2024-04-24 22:38:07,315:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-04-24 22:38:07,315:DEBUG:certbot._internal.main:Arguments: [] 2024-04-24 22:38:07,315:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-04-24 22:38:08,520:DEBUG:certbot._internal.log:Root logging level set at 20 2024-04-24 22:38:08,520:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-04-24 22:38:08,560:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-04-24 22:38:08,601:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-24 22:38:08,907:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-24 22:38:08,919:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert9.pem is signed by the certificate's issuer. 2024-04-24 22:38:08,922:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert9.pem is: OCSPCertStatus.GOOD 2024-04-24 22:38:08,930:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:24 UTC. 2024-04-24 22:38:08,931:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-24 22:38:08,931:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-24 22:38:08,936:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-24 22:38:08,936:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-24 22:38:08,937:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-24 22:38:08,944:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-24 22:38:08,945:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-24 22:38:08,948:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-24 22:38:09,470:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-24 22:38:09,471:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:38:51 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "3E51PLIcKG8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-24 22:38:09,471:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-24 22:38:14,871:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7870_key-certbot.pem 2024-04-24 22:38:19,818:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7868_csr-certbot.pem 2024-04-24 22:38:19,818:DEBUG:acme.client:Requesting fresh nonce 2024-04-24 22:38:19,818:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-24 22:38:19,978:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-24 22:38:19,978:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:39:01 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43NCo2DIN29qRQYOa45heoVXqiKbDvicIRW0jzexJ1nhAI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-24 22:38:19,978:DEBUG:acme.client:Storing nonce: sW-8q43NCo2DIN29qRQYOa45heoVXqiKbDvicIRW0jzexJ1nhAI 2024-04-24 22:38:19,978:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-04-24 22:38:19,984:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M05DbzJESU4yOXFSUVlPYTQ1aGVvVlhxaUtiRHZpY0lSVzBqemV4SjFuaEFJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "M4imKP0qu6uoTT9r2hroiG4B1IeRRQDvVaoHMMgKgpAUeGuGTSKlTMYxtZpX_reuBvItGNAnOKNcIG1TY4JHJzIceB4jN1MISxs7W9JsGtuXF1kbIiwUXNOzyKXhihebBASuDZq6vNIJS1C0hOoTifi0DHWi4FphaZIxk0vmTt-HfREKCeiUr_qELiDTS0EJnB9YoRK68g1frCSSfDYXtZV5WcHX8vvHeBaQmu-ccALg0qGdIaxUYZ8xt-BxO3JhLQp8SmJagwXx0mo2k-9fJQW_ExYz-WpK8-OdDEQ-0yR2J7x0D6bMea2MFaH9Dcyd5w42cJcPzTRamRvkSTKNbA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-24 22:38:20,184:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-04-24 22:38:20,184:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 24 Apr 2024 20:39:02 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263785897197 Replay-Nonce: sW-8q43Na5pPu8WULQbspSm8bBDtr6B62bF6NkvMV0PWEdPCAjg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:39:02Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342590903587" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263785897197" } 2024-04-24 22:38:20,184:DEBUG:acme.client:Storing nonce: sW-8q43Na5pPu8WULQbspSm8bBDtr6B62bF6NkvMV0PWEdPCAjg 2024-04-24 22:38:20,185:DEBUG:acme.client:JWS payload: b'' 2024-04-24 22:38:20,190:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342590903587: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M05hNXBQdThXVUxRYnNwU204YkJEdHI2QjYyYkY2Tmt2TVYwUFdFZFBDQWpnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTA5MDM1ODcifQ", "signature": "e6tkdcTA7ASwqKWU6zq7WYnhon7CI1nrfTigsrmz0-ffZxRouRZuk6UrrRxWBD8woTDj1sqSGdbWsBwBq-G9IsATi9UhWbKsBMXo2ZT2GV21nKW06l3RwBirqzOVisd3JuBV6DwhN0b_eRa3Ws4xynYEHBJ-EP086QDvR5ZFMdNU4qKHhWKGC_CyTrgXJPSzyKw9Vqdy20LmrNeBTVQUbTXn8ohswCIe4UWGpPyOWxsbSoIdO-4JhVV1s9lXjDdBYmV3CvW0ORpSyCDBTcGCXvr1SeK9zt1dc6HU2ID0thDRY6_gL78qAaC8U08lfIz7tpUO6166P2DKAg6Jzip0sQ", "payload": "" } 2024-04-24 22:38:20,350:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342590903587 HTTP/1.1" 200 810 2024-04-24 22:38:20,351:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:39:02 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43NItLdj0QKkaOrngufs8FeQaUol0UgJC2bi60IOb1sD1M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:39:02Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590903587/yQQlQg", "token": "_cYaZQFxe65pnQBqTdAB7A2ly3NXiqxedIi23pGjVI4" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590903587/fshO_g", "token": "_cYaZQFxe65pnQBqTdAB7A2ly3NXiqxedIi23pGjVI4" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590903587/Ovx7gQ", "token": "_cYaZQFxe65pnQBqTdAB7A2ly3NXiqxedIi23pGjVI4" } ] } 2024-04-24 22:38:20,351:DEBUG:acme.client:Storing nonce: sW-8q43NItLdj0QKkaOrngufs8FeQaUol0UgJC2bi60IOb1sD1M 2024-04-24 22:38:20,351:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-24 22:38:20,351:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-04-24 22:38:20,351:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-24 22:38:20,351:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-24 22:38:20,367:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-24 22:38:20,368:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-24 22:38:20,368:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-24 22:38:20,368:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-24 22:38:20,375:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-24 22:38:20,415:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-24 22:38:20,687:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-24 22:38:20,688:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-24 22:38:20,689:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-24 22:38:20,693:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:42 UTC. 2024-04-24 22:38:20,694:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-24 22:38:20,694:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-24 22:38:20,698:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-24 22:38:20,698:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-24 22:38:20,699:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-24 22:38:20,714:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-24 22:38:20,715:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-24 22:38:20,717:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-24 22:38:21,163:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-24 22:38:21,164:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:39:03 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "FqN_FGXxUOA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-24 22:38:21,164:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-24 22:38:26,060:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7871_key-certbot.pem 2024-04-24 22:38:30,726:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7869_csr-certbot.pem 2024-04-24 22:38:30,726:DEBUG:acme.client:Requesting fresh nonce 2024-04-24 22:38:30,726:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-24 22:38:30,870:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-24 22:38:30,870:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:39:12 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMpvxHWGslvZ7TM6qUL13m74NR0BJ46zB969WJsDZayw0o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-24 22:38:30,871:DEBUG:acme.client:Storing nonce: FUnC6kMpvxHWGslvZ7TM6qUL13m74NR0BJ46zB969WJsDZayw0o 2024-04-24 22:38:30,871:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-04-24 22:38:30,878:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXB2eEhXR3Nsdlo3VE02cVVMMTNtNzROUjBCSjQ2ekI5NjlXSnNEWmF5dzBvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ovRMepZJJo319yuSrF9keJPs7xsjUKdYaFsLYJiFU3xWMjHYZJJCNtMeedZk7BTc1TAzIBluJNE1kRFz6zUOD1N9765Gns83VF_3scYtLiMq9jE4wcMcy9dBS1Pl4HnsoEglkBn1Ie-oosCplAFuBlie3_dD84HDolWasX3zRpYq6giXDSBo0fqf4ZCphkWX6s5-LRmwLR5xwL1pNDEH8yE6dq-XC2cb20_So42jm7IIu2_xYtWugpSXMqf3Rb1pDumKKFfRI6SkHXvT7evkXQ0PC9UQOGCJAIg2kWPyIlDpoj0cV1tuK2rmpmVhO-aEgXSNxaG7Rd9Rc3oiuyQxWQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-24 22:38:31,226:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-04-24 22:38:31,227:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 24 Apr 2024 20:39:13 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263785936717 Replay-Nonce: FUnC6kMpJMX4bOwUdiu6X3tMh5qXnnrfCWxLfPLaDarbsZ7KpL0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:39:12Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342590959637" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263785936717" } 2024-04-24 22:38:31,227:DEBUG:acme.client:Storing nonce: FUnC6kMpJMX4bOwUdiu6X3tMh5qXnnrfCWxLfPLaDarbsZ7KpL0 2024-04-24 22:38:31,227:DEBUG:acme.client:JWS payload: b'' 2024-04-24 22:38:31,233:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342590959637: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBKTVg0Yk93VWRpdTZYM3RNaDVxWG5ucmZDV3hMZlBMYURhcmJzWjdLcEwwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTA5NTk2MzcifQ", "signature": "oZ2Sd14fFjutoCgPNR2jZ7fyB5iTHzNnsdt700I3K6NrgK8UGEj0mhNYgv81VDN4X9ERWqciEiYas92AjXc1zosx6xDGOtbbbL-O_icDz7rjHmebXIX_xxGKD-BDvupACuwqvdN8V4LmO2Odww44GTtWBrWrEG5uKbWeDIXZuw3VCdigWJ8DpdHhkTeu6vo-mGv9EKwvcukpz6CEeUC0HTP7swchQs7XEs9Y3pHc_U1eSOeaTXoJ6BWEUGGh3hDArmQ4_v-qhLSTelNsitLlvH3xQQ7LkMyMutiRBlrRIJGoof4htEdbvD3spSxi2ELrG3-tKk7CQOjWmtt9beRqoQ", "payload": "" } 2024-04-24 22:38:31,383:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342590959637 HTTP/1.1" 200 804 2024-04-24 22:38:31,384:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:39:13 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyaGxKKRPmtU80pc8gkTUmGpDprhNymekNg2Xq9OoxuEJs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:39:12Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590959637/k2GELA", "token": "tJLK_l85tGGQh0-6L-WrXUa-odUx6APjgZ8B6_DGAB0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590959637/C9NXzA", "token": "tJLK_l85tGGQh0-6L-WrXUa-odUx6APjgZ8B6_DGAB0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342590959637/N6vgRQ", "token": "tJLK_l85tGGQh0-6L-WrXUa-odUx6APjgZ8B6_DGAB0" } ] } 2024-04-24 22:38:31,384:DEBUG:acme.client:Storing nonce: Y89UXNyaGxKKRPmtU80pc8gkTUmGpDprhNymekNg2Xq9OoxuEJs 2024-04-24 22:38:31,384:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-24 22:38:31,385:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-04-24 22:38:31,385:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-24 22:38:31,386:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-24 22:38:31,386:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-24 22:38:31,386:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-24 22:38:31,387:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-24 22:38:31,387:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-24 22:38:31,388:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-24 22:38:31,442:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-24 22:38:31,744:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-24 22:38:31,745:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-04-24 22:38:31,746:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-04-24 22:38:31,750:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:56 UTC. 2024-04-24 22:38:31,750:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-24 22:38:31,750:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-24 22:38:31,755:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-24 22:38:31,755:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-24 22:38:31,755:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-24 22:38:31,759:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-24 22:38:31,760:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-24 22:38:31,762:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-24 22:38:32,242:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-24 22:38:32,243:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:39:14 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "UjASBv-JyLM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-24 22:38:32,243:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-24 22:38:37,275:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7872_key-certbot.pem 2024-04-24 22:38:41,957:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7870_csr-certbot.pem 2024-04-24 22:38:41,957:DEBUG:acme.client:Requesting fresh nonce 2024-04-24 22:38:41,958:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-24 22:38:42,118:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-24 22:38:42,119:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:39:23 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9QjupUWn2FVpahSL7uV8KJJp19AI8Duwm1NFQCK0BiGdprSQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-24 22:38:42,119:DEBUG:acme.client:Storing nonce: 1Th9QjupUWn2FVpahSL7uV8KJJp19AI8Duwm1NFQCK0BiGdprSQ 2024-04-24 22:38:42,119:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-04-24 22:38:42,125:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBVV24yRlZwYWhTTDd1VjhLSkpwMTlBSThEdXdtMU5GUUNLMEJpR2RwclNRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Ydfe_McIE241mllaFumaN4PuK1BGsFAI2FOxW6oLvsYCtTEFFJgcb9xd5RqSpnYdlSStb5Guw1KEN8I9ZpLIn14E2z4JCgqF0go_FyqjYY3SgVKyeOl7INRZpxT4ZsXsntuVB177rHf_9KQR-DzArHCJ-OpPQxJwr5gbwaAmvo4QJWPBbWVuswrhETF1L-5DwmPOqg0YVH7nk23uEG5zd1FHeIOK1SyLidg8C3LEi5GcOfuynMcMuhQcjJQfdVw-60QahM7lxJWkKRECFPaX9u7Xma2uAr_YCuycaLz0GzL2hic1EYiQ3ol558XYvVWHE3daaPNHhL4fbYmnWsTIDw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-24 22:38:42,316:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-04-24 22:38:42,317:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 24 Apr 2024 20:39:24 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263785966947 Replay-Nonce: 1Th9Qjup-PXK1xaQq6M7N1e8DniMLn8QNKNt-UArnRFGz4mcFAY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:39:24Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591007887" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263785966947" } 2024-04-24 22:38:42,317:DEBUG:acme.client:Storing nonce: 1Th9Qjup-PXK1xaQq6M7N1e8DniMLn8QNKNt-UArnRFGz4mcFAY 2024-04-24 22:38:42,317:DEBUG:acme.client:JWS payload: b'' 2024-04-24 22:38:42,323:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591007887: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXAtUFhLMXhhUXE2TTdOMWU4RG5pTUxuOFFOS050LVVBcm5SRkd6NG1jRkFZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEwMDc4ODcifQ", "signature": "rKva7aXHlhMZKJ42vpAGCfQv9p9ot6gFwV4KpHIYUYzsOwxWD9Aef_o_uZFeqLy2JrTYpbq13oQ5U2er1sqWIx3Pw4xRB6fJA_erJ--6nWpQzIJdFlwFabC4J5T-Izg9oHfcFSL1WNCvjZzuXDeTSa3IddpnlmDnqWMBUVxRMROuKXTn0Bm-Bk227vqsc1nv_aqWxYnGOkrfeaDKx9M3KmCKg2Uqc9xjf4AS2vcX1rbwmhqcIL-11KkA8eR3T6kCbRYjOSFmLHoK_XNRg7TjlZA-wB1zJJoXp5esRvZMuUZ-Dte7CyRM_QscdvjofY4SGOiCIXMWYpU7WYcldUiHpQ", "payload": "" } 2024-04-24 22:38:42,486:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591007887 HTTP/1.1" 200 807 2024-04-24 22:38:42,487:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:39:24 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9QjupbtQfcQFJOMubKx9hBUfSDgodxhAIa-zyBWswODLprsg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:39:24Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591007887/PHBLZA", "token": "beB8Rj2vf_xsZdii23LrzSWxOGBiGEzmy54e95GXHoc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591007887/Lbw9kw", "token": "beB8Rj2vf_xsZdii23LrzSWxOGBiGEzmy54e95GXHoc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591007887/PJqcrw", "token": "beB8Rj2vf_xsZdii23LrzSWxOGBiGEzmy54e95GXHoc" } ] } 2024-04-24 22:38:42,487:DEBUG:acme.client:Storing nonce: 1Th9QjupbtQfcQFJOMubKx9hBUfSDgodxhAIa-zyBWswODLprsg 2024-04-24 22:38:42,487:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-24 22:38:42,488:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-04-24 22:38:42,488:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-24 22:38:42,488:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-24 22:38:42,489:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-24 22:38:42,489:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-24 22:38:42,490:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-24 22:38:42,490:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-24 22:38:42,491:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-24 22:38:42,539:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-24 22:38:42,813:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-24 22:38:42,814:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-24 22:38:42,815:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-24 22:38:42,818:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:14 UTC. 2024-04-24 22:38:42,818:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-24 22:38:42,819:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-24 22:38:42,823:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-24 22:38:42,823:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-24 22:38:42,824:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-24 22:38:42,828:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-24 22:38:42,829:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-24 22:38:42,831:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-24 22:38:43,277:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-24 22:38:43,277:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:39:25 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "1M8hAuMKf54": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-24 22:38:43,278:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-24 22:38:48,159:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7873_key-certbot.pem 2024-04-24 22:38:52,818:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7871_csr-certbot.pem 2024-04-24 22:38:52,819:DEBUG:acme.client:Requesting fresh nonce 2024-04-24 22:38:52,819:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-24 22:38:52,967:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-24 22:38:52,968:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:39:34 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMpZjN_zNmwhZzVBKTOGkHQbrV_d1jOT_9kK1bhgFgkrVE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-24 22:38:52,968:DEBUG:acme.client:Storing nonce: FUnC6kMpZjN_zNmwhZzVBKTOGkHQbrV_d1jOT_9kK1bhgFgkrVE 2024-04-24 22:38:52,968:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-04-24 22:38:52,974:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBaak5fek5td2haelZCS1RPR2tIUWJyVl9kMWpPVF85a0sxYmhnRmdrclZFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "caM8uSVszcp4V10Pd1jhDglHsEyUHOoJGVDmiFnwOjiO2x16XEyAPpK1NmIZVcrtlSCHd7bNCq8FF4z_9ofRCiblEzoMgWs7cq6yU07KxpCZR6cop18VICZmxYSy7UKH6gJ2K0wFzVpLMi5rr4OR0Zg2y4OZeeHXavyyrwS5hWkMSaUbLtnBWrO0sVtZv1akA454tGGBrKTl2oJOFHolW-HvE8jos6Y76xw1txT66J987dOHwH2tb_38fpNAmOkfmhHf3sBdzw4OKnA6b9uKoySG8RDue-7fWSD3XfHTn3QuX3qiM6EM_OLthVIzoqlXiZxFJcMs0Ubk7reoJyvR6g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-24 22:38:53,328:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-04-24 22:38:53,328:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 24 Apr 2024 20:39:35 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263785995757 Replay-Nonce: Y89UXNya_2zgwRbHPEFKNf6d1hUecBJVIZe6d9SOsFxvSMI1Ux8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:39:35Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591052317" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263785995757" } 2024-04-24 22:38:53,329:DEBUG:acme.client:Storing nonce: Y89UXNya_2zgwRbHPEFKNf6d1hUecBJVIZe6d9SOsFxvSMI1Ux8 2024-04-24 22:38:53,329:DEBUG:acme.client:JWS payload: b'' 2024-04-24 22:38:53,335:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591052317: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWFfMnpnd1JiSFBFRktOZjZkMWhVZWNCSlZJWmU2ZDlTT3NGeHZTTUkxVXg4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEwNTIzMTcifQ", "signature": "WiJgMsIRiHxmIvCyeRy1RqzbUfn9qo_lYXivSN3yQK9A2ZcR5wTJgj6KrF7ztWeQkg3suwgxxwwmQXC33-iEgvaPNyoBHZO5QAjO97OxqVek7gMyIlIShb9QlsZiDTZy9hy2dVyfoLD5qNMEZnB9TH-Rriq3bnzHqGS9I1z7zJKS-iEZ5VPZ1mOwKzJvZvYnU_3sfYw7YlFyZrwChQLEwq9nZJ1eXfX2s5D7GHkAn6B6G3YNR4nmc0DoQO0O2MtehTm0sefWauHxsNdntF8-eSqggnEo7oZuutbQQMb1CT0egGahiH87fM0dWUJI40R_yt_E5WGRGJrAUccrc9DTBw", "payload": "" } 2024-04-24 22:38:53,487:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591052317 HTTP/1.1" 200 801 2024-04-24 22:38:53,488:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:39:35 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyaehEVSSn1NtK6hUn0zuUCtGJ1NchQ7AjsSiLfW-zbAqc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:39:35Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591052317/nXYSvg", "token": "MIjKvMphRPU5OnxpnP63SaWPXmuRx-D-028G2__U8nQ" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591052317/lcK_gw", "token": "MIjKvMphRPU5OnxpnP63SaWPXmuRx-D-028G2__U8nQ" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591052317/A5w39g", "token": "MIjKvMphRPU5OnxpnP63SaWPXmuRx-D-028G2__U8nQ" } ] } 2024-04-24 22:38:53,488:DEBUG:acme.client:Storing nonce: Y89UXNyaehEVSSn1NtK6hUn0zuUCtGJ1NchQ7AjsSiLfW-zbAqc 2024-04-24 22:38:53,488:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-24 22:38:53,489:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-04-24 22:38:53,489:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-24 22:38:53,489:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-24 22:38:53,490:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-24 22:38:53,490:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-24 22:38:53,490:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-24 22:38:53,491:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-24 22:38:53,492:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-24 22:38:53,541:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-24 22:38:53,962:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-24 22:38:53,963:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-24 22:38:53,964:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-24 22:38:53,968:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:32 UTC. 2024-04-24 22:38:53,968:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-24 22:38:53,968:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-24 22:38:53,973:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-24 22:38:53,973:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-24 22:38:53,974:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-24 22:38:53,989:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-24 22:38:53,990:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-24 22:38:53,992:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-24 22:38:54,466:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-24 22:38:54,466:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:39:36 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "J6GkNNo-WDU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-24 22:38:54,467:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-24 22:38:59,231:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7874_key-certbot.pem 2024-04-24 22:39:03,845:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7872_csr-certbot.pem 2024-04-24 22:39:03,846:DEBUG:acme.client:Requesting fresh nonce 2024-04-24 22:39:03,846:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-24 22:39:04,014:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-24 22:39:04,015:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:39:45 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43N56MxKSasgWUS_-2peaOG6EQJeD-3Kc0w0baCOhArTW0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-24 22:39:04,015:DEBUG:acme.client:Storing nonce: sW-8q43N56MxKSasgWUS_-2peaOG6EQJeD-3Kc0w0baCOhArTW0 2024-04-24 22:39:04,015:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-04-24 22:39:04,021:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M041Nk14S1Nhc2dXVVNfLTJwZWFPRzZFUUplRC0zS2MwdzBiYUNPaEFyVFcwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "gQftmQGxXpNUty9kmnLN_AmXTbQmlVW-SC6oxk0DyGHjWLj-hvND4NIxsn0f20j1OG3TR1_DIXm63HrxRMbmo_r5XbuudaN9oZkQ_qRIuj9dK2tyLg14t8xh0oIdc23350Pbre54Qr2H_1Qca_5PoOXCki5s30NQO1ykkH8knnQav9TfgLRmhfuxzGRYLMW5_Xn7ZtGE2-miFFnLAwRBoJEEa1VVPlwtKZqMhx2v0Ryx2XTY-3Hc7CtotvEL8QmSoq2Hfj8pyOcRbEnshxgGGhZYnk_qY6uPDz16g1EqQJOzF5FS7gj6e_mZmVCPzKGdXyd8w4H7fmAvCTVsbgnnSA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-24 22:39:04,224:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-24 22:39:04,225:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 24 Apr 2024 20:39:46 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786022187 Replay-Nonce: 1Th9QjupPXwJCYP8N9J6hm-UpIw3zeQviGiN18tbR7vA6fKimEU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:39:46Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591093777" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786022187" } 2024-04-24 22:39:04,225:DEBUG:acme.client:Storing nonce: 1Th9QjupPXwJCYP8N9J6hm-UpIw3zeQviGiN18tbR7vA6fKimEU 2024-04-24 22:39:04,225:DEBUG:acme.client:JWS payload: b'' 2024-04-24 22:39:04,230:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591093777: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBQWHdKQ1lQOE45SjZobS1VcEl3M3plUXZpR2lOMTh0YlI3dkE2ZktpbUVVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEwOTM3NzcifQ", "signature": "rlTgZM2_OOshzAWKMk9MCq-AK-aOncj6KPp4Iqs7vVcIQXhAlszSM7fWorau33mmOT5ZM3AhT2dpYiUXStA3y8pDUMU2pAVAUeGKQB3aoQtETuZkmgZVCYyA2mje_x_AK0ZHmJXrVTGBF8sSSZ_pG9MhVL7T7wpnvnVd6j2Epja6YTJWj8-7LD6UX2oHrsLANduVVBylnKZl2xSRwr46lCvWEGQYK4rSugBaFiXk6XY82rxIaIubyVny70IgQZ8bzdFTNkBaKAIoXYMGGbFoVr9pkUuev8KHDFh2h0jEGkAzKFY-Tzj0KkZU6hHVZW9J47toEGxH0ecOFItV7DCWSw", "payload": "" } 2024-04-24 22:39:04,415:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591093777 HTTP/1.1" 200 805 2024-04-24 22:39:04,416:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:39:46 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43NBeNNKgKcnMlBb9Ow8OAPIZDYtUtK5YxPCrRdG-HZN4c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:39:46Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591093777/5L951w", "token": "wULsoLc7wACByPCe5SgzOs2w85CZ8-Gr43fdXB5k6SA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591093777/egwr_w", "token": "wULsoLc7wACByPCe5SgzOs2w85CZ8-Gr43fdXB5k6SA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591093777/HMvVIg", "token": "wULsoLc7wACByPCe5SgzOs2w85CZ8-Gr43fdXB5k6SA" } ] } 2024-04-24 22:39:04,416:DEBUG:acme.client:Storing nonce: sW-8q43NBeNNKgKcnMlBb9Ow8OAPIZDYtUtK5YxPCrRdG-HZN4c 2024-04-24 22:39:04,416:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-24 22:39:04,417:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-04-24 22:39:04,417:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-24 22:39:04,418:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-24 22:39:04,418:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-24 22:39:04,418:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-24 22:39:04,419:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-24 22:39:04,419:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-24 22:39:04,420:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-24 22:39:04,470:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-24 22:39:04,751:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-24 22:39:04,752:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-04-24 22:39:04,753:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-04-24 22:39:04,758:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:48 UTC. 2024-04-24 22:39:04,758:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-24 22:39:04,758:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-24 22:39:04,763:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-24 22:39:04,763:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-24 22:39:04,764:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-24 22:39:04,781:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-24 22:39:04,784:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-24 22:39:04,791:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-24 22:39:05,240:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-24 22:39:05,241:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:39:47 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "ARAXvFdKgMY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-24 22:39:05,241:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-24 22:39:10,205:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7875_key-certbot.pem 2024-04-24 22:39:14,868:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7873_csr-certbot.pem 2024-04-24 22:39:14,868:DEBUG:acme.client:Requesting fresh nonce 2024-04-24 22:39:14,869:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-24 22:39:15,018:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-24 22:39:15,018:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:39:56 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMpLnoDzOvnFNtrMu3ZhWCzaSpEuKljOQ3Fj4yhmMOFog4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-24 22:39:15,018:DEBUG:acme.client:Storing nonce: FUnC6kMpLnoDzOvnFNtrMu3ZhWCzaSpEuKljOQ3Fj4yhmMOFog4 2024-04-24 22:39:15,019:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-04-24 22:39:15,026:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBMbm9Eek92bkZOdHJNdTNaaFdDemFTcEV1S2xqT1EzRmo0eWhtTU9Gb2c0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "IEYWfq7w6VokYtcfiyjfcguoUDebaTX5kmXmmLUav-3uURjsZ1izRAfzvGENqMGkTOxsXKfu3HVRawUfX4Yk0-q1VK88xcjVA3lzSL_tsP8tqW_ayy83tbeDK2WIs8WRapnwuTrTXGUnNGXgTG0GEYxQ2-1dzS2cFrwTyh1KicWym3Wzod_ZwD8tUBJlvjP-QLv94Rx10S2dTTBuuTA4LWID_0daX4U13tazw-7wQ2y630rbbLT2iSmCCMvYgofC-5xZlvUor5LYjjjejZf7K0gOfV9lasemMyHm04VWWCHUjE-clTiPWIQM_9pASwBIdjbkn5E5tWfEFxRjqBibPg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-04-24 22:39:15,318:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-04-24 22:39:15,319:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 24 Apr 2024 20:39:57 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786050437 Replay-Nonce: Y89UXNyaB-1faUQgenREqrdh_XKT6y4F8T9Dce3cAE_FqrAp-dc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:39:57Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591136247" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786050437" } 2024-04-24 22:39:15,319:DEBUG:acme.client:Storing nonce: Y89UXNyaB-1faUQgenREqrdh_XKT6y4F8T9Dce3cAE_FqrAp-dc 2024-04-24 22:39:15,319:DEBUG:acme.client:JWS payload: b'' 2024-04-24 22:39:15,324:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591136247: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWFCLTFmYVVRZ2VuUkVxcmRoX1hLVDZ5NEY4VDlEY2UzY0FFX0ZxckFwLWRjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTExMzYyNDcifQ", "signature": "iDKeoG48fCmhD0L1Y6Xl5C2t2D1aNNbE70U3zFi5KUAjMVBR5887sxNIapHJOSy8VGjbTkzsaXc72geHLqavu-z2rqJ4CcG2JSe8PytLRYVdIsnIef3Lq8XDv-tPKOKyhlwc1yYU1MA5zm5t0B4yYKHhoPc9xr9DpiUkUcLM4joWqIl7AKGBarwPkRKB-G-LqPpMzqPIGzd_c5_yANQfswrcVKSHq-t9vMRzuZYCWu54jfDMkS4eroLioSvDkbMaf4iWfURaZ_RvZNCWJmqs3jlEfONPdYramSOzeH1SPONe0W5pnM9gqCL6SNg3RswV64V33FF0rt-IFpJgtGNO_A", "payload": "" } 2024-04-24 22:39:15,486:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591136247 HTTP/1.1" 200 809 2024-04-24 22:39:15,487:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:39:57 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMpFuq8au7tXwkO-IMIcKfdyfZLsgdyBg1gKtlBre-toZo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:39:57Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591136247/jmrcew", "token": "dV2yZMj-jEV96xJosxLDIsbyMijaWSPD6FdtA3sRgXw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591136247/-o7nbg", "token": "dV2yZMj-jEV96xJosxLDIsbyMijaWSPD6FdtA3sRgXw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591136247/DEae2A", "token": "dV2yZMj-jEV96xJosxLDIsbyMijaWSPD6FdtA3sRgXw" } ] } 2024-04-24 22:39:15,487:DEBUG:acme.client:Storing nonce: FUnC6kMpFuq8au7tXwkO-IMIcKfdyfZLsgdyBg1gKtlBre-toZo 2024-04-24 22:39:15,487:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-24 22:39:15,488:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-04-24 22:39:15,488:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-24 22:39:15,488:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-24 22:39:15,489:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-24 22:39:15,489:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-24 22:39:15,489:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-24 22:39:15,490:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-24 22:39:15,491:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-24 22:39:15,531:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-24 22:39:15,848:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-24 22:39:15,849:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-24 22:39:15,850:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-24 22:39:15,855:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:06 UTC. 2024-04-24 22:39:15,855:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-24 22:39:15,855:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-24 22:39:15,859:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-24 22:39:15,859:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-24 22:39:15,859:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-24 22:39:15,864:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-24 22:39:15,865:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-24 22:39:15,867:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-24 22:39:16,299:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-24 22:39:16,300:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:39:58 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "iJHhdGu-Vkg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-24 22:39:16,300:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-24 22:39:21,305:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7876_key-certbot.pem 2024-04-24 22:39:26,100:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7874_csr-certbot.pem 2024-04-24 22:39:26,101:DEBUG:acme.client:Requesting fresh nonce 2024-04-24 22:39:26,101:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-24 22:39:26,263:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-24 22:39:26,263:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:40:08 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyayDuL0QjCnIkHa_Q7cdOvXq3pL0XmjhNvT7_3cHNPQHI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-24 22:39:26,264:DEBUG:acme.client:Storing nonce: Y89UXNyayDuL0QjCnIkHa_Q7cdOvXq3pL0XmjhNvT7_3cHNPQHI 2024-04-24 22:39:26,264:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-04-24 22:39:26,270:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWF5RHVMMFFqQ25Ja0hhX1E3Y2RPdlhxM3BMMFhtamhOdlQ3XzNjSE5QUUhJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "yFLrB6486utxCK5-NnvJ_iVzSTAhR9_-mC8sJ-YqjsgHKsdbhjcPBdcYEOvgATFUTt1FRXGmxcCIPIe7Am9A85C8UdhzQ7VkpR1k9vFYM-9bfe3CV9oBNHaobr4z9pjmYl8wh9cP6unJ8Ssw4O5srLhvaimvMFzoKz8W6SACjzsVrRVW5meP_GWYnJbpoVlgdyFU51vAxmerOu8bU5u6uACXHtWY5Iuz07y0l9Ts15B3W7ikrlUCC9sGnacx8ESvaRR3jhf9SNfbQTHHEO1ieOFq4hRMZrlAvIxYIH00ML6tY-OVJo9wbL3G_nC3QcZ2Xfxi7-ZZbZCrP0OAJ4o8gg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-04-24 22:39:26,600:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-04-24 22:39:26,601:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 24 Apr 2024 20:40:08 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786101437 Replay-Nonce: FUnC6kMpOfqX8FIUHN_zkjH9g6wwhW2xnYrasp54WmxjKN6eZIg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:40:08Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591202447" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786101437" } 2024-04-24 22:39:26,601:DEBUG:acme.client:Storing nonce: FUnC6kMpOfqX8FIUHN_zkjH9g6wwhW2xnYrasp54WmxjKN6eZIg 2024-04-24 22:39:26,601:DEBUG:acme.client:JWS payload: b'' 2024-04-24 22:39:26,606:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591202447: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBPZnFYOEZJVUhOX3prakg5ZzZ3d2hXMnhuWXJhc3A1NFdteGpLTjZlWklnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEyMDI0NDcifQ", "signature": "pMzBM0NH1H3Feh9UsE4Nhwrej1k8tHRIX6urA4pzbVOg7aOM6SctzX7fYdhSWtUjTItYL9lFU7EgB5EJBHkn4FtuS7bWGr__d2LUJXSz9XKkkYC_Li1WrITc2oBttaGCBWzeB38KOetcvWys6zQUm5Wi_wQ4lK8AhdQQy1gFb1T02ZLw1PY1HFC-U8k70h38klY3wljmdMRRxchdKIYr9ubwNWMsya9rM-kUPGxrjfvkGrV3bFjGXjzahSjsomv-8IgPyThpNdG_4QC7gPX8DyDL6JHkUpX_GBP6a0hccjxVxdRczEC6j4UPD_TKf7sK3Smti3lSpJhGXIhziE6Hnw", "payload": "" } 2024-04-24 22:39:26,823:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591202447 HTTP/1.1" 200 806 2024-04-24 22:39:26,824:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:40:08 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyaD6YotH8WyrXi9V8jxZEkuudOcYCNuF-dlmty3JQfbAY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:40:08Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591202447/8XsmxQ", "token": "G1AdFqNnmnT088RDP0J9KtOwA_p7D5YMb-gb1g7ExAc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591202447/a1GZzw", "token": "G1AdFqNnmnT088RDP0J9KtOwA_p7D5YMb-gb1g7ExAc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591202447/qG0r0A", "token": "G1AdFqNnmnT088RDP0J9KtOwA_p7D5YMb-gb1g7ExAc" } ] } 2024-04-24 22:39:26,824:DEBUG:acme.client:Storing nonce: Y89UXNyaD6YotH8WyrXi9V8jxZEkuudOcYCNuF-dlmty3JQfbAY 2024-04-24 22:39:26,825:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-24 22:39:26,825:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-04-24 22:39:26,825:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-24 22:39:26,826:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-24 22:39:26,826:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-24 22:39:26,827:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-24 22:39:26,827:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-24 22:39:26,827:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-24 22:39:26,828:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-24 22:39:26,879:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-04-24 22:39:26,879:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-24 22:39:26,880:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-04-24 22:39:26,887:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-04-24 22:39:26,891:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-04-24 22:39:26,891:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-04-24 22:39:26,891:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-04-24 22:39:26,892:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-04-24 22:39:26,894:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-04-24 22:39:26,938:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-24 22:39:27,247:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-24 22:39:27,248:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-24 22:39:27,248:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-24 22:39:27,253:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:23 UTC. 2024-04-24 22:39:27,253:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-24 22:39:27,253:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-24 22:39:27,258:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-24 22:39:27,258:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-24 22:39:27,258:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-24 22:39:27,273:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-24 22:39:27,274:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-24 22:39:27,276:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-24 22:39:27,771:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-24 22:39:27,772:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:40:09 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "offGM8AHQsE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-24 22:39:27,772:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-24 22:39:32,690:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7877_key-certbot.pem 2024-04-24 22:39:37,299:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7875_csr-certbot.pem 2024-04-24 22:39:37,300:DEBUG:acme.client:Requesting fresh nonce 2024-04-24 22:39:37,300:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-24 22:39:37,460:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-24 22:39:37,460:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:40:19 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9QjupEvq8s_10rT9pXUJilrArDRjO4v3dYp3Z_ZeNXd0BR6M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-24 22:39:37,461:DEBUG:acme.client:Storing nonce: 1Th9QjupEvq8s_10rT9pXUJilrArDRjO4v3dYp3Z_ZeNXd0BR6M 2024-04-24 22:39:37,461:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-04-24 22:39:37,466:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBFdnE4c18xMHJUOXBYVUppbHJBckRSak80djNkWXAzWl9aZU5YZDBCUjZNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "h_uzLLpFAiltmsVF91jpoND0XrJqWWAIedWuTgu2EQaYVQfvsle14-Uqy2DHczftOj0dUtFvRG40Rf7yseyPf4vOwCH6qURtxBZl3tDgyeyvX_GyjPH3GyaEmLmWMxy3BsWfFtWy61RyncZDJhuwKMA_8wHbiFyNAspZbIdAbRUNv1wuYTXDGjaHbpcxa4TjJSnE5arowhD0zsCFiRoaf5kp8VbRLngXBGZEjBf3Ygs_XosS_zw5AWR6snV_YPMmaeEFloywPP0VLHXGP4NKOtyfklIlR8G_qXp0hZKDlSM_7Z_ohlCA2GJO-af-muyJpEmBnWN1cvjvYJ6RfP5D5A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-24 22:39:37,655:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-04-24 22:39:37,656:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 24 Apr 2024 20:40:19 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786138347 Replay-Nonce: 1Th9QjupgAms9jbll-xP_CHjSxo48dosxU5kTni9KDSFzeMwKKI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:40:19Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591256287" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786138347" } 2024-04-24 22:39:37,656:DEBUG:acme.client:Storing nonce: 1Th9QjupgAms9jbll-xP_CHjSxo48dosxU5kTni9KDSFzeMwKKI 2024-04-24 22:39:37,656:DEBUG:acme.client:JWS payload: b'' 2024-04-24 22:39:37,662:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591256287: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBnQW1zOWpibGwteFBfQ0hqU3hvNDhkb3N4VTVrVG5pOUtEU0Z6ZU13S0tJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEyNTYyODcifQ", "signature": "pxQ9za_-VuCi2Dxm1d9CW3lrdmzATsTp-lwlY5WewiFltS5vpB0kdhGsskHXkVqsOwiKR67TIkZuYgk7RSS3SI_-IgAeqcbo8uPDHzil0cKacSKRC1z83EKdJxfWeohxvTPEcR-15F_ByNcqRwUswbyvpP1c9kslqZLZy593fO9ckcsDeoS2sfR00DZZt8SEH4pkLZRN3L7uOh8Z7C_Jy0H7Z5TVhbrffzMp4ArNHJQK-m_818tTSgxWnHmKFhACIZl0j0YSr0Y1cniVmaWhEK5-2I-HFDd2ydcrLVs9EoRqWjloNzE8xy8WagKm4AAT_q84dJvP2jvdL4kXFpQQpQ", "payload": "" } 2024-04-24 22:39:37,824:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591256287 HTTP/1.1" 200 811 2024-04-24 22:39:37,824:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:40:19 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43NcHwCnDp_9vlC6fNy_L1pDpfcEY8Jz6aOvJhIc3rSSrc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:40:19Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591256287/K-RCZw", "token": "VNACvIqg7Fgn_WHq8b2_oKzrZYhRTgcu5X8dE-g-JYI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591256287/Qx_SSA", "token": "VNACvIqg7Fgn_WHq8b2_oKzrZYhRTgcu5X8dE-g-JYI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591256287/92J4RA", "token": "VNACvIqg7Fgn_WHq8b2_oKzrZYhRTgcu5X8dE-g-JYI" } ] } 2024-04-24 22:39:37,824:DEBUG:acme.client:Storing nonce: sW-8q43NcHwCnDp_9vlC6fNy_L1pDpfcEY8Jz6aOvJhIc3rSSrc 2024-04-24 22:39:37,825:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-24 22:39:37,825:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-04-24 22:39:37,826:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-24 22:39:37,826:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-24 22:39:37,827:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-24 22:39:37,827:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-24 22:39:37,827:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-24 22:39:37,827:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-24 22:39:37,828:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-24 22:39:37,880:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-24 22:39:38,182:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-24 22:39:38,183:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-24 22:39:38,184:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-24 22:39:38,189:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:41 UTC. 2024-04-24 22:39:38,189:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-24 22:39:38,189:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-24 22:39:38,194:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-24 22:39:38,194:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-24 22:39:38,195:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-24 22:39:38,210:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-24 22:39:38,211:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-24 22:39:38,214:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-24 22:39:38,691:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-24 22:39:38,691:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:40:20 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "IvI-3WHe3Fc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-24 22:39:38,692:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-24 22:39:43,470:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7878_key-certbot.pem 2024-04-24 22:39:48,072:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7876_csr-certbot.pem 2024-04-24 22:39:48,073:DEBUG:acme.client:Requesting fresh nonce 2024-04-24 22:39:48,073:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-24 22:39:48,233:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-24 22:39:48,234:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:40:30 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9Qjup_i38P0Cm-ShsaGDoTz1KOhyqwkaNgjaWlaVIZb0oyFI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-24 22:39:48,234:DEBUG:acme.client:Storing nonce: 1Th9Qjup_i38P0Cm-ShsaGDoTz1KOhyqwkaNgjaWlaVIZb0oyFI 2024-04-24 22:39:48,236:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-04-24 22:39:48,242:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBfaTM4UDBDbS1TaHNhR0RvVHoxS09oeXF3a2FOZ2phV2xhVklaYjBveUZJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "elHtnOIktoIWWJhXheaNXsuU5gCrzDDgAKMy4ZhZ1StpFgIMKpaGVdaiblGuBvxs74DViYtqu7Q8FaKDFe_37SMnMibUQMcfZi_BFn4AjMH6m6TF1D5ZxzVgiawPpXHuzWz2aAlaoM48hNSncvUmbWjqWjEGF3-_K1-WR6J38iu84JKPpeXBQv4cWuFLLrNScs-ShNmIuWUMjKWJaFIAAAtcPDtLTHF_n7rMWY2CoM97b7Ke-je9FlzYFkNc6KzPf-PfBfehIkh_lBchal7yZsnQz060RwDep3lZmo_5l7wecBOKXo1zBFwxN3bISehWAoAJtN6ofVbLF6FG7pI4hg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-24 22:39:48,514:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-04-24 22:39:48,514:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 24 Apr 2024 20:40:30 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786169497 Replay-Nonce: sW-8q43N5E94dsTOK48GKEJOvliN2YfkTFZjn2JXR91U_IO51gY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:40:30Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591303867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786169497" } 2024-04-24 22:39:48,515:DEBUG:acme.client:Storing nonce: sW-8q43N5E94dsTOK48GKEJOvliN2YfkTFZjn2JXR91U_IO51gY 2024-04-24 22:39:48,515:DEBUG:acme.client:JWS payload: b'' 2024-04-24 22:39:48,521:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591303867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M041RTk0ZHNUT0s0OEdLRUpPdmxpTjJZZmtURlpqbjJKWFI5MVVfSU81MWdZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEzMDM4NjcifQ", "signature": "gHr_43j7PRzZrabgTiyzYqflR6Gf5b-id4GeGWMcmjBdMdCTJ1nCcMBhyCq4c0GnsT83EmejY1zDeIyJrpjsYyZkX8LKCJgw92PDhI2QWh_3lIfdtd8qgXMbevMbiRmuzYYW8HEL_fiDhwLzIjTgeH71Xk0uomudOUsrpo7tpMFymxJcDwpwp3N2gTKMvy9SfZaQvVfFwDVrN73As1F-cHjAX-qQiA-hvke8EHYXbFXWMdk8Wlo2mM68NGxKPF4AqnYP0E64EbyriraZNmg15UZIRVvTox6_sYUDBJfz94KYVaGfP2PmvXKFqjayDGTbzqjUyYqVPlNa8hZrg7rMhw", "payload": "" } 2024-04-24 22:39:48,680:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591303867 HTTP/1.1" 200 810 2024-04-24 22:39:48,681:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:40:30 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9Qjupur_jZ8SA4chGmMCp8dd2hFv5BDc9CZY4LxoGr8eua_s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:40:30Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591303867/fVMRLg", "token": "v7V3rLmlxo6NcGbELkoNnlOhXK0p8NRQZV8Vqx6IRq0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591303867/q_0-Ew", "token": "v7V3rLmlxo6NcGbELkoNnlOhXK0p8NRQZV8Vqx6IRq0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591303867/G3BN_A", "token": "v7V3rLmlxo6NcGbELkoNnlOhXK0p8NRQZV8Vqx6IRq0" } ] } 2024-04-24 22:39:48,681:DEBUG:acme.client:Storing nonce: 1Th9Qjupur_jZ8SA4chGmMCp8dd2hFv5BDc9CZY4LxoGr8eua_s 2024-04-24 22:39:48,682:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-24 22:39:48,682:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-04-24 22:39:48,683:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-24 22:39:48,683:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-24 22:39:48,683:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-24 22:39:48,684:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-24 22:39:48,684:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-24 22:39:48,684:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-24 22:39:48,685:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-24 22:39:48,732:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-24 22:39:49,056:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-24 22:39:49,058:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-04-24 22:39:49,058:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-04-24 22:39:49,063:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:58 UTC. 2024-04-24 22:39:49,063:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-24 22:39:49,063:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-24 22:39:49,068:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-24 22:39:49,068:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-24 22:39:49,068:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-24 22:39:49,083:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-24 22:39:49,084:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-24 22:39:49,086:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-24 22:39:49,547:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-24 22:39:49,547:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:40:31 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "fXoxTPlbNGk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-24 22:39:49,548:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-24 22:39:54,350:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7879_key-certbot.pem 2024-04-24 22:39:58,961:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7877_csr-certbot.pem 2024-04-24 22:39:58,961:DEBUG:acme.client:Requesting fresh nonce 2024-04-24 22:39:58,961:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-24 22:39:59,116:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-24 22:39:59,116:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:40:40 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9QjupTSHqeDR8CWu8bYDzoKUIHhGSCdtp7QcOdEvrsF5km7s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-24 22:39:59,116:DEBUG:acme.client:Storing nonce: 1Th9QjupTSHqeDR8CWu8bYDzoKUIHhGSCdtp7QcOdEvrsF5km7s 2024-04-24 22:39:59,117:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-04-24 22:39:59,122:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBUU0hxZURSOENXdThiWUR6b0tVSUhoR1NDZHRwN1FjT2RFdnJzRjVrbTdzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "PPEMS_kY61QqWbMf2necEufg8_jq7qzQrYPpYr_kQvxJHgjDJR4ailWGOMV8DXa903NebAVssqrmqoT4lSobpWkJ3kkT6Ac0uy7SRTS8kY98oe8UaEKbGBrQX8bw1qlQVkTlu2lNIMG_C_onMrqqxAR-OPxUGKlrotGWa7hiPebZFM5toL26dXoqk2BCSnXX83ZqNVDEIeJpndBakcV4_uB4lQLeWSLXuaRqSo_UJCSnoK7B6MOwKWER-C25AQEV789XuNJJiPl0KyB0JWwey3lytXpdUB9zGxsivX73VIyJPx9-BUXOlZzB_1141QLJRvdhy0KsiqXYcYlqV_a5XQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-04-24 22:39:59,313:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-04-24 22:39:59,314:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 24 Apr 2024 20:40:41 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786200537 Replay-Nonce: 1Th9QjupJ4AZZDEo8QVvdgHKvAJGEKhGhRSd0L8_wjKxkcXlWRo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:40:41Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591349607" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786200537" } 2024-04-24 22:39:59,314:DEBUG:acme.client:Storing nonce: 1Th9QjupJ4AZZDEo8QVvdgHKvAJGEKhGhRSd0L8_wjKxkcXlWRo 2024-04-24 22:39:59,315:DEBUG:acme.client:JWS payload: b'' 2024-04-24 22:39:59,320:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591349607: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBKNEFaWkRFbzhRVnZkZ0hLdkFKR0VLaEdoUlNkMEw4X3dqS3hrY1hsV1JvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEzNDk2MDcifQ", "signature": "uwY3ScLELQdpaMoyKMmwUqDZYOAizlaVX8R95SkpXmQhwQsmKaccd5dy_32f0WNpiwV0bNTP5RRrS2xTLQYY5Ot_iwZZAr-MQ5GOPH4QlFSX_5WvjddVrapLks2NKAWoYAZpRrpT4XxZc7FImJc6K1Tx7TSUVR_Ac6xfwzLKgkABYKkR1TAf-yrocVTISOfm4JENmlWrnVMx1i9pvtB5V-eFxrhobvdOWsBKln3ReYQtdTcM4lSniDrk3dHBMoke-Qi5XM7lXwo5r9hq8Y-sWP5yt9iLH6jXBrUlK_P9Auj3JR-R9OcDh2xBiBhJeJEjuzoGjp0i4fI-v8_Js7VZIQ", "payload": "" } 2024-04-24 22:39:59,480:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591349607 HTTP/1.1" 200 809 2024-04-24 22:39:59,481:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:40:41 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43N62cZ0i1nLZ4CZGip0FE-HsKFcjwre-X7JYdSmeFaVwI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:40:41Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591349607/oncY-g", "token": "lEKPgmmcYCfvrPlwwVhh1yovbIr4Hpj5_O2FYaxZFKY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591349607/YKDY0A", "token": "lEKPgmmcYCfvrPlwwVhh1yovbIr4Hpj5_O2FYaxZFKY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591349607/Xd0Giw", "token": "lEKPgmmcYCfvrPlwwVhh1yovbIr4Hpj5_O2FYaxZFKY" } ] } 2024-04-24 22:39:59,481:DEBUG:acme.client:Storing nonce: sW-8q43N62cZ0i1nLZ4CZGip0FE-HsKFcjwre-X7JYdSmeFaVwI 2024-04-24 22:39:59,482:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-24 22:39:59,482:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-04-24 22:39:59,483:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-24 22:39:59,483:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-24 22:39:59,484:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-24 22:39:59,484:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-24 22:39:59,484:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-24 22:39:59,484:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-24 22:39:59,485:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-24 22:39:59,540:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-24 22:39:59,798:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-24 22:39:59,800:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2024-04-24 22:39:59,800:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2024-04-24 22:39:59,804:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:17 UTC. 2024-04-24 22:39:59,804:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-24 22:39:59,804:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-24 22:39:59,809:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-24 22:39:59,809:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-24 22:39:59,810:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-24 22:39:59,827:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-24 22:39:59,828:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-24 22:39:59,831:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-24 22:40:00,275:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-24 22:40:00,276:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:40:42 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "q8kR8OrHfII": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-24 22:40:00,276:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-24 22:40:05,375:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7880_key-certbot.pem 2024-04-24 22:40:09,921:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7878_csr-certbot.pem 2024-04-24 22:40:09,921:DEBUG:acme.client:Requesting fresh nonce 2024-04-24 22:40:09,921:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-24 22:40:10,065:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-24 22:40:10,066:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:40:51 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyawWdcofNoCEafsmldnXmCMzRNwqhmtZfAP8khugjPakY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-24 22:40:10,066:DEBUG:acme.client:Storing nonce: Y89UXNyawWdcofNoCEafsmldnXmCMzRNwqhmtZfAP8khugjPakY 2024-04-24 22:40:10,066:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-04-24 22:40:10,072:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWF3V2Rjb2ZOb0NFYWZzbWxkblhtQ016Uk53cWhtdFpmQVA4a2h1Z2pQYWtZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "xNrLbrY9CwDxGCZTKX-4zuRBIKMHYlW9BjIKB1C1Wsfv3GQckmA-VgMs6nqTIxNY8kwrg58mKIOp0JKtGYRgKveRmyeYe2D5tN0BlnTUvlBekJyZh0y1lBwJKA12CSCcF0fOIT2q9FjuDJL446-zjRvYiiNnBwPt6BcvjMaPfmv3vHaR9MA5BMJ7LkhWt3a56pG8Rz7j5hOfaP7jpd6gLRU1Eq1umQL8ZE0aYSM0IRfcrmTDSJVyvgrSexs6pWA-G4w_EAURSoJRRTw48i-JY0RKOm03wuhqXcecTL9nLyUPbkGAdn9Kyg65_hYt4ZHUL0FAdIv75W3q6zCaUEzWqw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-24 22:40:10,530:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-24 22:40:10,531:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 24 Apr 2024 20:40:52 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786231497 Replay-Nonce: FUnC6kMpjgJU7sUbhkkV032oDOKnt5gbFT5spulLRuVxraoGy9M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:40:52Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591394247" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786231497" } 2024-04-24 22:40:10,531:DEBUG:acme.client:Storing nonce: FUnC6kMpjgJU7sUbhkkV032oDOKnt5gbFT5spulLRuVxraoGy9M 2024-04-24 22:40:10,531:DEBUG:acme.client:JWS payload: b'' 2024-04-24 22:40:10,536:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591394247: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBqZ0pVN3NVYmhra1YwMzJvRE9LbnQ1Z2JGVDVzcHVsTFJ1VnhyYW9HeTlNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTEzOTQyNDcifQ", "signature": "hulahOAUttE9HJj9fGO-E93YQoiRWIiRBCxyjO197IZlJ_fKK_8IZMcd3YyRN4Vo7qm-iT4DtUMSvjCT9Vkw3R3tCD9cTs4pAgivMei4NQOYXYqRqqQtTfbLEsxQxIE6-Uk7Y2ohIKxRiM-El1ty2vl-RBVRCkWw3CrWsW9MGdIkswm5YUT0fFzqUTCui_DJeY1LBlGN3hrJ-VVDbo7GzvABTymYkJidpknUMTTJONAESBpgev2XjfVq8rplMITaxLwlw_bzGZIxVzV4t4YidjFbAukF5P12ThlvVPM7vkBqKf3mzjtbzhZArNq5CXHCmirqZ9vwrPdUQ4aNDFQMeQ", "payload": "" } 2024-04-24 22:40:10,699:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591394247 HTTP/1.1" 200 805 2024-04-24 22:40:10,700:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:40:52 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyafKyW-4gYI3oLLef2sz3EYF-m9tJuN9G_TveXWCQZHyo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:40:52Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591394247/ePyIlw", "token": "oYmgBuOUaoivOJK8eY4kz7MGDKSVo32OgAN5bzlC-mY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591394247/TCtJEA", "token": "oYmgBuOUaoivOJK8eY4kz7MGDKSVo32OgAN5bzlC-mY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591394247/RorkVg", "token": "oYmgBuOUaoivOJK8eY4kz7MGDKSVo32OgAN5bzlC-mY" } ] } 2024-04-24 22:40:10,700:DEBUG:acme.client:Storing nonce: Y89UXNyafKyW-4gYI3oLLef2sz3EYF-m9tJuN9G_TveXWCQZHyo 2024-04-24 22:40:10,701:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-24 22:40:10,701:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-04-24 22:40:10,701:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-24 22:40:10,702:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-24 22:40:10,703:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-24 22:40:10,703:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-24 22:40:10,703:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-24 22:40:10,703:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-24 22:40:10,704:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-24 22:40:10,745:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-24 22:40:11,074:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-24 22:40:11,075:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-24 22:40:11,076:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-24 22:40:11,080:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:34 UTC. 2024-04-24 22:40:11,080:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-24 22:40:11,081:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-24 22:40:11,085:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-24 22:40:11,086:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-24 22:40:11,086:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-24 22:40:11,101:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-24 22:40:11,102:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-24 22:40:11,105:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-24 22:40:11,581:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-24 22:40:11,581:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:40:53 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "o_Xv19Wkn4Y": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-24 22:40:11,582:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-24 22:40:16,368:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7881_key-certbot.pem 2024-04-24 22:40:20,995:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7879_csr-certbot.pem 2024-04-24 22:40:20,996:DEBUG:acme.client:Requesting fresh nonce 2024-04-24 22:40:20,996:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-24 22:40:21,169:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-24 22:40:21,170:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:41:03 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMpHz5nTr0RdYHVjJHNBW2vvZSJ3LvMElpGWlCgJO42hCw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-24 22:40:21,170:DEBUG:acme.client:Storing nonce: FUnC6kMpHz5nTr0RdYHVjJHNBW2vvZSJ3LvMElpGWlCgJO42hCw 2024-04-24 22:40:21,170:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-04-24 22:40:21,177:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBIejVuVHIwUmRZSFZqSkhOQlcydnZaU0ozTHZNRWxwR1dsQ2dKTzQyaEN3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "HbXSpIqMtwP6THdrD71pI5y7SbXz5rpNAVefayla9V29ixbVFTLdXYSGWbzdqkuU7EC-flg4g4Lvk2XlNxFMwUVqT5nKmcmmH0C5P8o-7TK2n6D0Di0o2wYDuPOI0J-s2JllEDAqwJNbsUnErk4KUmLW94cTsHIZDkgcMS9ZXSwFx6-IgOmBwz5GimfMzJMxAId1cBPNlgQVnT5iacNX14Pg2RSyGQY8sHvAkC_hlUAgXjXVW1wL3Too01qyDJeWV3kBU36Rz1Us3YVnL-mm0Fx-ahzZOb5M59C3Tf8kFe9KRkS88VU-uUswFbvKPkzK0aJM79qPqfPoVXU0ox6Edw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-24 22:40:21,613:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-24 22:40:21,614:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 24 Apr 2024 20:41:03 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786267447 Replay-Nonce: FUnC6kMpz29tRMH6RmL_jKFAKhISpDxC1BEsm-GKZL7pDDPtTTg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:41:03Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591444387" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786267447" } 2024-04-24 22:40:21,614:DEBUG:acme.client:Storing nonce: FUnC6kMpz29tRMH6RmL_jKFAKhISpDxC1BEsm-GKZL7pDDPtTTg 2024-04-24 22:40:21,614:DEBUG:acme.client:JWS payload: b'' 2024-04-24 22:40:21,620:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591444387: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXB6Mjl0Uk1INlJtTF9qS0ZBS2hJU3BEeEMxQkVzbS1HS1pMN3BERFB0VFRnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTE0NDQzODcifQ", "signature": "PfwGffPw6xknvTW8wf-Zz1GVfYg8-HonQmHwW0RsiiziJw8WC7Jtji40qkyw_oD-VgtHew40zjDDaBIPW9b39nG0f7bspqgROuwA-zIpUdPqqJCWQE7tp3udp4JhZdjQRtRD3QXxx8uc6gz8jTSQmELux8FJCBYtgVqn8R3HxHm26_p3_EcXV4dmXVajJto_N4Hg9KLqyrfdPoZEj7KgVMre4Mfp_F-8GMg6qffS-o4xDnBgsoHfCu17B6_bBI6E4hmaSsetWoqbYJ2Sgu8InBxAQuVIHv86OcmrfuJvDYsmQucX4BVT_BM_VvSHqd4BI8ZqbslxKMJpxHQ502ao3g", "payload": "" } 2024-04-24 22:40:21,778:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591444387 HTTP/1.1" 200 805 2024-04-24 22:40:21,778:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:41:03 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMpcK-NtIGiH9MrmbyzfyCaJarqRQ4kxf4Quq9atvLnWxo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:41:03Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591444387/VwZ0tQ", "token": "z8Ul1zMz25vACMWktTfhRv_JHgA52ZiTFMeRSlTIJNg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591444387/OQQw2Q", "token": "z8Ul1zMz25vACMWktTfhRv_JHgA52ZiTFMeRSlTIJNg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591444387/x6ddUg", "token": "z8Ul1zMz25vACMWktTfhRv_JHgA52ZiTFMeRSlTIJNg" } ] } 2024-04-24 22:40:21,778:DEBUG:acme.client:Storing nonce: FUnC6kMpcK-NtIGiH9MrmbyzfyCaJarqRQ4kxf4Quq9atvLnWxo 2024-04-24 22:40:21,779:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-24 22:40:21,779:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-04-24 22:40:21,780:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-24 22:40:21,780:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-24 22:40:21,781:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-24 22:40:21,781:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-24 22:40:21,781:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-24 22:40:21,782:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-24 22:40:21,783:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-24 22:40:21,832:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-24 22:40:22,117:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-24 22:40:22,118:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-04-24 22:40:22,119:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-04-24 22:40:22,124:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:48 UTC. 2024-04-24 22:40:22,124:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-24 22:40:22,124:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-24 22:40:22,128:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-24 22:40:22,128:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-24 22:40:22,128:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-24 22:40:22,134:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-24 22:40:22,135:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-24 22:40:22,137:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-24 22:40:22,584:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-24 22:40:22,584:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:41:04 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "q-mfZWNCi8g": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-24 22:40:22,584:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-24 22:40:27,319:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7882_key-certbot.pem 2024-04-24 22:40:31,902:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7880_csr-certbot.pem 2024-04-24 22:40:31,902:DEBUG:acme.client:Requesting fresh nonce 2024-04-24 22:40:31,902:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-24 22:40:32,077:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-24 22:40:32,077:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:41:13 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyabDJgcUkppxvA4GQjc_f4eqzislIGw211r3dx6g6uJ6Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-24 22:40:32,077:DEBUG:acme.client:Storing nonce: Y89UXNyabDJgcUkppxvA4GQjc_f4eqzislIGw211r3dx6g6uJ6Y 2024-04-24 22:40:32,078:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-04-24 22:40:32,083:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWFiREpnY1VrcHB4dkE0R1FqY19mNGVxemlzbElHdzIxMXIzZHg2ZzZ1SjZZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "xm5yO7D1BLeYTluxOjvqgQ-anhE8kGUIubDMqrDlZp0Y95DTQI9yuxD3NLavxAQvhJyTIOwVD5Lg8KGWym3lAUlc8d_rB4cGC_-VY1NJKPiaULFsZhsaTZO6Xj3f8tkxdG16MJoFsOh7vZw9BdqQWHCrpapogyTyk6U2fCpIdgmO6m2G7CliCNq-kIkqihPKV6C1QG3FThbogE-bRu-dbns6VfOUEQvVf8f3wAjlDgAt9RMvCYOUs6B91sRn3r9nLvd4PTq-Yc3hYHMBamRMHPmfIGY87tC8hWgZZGtaCUK7tqtO_HXG3vo-yc3-5tRa66C-f9lCilWuLip5mfbTMw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-24 22:40:32,394:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-24 22:40:32,395:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 24 Apr 2024 20:41:14 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/263786306657 Replay-Nonce: Y89UXNyaW0y0bYOZ5DDDfpOPE58VQekgEtJ7LpA4bBsQbGt6doQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-05-01T20:41:14Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591499197" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/263786306657" } 2024-04-24 22:40:32,395:DEBUG:acme.client:Storing nonce: Y89UXNyaW0y0bYOZ5DDDfpOPE58VQekgEtJ7LpA4bBsQbGt6doQ 2024-04-24 22:40:32,396:DEBUG:acme.client:JWS payload: b'' 2024-04-24 22:40:32,401:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/342591499197: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWFXMHkwYllPWjVERERmcE9QRTU4VlFla2dFdEo3THBBNGJCc1FiR3Q2ZG9RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNDI1OTE0OTkxOTcifQ", "signature": "nChV9tpOQnHqnDWY1eUL6aOrKPXdnbkuB-f9Fw5TDlHrd5tgoAUT7WI6KPewhxw7kqJKMXAPMO0NV0aAuxi4wBHLYtJMYUnjP500WYT3HLS2ni2hkzVZvgdN-Ba8F_gJ4mpp2fFl3MG3ZO8pyTMKlAP1SgbyDjiDLw9Uq0-QuXTYg7lXtFQfAL11qFkpVGy4eurD35R3CVIyewQ0mZdH4iRVQiIbp-mZLNnVdo4y8g6DbZQAaVZEAloQBnIzF6XSI1fLfWvWZt_zJuWjLTNdkScEOubELCSbp9E_zklTBWmOgwUvjoWNhl1yXZ2TLZnOgjVGzy9uqaYuq_MaREP-Iw", "payload": "" } 2024-04-24 22:40:32,563:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/342591499197 HTTP/1.1" 200 805 2024-04-24 22:40:32,563:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 24 Apr 2024 20:41:14 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMp4D-jNhhtGpSO9Syipb61VBNRAlac3kYxYw2c4nacPUg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-05-01T20:41:14Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591499197/wllBug", "token": "Fd-9sA7qPZwOOCczOUvR-JOGAFcVsaub88OTZRhbpbo" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591499197/l8TEMw", "token": "Fd-9sA7qPZwOOCczOUvR-JOGAFcVsaub88OTZRhbpbo" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/342591499197/3h01xg", "token": "Fd-9sA7qPZwOOCczOUvR-JOGAFcVsaub88OTZRhbpbo" } ] } 2024-04-24 22:40:32,563:DEBUG:acme.client:Storing nonce: FUnC6kMp4D-jNhhtGpSO9Syipb61VBNRAlac3kYxYw2c4nacPUg 2024-04-24 22:40:32,564:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-24 22:40:32,564:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-04-24 22:40:32,565:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-24 22:40:32,565:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-24 22:40:32,566:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-24 22:40:32,566:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-24 22:40:32,566:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-24 22:40:32,566:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-24 22:40:32,568:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-24 22:40:32,568:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-04-24 22:40:32,568:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-04-24 22:40:32,579:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-04-24 22:40:32,581:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)