuihdbtTE6DElf6ny8NMSTLVEsNv2YcGAtvVsWCx_iFZpQw", "payload": "" } 2024-04-25 13:25:02,451:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591349607 HTTP/1.1" 200 809 2024-04-25 13:25:02,452:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:25:43 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43N90gOEn0OeQyx_L3Cc8XnNLKgUYyPqa8LggLRp-j_LhU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:40:41Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591349607/oncY-g", "token": "lEKPgmmcYCfvrPlwwVhh1yovbIr4Hpj5_O2FYaxZFKY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591349607/YKDY0A", "token": "lEKPgmmcYCfvrPlwwVhh1yovbIr4Hpj5_O2FYaxZFKY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591349607/Xd0Giw", "token": "lEKPgmmcYCfvrPlwwVhh1yovbIr4Hpj5_O2FYaxZFKY" } ] } 2024-04-25 13:25:02,452:DEBUG:acme.client:Storing nonce: sW-8q43N90gOEn0OeQyx_L3Cc8XnNLKgUYyPqa8LggLRp-j_LhU 2024-04-25 13:25:02,452:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-25 13:25:02,453:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-04-25 13:25:02,453:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-25 13:25:02,453:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-25 13:25:02,454:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-25 13:25:02,454:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-25 13:25:02,454:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-25 13:25:02,455:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-25 13:25:02,456:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-25 13:25:02,499:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-25 13:25:02,779:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-25 13:25:02,780:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2024-04-25 13:25:02,781:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2024-04-25 13:25:02,785:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:17 UTC. 2024-04-25 13:25:02,785:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-25 13:25:02,785:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-25 13:25:02,790:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-25 13:25:02,791:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-25 13:25:02,791:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-25 13:25:02,795:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-25 13:25:02,797:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-25 13:25:02,799:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-25 13:25:03,261:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-25 13:25:03,262:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:25:44 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "uW7vB8ysN1c": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-04-25 13:25:03,262:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-25 13:25:07,278:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7906_key-certbot.pem 2024-04-25 13:25:11,303:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7904_csr-certbot.pem 2024-04-25 13:25:11,303:DEBUG:acme.client:Requesting fresh nonce 2024-04-25 13:25:11,303:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-25 13:25:11,458:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-25 13:25:11,458:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:25:52 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43N8muAemn5RueL-hAEYOmyuOp5YQbEVHvdLDyg2dK5HUU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-25 13:25:11,459:DEBUG:acme.client:Storing nonce: sW-8q43N8muAemn5RueL-hAEYOmyuOp5YQbEVHvdLDyg2dK5HUU 2024-04-25 13:25:11,459:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-04-25 13:25:11,465:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M044bXVBZW1uNVJ1ZUwtaEFFWU9teXVPcDVZUWJFVkh2ZExEeWcyZEs1SFVVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "FlPyRSHhVQarIZDeErQcajiNO4Ne5euuI8n0s3s1oK6629boFylo4rBqzbWx1I4RipxYGbIpgsSlljBTn9ZNoS6yg3-buJk7PWE5dYrIsB7CiU5AKRHl9ihIqP8-Xs8Brekk5VW7ak3hBLQAopPHp_Duzm5I6L7Q_q1jQkwkBl0LxmrvwIfsDOYR3UyyMcrRJV1rbDF28RqUC5m-0L6NZBZSmnUCzSqgi2wbdMTjiThP2I6vhg5WhUKrw2ipSFRe0NLVNeDMrVI5JbTkYG_hBlD70BcW1EidiuxQcMh3K0qm71VgpLxO1z_DbuibVR88s8FPbPWQermGIeBA2l-xxg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-25 13:25:11,633:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-25 13:25:11,633:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 25 Apr 2024 11:25:52 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786231497 Replay-Nonce: 1Th9Qjup-TrAbHu5GAmUvczLf-6YltOelUH40d5p5t7qhcSB65Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:40:52Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591394247" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786231497" } 2024-04-25 13:25:11,634:DEBUG:acme.client:Storing nonce: 1Th9Qjup-TrAbHu5GAmUvczLf-6YltOelUH40d5p5t7qhcSB65Q 2024-04-25 13:25:11,634:DEBUG:acme.client:JWS payload: b'' 2024-04-25 13:25:11,640:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591394247: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXAtVHJBYkh1NUdBbVV2Y3pMZi02WWx0T2VsVUg0MGQ1cDV0N3FoY1NCNjVRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEzOTQyNDcifQ", "signature": "xv5nx8P9s58m66vMnMNsOJyCl04RLoz-HeCBL99ID3PT-Qemc69rUQXHhqgEaeK4Z6B0dV0_CcajvK2gQUwIlqLLXE2fbne_V8pMsGdGyiipaki_hTCX6p_OEyjZqTd5p8tH4lXGx1gjf4cRlQ02De2QS_jyP0gs33G13ftLJ2uR4FW5hJ7Om_Yh9U4mKU3baN_bZ2f7Dn2sJwQaXzVO4Y775kZJ8en81F6g2-2BN0f8rAAs5k1mVk6XjgOwNKAp6eOjeaRCEXyvefy5KXQ8eLMORTobakIpsLUgwqsPLkE2aAv7GAfS93ChjboOx-OMEjXlqnn27Qi1NvYAQCJVwQ", "payload": "" } 2024-04-25 13:25:11,800:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591394247 HTTP/1.1" 200 805 2024-04-25 13:25:11,801:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:25:53 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9QjupTJXmYw5JqzkolA0SCIHMHr2-FmWiSqts6hLq_oR6yvQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:40:52Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591394247/ePyIlw", "token": "oYmgBuOUaoivOJK8eY4kz7MGDKSVo32OgAN5bzlC-mY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591394247/TCtJEA", "token": "oYmgBuOUaoivOJK8eY4kz7MGDKSVo32OgAN5bzlC-mY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591394247/RorkVg", "token": "oYmgBuOUaoivOJK8eY4kz7MGDKSVo32OgAN5bzlC-mY" } ] } 2024-04-25 13:25:11,801:DEBUG:acme.client:Storing nonce: 1Th9QjupTJXmYw5JqzkolA0SCIHMHr2-FmWiSqts6hLq_oR6yvQ 2024-04-25 13:25:11,802:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-25 13:25:11,802:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-04-25 13:25:11,802:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-25 13:25:11,803:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-25 13:25:11,803:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-25 13:25:11,804:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-25 13:25:11,804:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-25 13:25:11,804:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-25 13:25:11,805:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-25 13:25:11,846:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-25 13:25:12,077:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-25 13:25:12,079:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-25 13:25:12,080:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-25 13:25:12,084:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:34 UTC. 2024-04-25 13:25:12,085:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-25 13:25:12,085:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-25 13:25:12,090:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-25 13:25:12,090:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-25 13:25:12,091:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-25 13:25:12,095:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-25 13:25:12,096:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-25 13:25:12,098:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-25 13:25:12,547:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-25 13:25:12,548:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:25:53 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "WRVwDdXQt30": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-25 13:25:12,548:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-25 13:25:16,794:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7907_key-certbot.pem 2024-04-25 13:25:20,853:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7905_csr-certbot.pem 2024-04-25 13:25:20,854:DEBUG:acme.client:Requesting fresh nonce 2024-04-25 13:25:20,854:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-25 13:25:21,000:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-25 13:25:21,001:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:26:02 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMpnnib-bKdZcoHAjTYJoU6jYvZe0PH4eg-BljF3LShs88 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-25 13:25:21,001:DEBUG:acme.client:Storing nonce: FUnC6kMpnnib-bKdZcoHAjTYJoU6jYvZe0PH4eg-BljF3LShs88 2024-04-25 13:25:21,001:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-04-25 13:25:21,008:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBubmliLWJLZFpjb0hBalRZSm9VNmpZdlplMFBINGVnLUJsakYzTFNoczg4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "AVuSEZ6CJdtEGzWYcbKYHi6Dmy2fVNtZU07Eca-FCbbFy02ohizLQiwbJu8-K5-uaooWiWHrLkHbC0GsW4S2PnJ5Pd35WQGUGoQcUkXIDHLXd2iiiS5eHBlCQrWbbZtDhMS3vVQA5JjDkPfN_V6T0u1ksVc-MPfNJS_kbtZsRoksg-JhcCEVJA0nGutY-F6HGN-U-EArYqAOOYT2YwrS8ft6e2KI6SsHXEK-C7lCHbB-Bs9HjziJVYRI96tgKFBcgG3TKF71Hr7e3u6eaPlpERcMiDl0npQioI1tCgfgqZ1OV7UaEjIrl6sQ7hYJgfIbPDDorxkS_sU3b3XPmKoMQw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-25 13:25:21,195:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-25 13:25:21,196:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 25 Apr 2024 11:26:02 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786267447 Replay-Nonce: FUnC6kMpiyQZ_nPBD_7ISK2PKAF6Jo-HXCRV11dB49wf3-yO-Ck X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:41:03Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591444387" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786267447" } 2024-04-25 13:25:21,196:DEBUG:acme.client:Storing nonce: FUnC6kMpiyQZ_nPBD_7ISK2PKAF6Jo-HXCRV11dB49wf3-yO-Ck 2024-04-25 13:25:21,196:DEBUG:acme.client:JWS payload: b'' 2024-04-25 13:25:21,202:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591444387: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBpeVFaX25QQkRfN0lTSzJQS0FGNkpvLUhYQ1JWMTFkQjQ5d2YzLXlPLUNrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTE0NDQzODcifQ", "signature": "izBkzYneQGlc07DDntRCBUoiJVb2JRjhQ1qCEaiRzFuuep2YNJAI17eYGf9J9obC2h-i7CLPe1PAwSOKpMY_qb3zYCIok8ureFDAS1JzsarykPZLQTZ9_JFUnB2Nx7-jfUmRpWQRoRWTj62bd-xpyQsEf_Im5reoEtOKuwu5N_0jHy83_hI_zG08AOawcfc_FfL8WEmjlNdBEnhJtYpcxDJQDelmyyGhQA24wrjeAVcmiOE3TPJCpH9RZKfXGS92G-Er9km4TKdeLjZsZkMfPvh2MwNrP2PMCBPepnQjtheQ1xT8CYLKL6oEZ5GuUJgMGNNOntxvCOLe_s1hiGZayA", "payload": "" } 2024-04-25 13:25:21,352:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591444387 HTTP/1.1" 200 805 2024-04-25 13:25:21,353:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:26:02 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyaIdhfhzkPWkDOhYnkosK00cKx80ZRSmj8iMt-a05ei3s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:41:03Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591444387/VwZ0tQ", "token": "z8Ul1zMz25vACMWktTfhRv_JHgA52ZiTFMeRSlTIJNg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591444387/OQQw2Q", "token": "z8Ul1zMz25vACMWktTfhRv_JHgA52ZiTFMeRSlTIJNg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591444387/x6ddUg", "token": "z8Ul1zMz25vACMWktTfhRv_JHgA52ZiTFMeRSlTIJNg" } ] } 2024-04-25 13:25:21,353:DEBUG:acme.client:Storing nonce: Y89UXNyaIdhfhzkPWkDOhYnkosK00cKx80ZRSmj8iMt-a05ei3s 2024-04-25 13:25:21,354:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-25 13:25:21,354:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-04-25 13:25:21,354:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-25 13:25:21,355:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-25 13:25:21,355:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-25 13:25:21,356:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-25 13:25:21,356:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-25 13:25:21,356:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-25 13:25:21,357:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-25 13:25:21,396:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-25 13:25:21,742:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-25 13:25:21,744:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-04-25 13:25:21,744:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-04-25 13:25:21,748:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:48 UTC. 2024-04-25 13:25:21,748:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-25 13:25:21,748:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-25 13:25:21,753:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-25 13:25:21,754:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-25 13:25:21,754:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-25 13:25:21,758:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-25 13:25:21,759:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-25 13:25:21,761:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-25 13:25:22,195:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-25 13:25:22,196:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:26:03 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "P5jBGsZTN0o": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-25 13:25:22,196:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-25 13:25:26,507:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7908_key-certbot.pem 2024-04-25 13:25:30,640:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7906_csr-certbot.pem 2024-04-25 13:25:30,640:DEBUG:acme.client:Requesting fresh nonce 2024-04-25 13:25:30,640:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-25 13:25:30,791:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-25 13:25:30,792:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:26:12 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMpSLqsV4Ej9DdT0_vmuVAgbFxIag3VlbtLACc9llhTz-c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-25 13:25:30,792:DEBUG:acme.client:Storing nonce: FUnC6kMpSLqsV4Ej9DdT0_vmuVAgbFxIag3VlbtLACc9llhTz-c 2024-04-25 13:25:30,792:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-04-25 13:25:30,799:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBTTHFzVjRFajlEZFQwX3ZtdVZBZ2JGeElhZzNWbGJ0TEFDYzlsbGhUei1jIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "aVyxVkw0AEsdRy7jp4CXf_rUZHiC0wDb4gz1qYJSdwd6OGF8hU5N3n9WC9OP00M3YMLYxXSqjH6OuCMPF7MsaQjVjVabsC5MM3V55xFC5SQ_CURuXGpSzgxg_bRqUMyEoO56prDTS_RSEKK3D6MW31q-Q3zXvCBuYRfy7Mwedi0VC2SkY_3yT1GiVY666HyNe3WBGuvFwFeVWEFsuNcGHWntZvbFRN94m5idqjlBzlsJMnlCWmRjdKHYhnAI6e4nlnVG-lZDMhWIFShXYYLwmnf2XGNBz5ZMmtGeo-cQ9zo5egMfQUxEe-s5M4NNSkIdKnk6i8s44Q-u1iZa3iNeEA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-25 13:25:30,962:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-25 13:25:30,962:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 25 Apr 2024 11:26:12 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786306657 Replay-Nonce: Y89UXNyauNkNzFb2sETCfI7-ceolJi4bKxz4pzjrz7a4rFiWa5c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:41:14Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591499197" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786306657" } 2024-04-25 13:25:30,963:DEBUG:acme.client:Storing nonce: Y89UXNyauNkNzFb2sETCfI7-ceolJi4bKxz4pzjrz7a4rFiWa5c 2024-04-25 13:25:30,963:DEBUG:acme.client:JWS payload: b'' 2024-04-25 13:25:30,969:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591499197: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWF1TmtOekZiMnNFVENmSTctY2VvbEppNGJLeHo0cHpqcno3YTRyRmlXYTVjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTE0OTkxOTcifQ", "signature": "c2psd5hNWcbo3Zb4UDQu0rA7UWnRZLQiMNusPiMtr36DJVeIHdFuVl0w2wcK0Ys4e8G9QXTlPgJjbsr8fBuyZ_e9BBcg-mXhyMBhOStw1dpTkkSFic_IbmT6f5FGpxinAjWZsAoa3t9tMiSZvA4-Kwvb-CjQg9vPuW3yVuYqE89EFD6NYg_fKZwhey1uiANZvDK52WonxBQ7zFB1sYDg5YN3LnUjdpcaA7bq7D-GlfkcPltX7Zd7p72PmH2bG3cBP7H8HVdyxutPw03kdxNdZxuWG4VMSZofNNPnr9znd_stLYqJwzUa1NRvHI9kkcEcctAkRjCqfpni1k5u6GOypQ", "payload": "" } 2024-04-25 13:25:31,126:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591499197 HTTP/1.1" 200 805 2024-04-25 13:25:31,126:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 25 Apr 2024 11:26:12 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyaje8q4fsGaCUnKrOQax6C27uIBKQPGPPEC0VKh17ullU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:41:14Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591499197/wllBug", "token": "Fd-9sA7qPZwOOCczOUvR-JOGAFcVsaub88OTZRhbpbo" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591499197/l8TEMw", "token": "Fd-9sA7qPZwOOCczOUvR-JOGAFcVsaub88OTZRhbpbo" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591499197/3h01xg", "token": "Fd-9sA7qPZwOOCczOUvR-JOGAFcVsaub88OTZRhbpbo" } ] } 2024-04-25 13:25:31,127:DEBUG:acme.client:Storing nonce: Y89UXNyaje8q4fsGaCUnKrOQax6C27uIBKQPGPPEC0VKh17ullU 2024-04-25 13:25:31,127:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-25 13:25:31,127:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-04-25 13:25:31,128:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-25 13:25:31,128:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-25 13:25:31,129:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-25 13:25:31,129:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-25 13:25:31,129:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-25 13:25:31,130:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-25 13:25:31,131:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-25 13:25:31,131:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-04-25 13:25:31,131:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-04-25 13:25:31,132:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-04-25 13:25:31,134:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)