2024-04-22 21:52:51,361:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-04-22 21:52:51,361:DEBUG:certbot._internal.main:Arguments: [] 2024-04-22 21:52:51,362:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-04-22 21:52:52,526:DEBUG:certbot._internal.log:Root logging level set at 20 2024-04-22 21:52:52,526:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-04-22 21:52:52,572:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-04-22 21:52:52,614:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-22 21:52:52,880:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-22 21:52:52,881:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert9.pem is signed by the certificate's issuer. 2024-04-22 21:52:52,885:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert9.pem is: OCSPCertStatus.GOOD 2024-04-22 21:52:52,893:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:24 UTC. 2024-04-22 21:52:52,893:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-22 21:52:52,894:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-22 21:52:52,899:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-22 21:52:52,899:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-22 21:52:52,899:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-22 21:52:52,905:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-22 21:52:52,907:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-22 21:52:52,909:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-22 21:52:53,446:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-22 21:52:53,447:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:53:36 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "EjFecDkT-8Q": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-22 21:52:53,447:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-22 21:52:58,717:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7818_key-certbot.pem 2024-04-22 21:53:03,618:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7816_csr-certbot.pem 2024-04-22 21:53:03,619:DEBUG:acme.client:Requesting fresh nonce 2024-04-22 21:53:03,619:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-22 21:53:03,777:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-22 21:53:03,778:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:53:47 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9Qjupb_cX_vIe1BJwIcymjnRpHNdgTaBP2Id3OuJzjufcoK8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-22 21:53:03,778:DEBUG:acme.client:Storing nonce: 1Th9Qjupb_cX_vIe1BJwIcymjnRpHNdgTaBP2Id3OuJzjufcoK8 2024-04-22 21:53:03,778:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-04-22 21:53:03,787:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBiX2NYX3ZJZTFCSndJY3ltam5ScEhOZGdUYUJQMklkM091SnpqdWZjb0s4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "SoSVkbeZ8kDiKYOMoaZfWepXa--pPbgoITjEliE0P1gpGappjKaM-qPvR275a5sp4bfOHsJ15Cdhwex4mFl7whk5xQfCKHJCU3fzHpceucJ1XrIuXxdghxN_7m2y3WKuiwIMLrMzWK4HLqZfd9r2N1UCf-I0obC4syosJVUFW0ACyoDjMfAlK9TJBWrTH-4SRa8SBe_Uxm3g7T9MOWvqcZr6SG5x3ZmRc5Om6sS8kLVKi0W8DwENliL57j5q7OHs04H8xwQEz5zsz0qadeKuzEkuKb3VVfZX9GhO0SET3Ehada7D9_JZZ4IKd44Nasz18WiWlxpkwrws2SGW3mH3yg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-22 21:53:03,960:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-04-22 21:53:03,961:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 22 Apr 2024 19:53:47 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602379477 Replay-Nonce: sW-8q43N_CJhtRI1aY6nYGIOXpNXh6NxD3crhi_k7f_UaVXwRSs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:01Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432133867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602379477" } 2024-04-22 21:53:03,961:DEBUG:acme.client:Storing nonce: sW-8q43N_CJhtRI1aY6nYGIOXpNXh6NxD3crhi_k7f_UaVXwRSs 2024-04-22 21:53:03,961:DEBUG:acme.client:JWS payload: b'' 2024-04-22 21:53:03,966:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432133867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M05fQ0podFJJMWFZNm5ZR0lPWHBOWGg2TnhEM2NyaGlfazdmX1VhVlh3UlNzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIxMzM4NjcifQ", "signature": "NEpfsu5y13vrHky31qMQMFrCMfFWWcN_uo6tBNDi9mh24gXnAmxD2HnTcLiEZOEMsHpY1ZkgTALsgzw4qPZ_cs7XWT_ETGEpDh52Yj1ZUPBccVt1HhcPNCUQjTukYJTUE_wvvfFvGqsOS90a4mgibA2eR_pVGTI9Bg0y0_bBZHCJ30AYAHWDB-f4cefMj5bRlbouGvhwxLY-7fPKS1T0cZ-0jFxHdpxRq5P78eJpez1FyFFh75fpqcoonpH6HUbTCRH1FDXePG5JLu1_XddYAFap3FacryMEcLg6VsMoYvCIN77FF4AmgGgWtYSYR8VfiRty5ubsoiIqHCwP7HHePQ", "payload": "" } 2024-04-22 21:53:04,129:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432133867 HTTP/1.1" 200 810 2024-04-22 21:53:04,130:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:53:47 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43NonpiujsLcvol_ug0gTAhf1nRgwIwNrFaYECcX0PifTk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:01Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432133867/bALmag", "token": "K5BL7NCUQz-VErlSqOmjI6HLe61h0mHLoAf5V7HRxcQ" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432133867/gKZ-RA", "token": "K5BL7NCUQz-VErlSqOmjI6HLe61h0mHLoAf5V7HRxcQ" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432133867/BZrX6Q", "token": "K5BL7NCUQz-VErlSqOmjI6HLe61h0mHLoAf5V7HRxcQ" } ] } 2024-04-22 21:53:04,130:DEBUG:acme.client:Storing nonce: sW-8q43NonpiujsLcvol_ug0gTAhf1nRgwIwNrFaYECcX0PifTk 2024-04-22 21:53:04,131:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-22 21:53:04,131:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-04-22 21:53:04,132:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-22 21:53:04,132:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-22 21:53:04,144:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-22 21:53:04,145:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-22 21:53:04,145:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-22 21:53:04,145:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-22 21:53:04,151:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-22 21:53:04,191:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-22 21:53:04,445:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-22 21:53:04,446:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-22 21:53:04,447:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-22 21:53:04,452:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:42 UTC. 2024-04-22 21:53:04,452:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-22 21:53:04,452:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-22 21:53:04,457:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-22 21:53:04,457:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-22 21:53:04,458:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-22 21:53:04,470:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-22 21:53:04,471:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-22 21:53:04,473:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-22 21:53:04,949:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-22 21:53:04,950:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:53:48 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "AueEqJH6gwE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-22 21:53:04,951:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-22 21:53:10,071:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7819_key-certbot.pem 2024-04-22 21:53:14,715:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7817_csr-certbot.pem 2024-04-22 21:53:14,716:DEBUG:acme.client:Requesting fresh nonce 2024-04-22 21:53:14,716:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-22 21:53:14,879:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-22 21:53:14,879:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:53:58 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43NOYUhAAYz_fLGB5WVUrJBeBjvfez0wEn6SVZaR1SYZA4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-22 21:53:14,879:DEBUG:acme.client:Storing nonce: sW-8q43NOYUhAAYz_fLGB5WVUrJBeBjvfez0wEn6SVZaR1SYZA4 2024-04-22 21:53:14,880:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-04-22 21:53:14,885:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M05PWVVoQUFZel9mTEdCNVdWVXJKQmVCanZmZXowd0VuNlNWWmFSMVNZWkE0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "xfsgE-LBCVTbMZVexUtVx7Z03C8UuemPSZl3aNB3CZdYUu295U6UnA0CFLXTi60Wr2xGfH9rDZNM28lE6Ruoi-QZ7hF64GAok_V46tm2T5RF_nWpJzZ_zaoTUQE9vA4phXjhZ3hLQHZRf-yguvjNEeeyQZGteUhUJ2AzX7t9B9fFt6H57OXEWxDAaByjkkB51yFABCPFRTQscgRrL0UBPzXuLNLepL5XZlcW9XuvdffCICs3Lx6NaaRy1JNttpythEIFH8Yx7QCMGzzdis6UdB5rXRIew-KvaYPNJ2GTMhAlXiaZCY1TFXJZ6GOpuime5NojV4aYoLLSVGlLRLmbNw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-22 21:53:15,058:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-04-22 21:53:15,058:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 22 Apr 2024 19:53:58 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602436727 Replay-Nonce: sW-8q43NiNhkkL2gWrpOcZaNiY4CiJjCGPHF7lOAfxugxsf1mT8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:11Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432206077" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602436727" } 2024-04-22 21:53:15,059:DEBUG:acme.client:Storing nonce: sW-8q43NiNhkkL2gWrpOcZaNiY4CiJjCGPHF7lOAfxugxsf1mT8 2024-04-22 21:53:15,059:DEBUG:acme.client:JWS payload: b'' 2024-04-22 21:53:15,064:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432206077: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M05pTmhra0wyZ1dycE9jWmFOaVk0Q2lKakNHUEhGN2xPQWZ4dWd4c2YxbVQ4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIyMDYwNzcifQ", "signature": "Kyf15L8YQ5qGyzg10hhAo17PORgS6eu4nnDww-SML-bLvA3gSah5NXzbkqCqcW00IoEW7QplQt161l-AJsLSqeY1R-G54cnTXKH__8nAArG1PGsODBBHX3V8SyZCZZlsnBMg7hbXNTc0aprDW0DcLZyXl0tY_aCqzV8KkQviUZ7USKLlyBhv9Jc0H6s0UI8Hac9tXX9u-PsAyTkTymFIVq_3y3-HVJdCBgI1Fz861rni1Poxl-MHx0EwtcfFZK7l13uh1XI5rjFQWdMvqHEPJnYHrVoEBT4tLmmturAT5PSGF4TdwF5V3TgnOhAv3BvOSfJZWckb-7szpzP6Jc992A", "payload": "" } 2024-04-22 21:53:15,227:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432206077 HTTP/1.1" 200 804 2024-04-22 21:53:15,227:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:53:58 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9QjupduVD-E_hEYG8TaWIOtc5b_hLgBM83Nsi37oeMQDbeDE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:11Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432206077/OpeY4Q", "token": "X4bQwYTZ4W5JqVqboZqq5o8SNpfHBgyfHNBkYg8eWNo" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432206077/WcE4Tg", "token": "X4bQwYTZ4W5JqVqboZqq5o8SNpfHBgyfHNBkYg8eWNo" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432206077/Seqm7Q", "token": "X4bQwYTZ4W5JqVqboZqq5o8SNpfHBgyfHNBkYg8eWNo" } ] } 2024-04-22 21:53:15,228:DEBUG:acme.client:Storing nonce: 1Th9QjupduVD-E_hEYG8TaWIOtc5b_hLgBM83Nsi37oeMQDbeDE 2024-04-22 21:53:15,228:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-22 21:53:15,229:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-04-22 21:53:15,229:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-22 21:53:15,229:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-22 21:53:15,230:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-22 21:53:15,230:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-22 21:53:15,231:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-22 21:53:15,231:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-22 21:53:15,232:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-22 21:53:15,283:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-22 21:53:15,568:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-22 21:53:15,569:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-04-22 21:53:15,570:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-04-22 21:53:15,575:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:56 UTC. 2024-04-22 21:53:15,575:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-22 21:53:15,575:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-22 21:53:15,580:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-22 21:53:15,580:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-22 21:53:15,580:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-22 21:53:15,586:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-22 21:53:15,587:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-22 21:53:15,588:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-22 21:53:16,053:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-22 21:53:16,053:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:53:59 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "wziA0RySpAc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-04-22 21:53:16,054:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-22 21:53:21,074:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7820_key-certbot.pem 2024-04-22 21:53:25,765:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7818_csr-certbot.pem 2024-04-22 21:53:25,766:DEBUG:acme.client:Requesting fresh nonce 2024-04-22 21:53:25,766:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-22 21:53:25,925:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-22 21:53:25,925:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:54:09 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9QjupEKo6ZT4R44rEXitilbTSa4bXyvBMyKtl6xud5dSIb-w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-22 21:53:25,926:DEBUG:acme.client:Storing nonce: 1Th9QjupEKo6ZT4R44rEXitilbTSa4bXyvBMyKtl6xud5dSIb-w 2024-04-22 21:53:25,926:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-04-22 21:53:25,932:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBFS282WlQ0UjQ0ckVYaXRpbGJUU2E0Ylh5dkJNeUt0bDZ4dWQ1ZFNJYi13IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "pQJVRAimQorNP7moLeNlm_e-1yptsc2H7SiiC7Fg_bv_VmNxhepdSHb3BxBEXuBdYBO5DEsrMPptC86ejB1oVwglpcUlunEp-h9EAUoCIqdCbwm1TnCnqe5VRhyYIMqEUIZ5r6pTacuFSaBx6DzW19fu6ukERhII2rBGQKWUuaJzwSfI9q9kzrEMeQ2txaoV5Or7LJ64vRbGv43a4W2nqcH_BnQcIrqQsIIjKEzEi2IxpruprDyx3v_RFZpRXtcdvWzxhtI_owphxcSup478PMAmdV7p0fxcEYzga1f9l-43qGgQf2m_OH8VOBF73hk0wvJRcRGAMxfQ17HdJamm3w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-22 21:53:26,099:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-04-22 21:53:26,099:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 22 Apr 2024 19:54:09 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602470407 Replay-Nonce: sW-8q43N8sJ4FgSUAYn_D8_Mw2Il3U2WcM1IUgD1Fp7P6aAN8vo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:20Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432255557" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602470407" } 2024-04-22 21:53:26,100:DEBUG:acme.client:Storing nonce: sW-8q43N8sJ4FgSUAYn_D8_Mw2Il3U2WcM1IUgD1Fp7P6aAN8vo 2024-04-22 21:53:26,100:DEBUG:acme.client:JWS payload: b'' 2024-04-22 21:53:26,106:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432255557: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M044c0o0RmdTVUFZbl9EOF9NdzJJbDNVMldjTTFJVWdEMUZwN1A2YUFOOHZvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIyNTU1NTcifQ", "signature": "QVcsg5RD6G1M2FDzaJtXvklGY3nktRZQ2zz3xpJLa0Ha7i6N10AmktnJt3eu2V5Dnw2ZefRT23L9yVBNqKvox-qXhpzITEjk3geS6v0hT-ljoP-sQNkfEZElVWjg7TQZ4_Vbh7RNxgiQCuCOvYr7MoU_gJjfdyxbRfArPfYclPMFeOUgxC0I5Ky3PEMmISI-MzJpJtksNW3VnQBckylvck9rBIncg-ye73lGp2sD9Enreg3Iw6mwcoU2PpI8WkJcrxaQxo2tMbfu5Yw8zkHPSozpIfPhjMA69zHKeg8aDrGjTrGoWecQul0QHmBK_IdpRIaFqn1dxvxYfZQwBnWF5g", "payload": "" } 2024-04-22 21:53:26,266:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432255557 HTTP/1.1" 200 807 2024-04-22 21:53:26,268:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:54:09 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9Qjup0y6BSksbHR0-Jp52VbTJWCE6R7eLPLG0SVa0V2ml1H4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:20Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432255557/ipHR3w", "token": "4ALo7VXKOBw9xqOcrY3miutsXnJQ4sVo7evhXW1kyPg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432255557/pey6Vw", "token": "4ALo7VXKOBw9xqOcrY3miutsXnJQ4sVo7evhXW1kyPg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432255557/af6Vwg", "token": "4ALo7VXKOBw9xqOcrY3miutsXnJQ4sVo7evhXW1kyPg" } ] } 2024-04-22 21:53:26,268:DEBUG:acme.client:Storing nonce: 1Th9Qjup0y6BSksbHR0-Jp52VbTJWCE6R7eLPLG0SVa0V2ml1H4 2024-04-22 21:53:26,269:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-22 21:53:26,270:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-04-22 21:53:26,271:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-22 21:53:26,271:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-22 21:53:26,273:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-22 21:53:26,273:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-22 21:53:26,273:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-22 21:53:26,274:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-22 21:53:26,276:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-22 21:53:26,319:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-22 21:53:26,448:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-22 21:53:26,449:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-22 21:53:26,450:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-22 21:53:26,454:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:14 UTC. 2024-04-22 21:53:26,455:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-22 21:53:26,455:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-22 21:53:26,459:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-22 21:53:26,459:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-22 21:53:26,459:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-22 21:53:26,464:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-22 21:53:26,465:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-22 21:53:26,467:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-22 21:53:26,947:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-22 21:53:26,947:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:54:10 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "ic2uTHsH3Gk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-22 21:53:26,948:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-22 21:53:32,332:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7821_key-certbot.pem 2024-04-22 21:53:36,884:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7819_csr-certbot.pem 2024-04-22 21:53:36,884:DEBUG:acme.client:Requesting fresh nonce 2024-04-22 21:53:36,885:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-22 21:53:37,044:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-22 21:53:37,045:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:54:20 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9QjupBlDBzLPhPdQ3zrkdOxh79tO_4cFJQrfy-1XGXd-a3og X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-22 21:53:37,045:DEBUG:acme.client:Storing nonce: 1Th9QjupBlDBzLPhPdQ3zrkdOxh79tO_4cFJQrfy-1XGXd-a3og 2024-04-22 21:53:37,046:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-04-22 21:53:37,050:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBCbERCekxQaFBkUTN6cmtkT3hoNzl0T180Y0ZKUXJmeS0xWEdYZC1hM29nIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "LY1n4U7fK6XVdnfKDq-9oU_DG47VYeCCgNLmgHz6tBPa4aQw_hyKcB9F98oTmQSOaNv-yKsBMV5tBWPMaa6qlplk7sd4X7N6uzwIuJ6HNaot7hPwSienJsYY5MmLNyG1PkO0dRkxrV9n2TyAaWrkZ28eqGr7EGoA6wcCy7k82O9e8TD3E3SiIZMrGmUWmp2Z5C9em6fppl1zMkyfJzPtaYc3caUbmCmSkFxRql3lbCITcTMG-RnydsLDzCzb_rWpcfa-cJ5fjwZF7ngCnBFN-T6adxv5-WR5YBkOZID8G64em0JxX9S9s2MRU978KEDmEr88M2w--Kz3B1LZry-7JA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-22 21:53:37,225:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-04-22 21:53:37,226:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 22 Apr 2024 19:54:20 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602501577 Replay-Nonce: sW-8q43NPqBvi_cbcK611vfQd-SLaSRJdeImPdKMpDTveM_9B1Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:29Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432301817" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602501577" } 2024-04-22 21:53:37,226:DEBUG:acme.client:Storing nonce: sW-8q43NPqBvi_cbcK611vfQd-SLaSRJdeImPdKMpDTveM_9B1Q 2024-04-22 21:53:37,226:DEBUG:acme.client:JWS payload: b'' 2024-04-22 21:53:37,232:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432301817: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M05QcUJ2aV9jYmNLNjExdmZRZC1TTGFTUkpkZUltUGRLTXBEVHZlTV85QjFRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIzMDE4MTcifQ", "signature": "cqoYbxKjPmM0uw8gyuDD-bLb3WJLnzIi9F61tsMVNzKdj7IQMCDy7nlPCWaZwJI8yk17ZLC4q4wgyVBisCTx0awU7GVdlzdA9xUR7-ZRaUe-RTtJtG-4TZEtUV_AEGtp1xactK57vTWXhlxcItkR0NnAOAyIqnzw_Dzl3RRNzT1-RskuadXfwelbMiehcrJ4ZyqIKij-UuouKCgkRO42WQiD2StuRG-wJ3g4aisbRY9JKbDdbc-sqFYkYS9Q4xM6pz-e3pwBhLdCZs5ja-BF-pZrreqIB6-W_E_JN4Mv7VeixqbfRB3BLrhjz1r1pPeJQFN1qBIBMEqzmP6BMkMe5Q", "payload": "" } 2024-04-22 21:53:37,407:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432301817 HTTP/1.1" 200 801 2024-04-22 21:53:37,408:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:54:20 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43NFrG5W7i94RB_jNPKDrQVuWQHyy90pnCQn3yROWB1ALk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:29Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432301817/KUsjpA", "token": "aJoctLqucZb2n7qPJSTGLKpqSvnhh5SD51cTgx2saDg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432301817/GSkFsw", "token": "aJoctLqucZb2n7qPJSTGLKpqSvnhh5SD51cTgx2saDg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432301817/hKNbdQ", "token": "aJoctLqucZb2n7qPJSTGLKpqSvnhh5SD51cTgx2saDg" } ] } 2024-04-22 21:53:37,408:DEBUG:acme.client:Storing nonce: sW-8q43NFrG5W7i94RB_jNPKDrQVuWQHyy90pnCQn3yROWB1ALk 2024-04-22 21:53:37,408:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-22 21:53:37,409:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-04-22 21:53:37,409:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-22 21:53:37,409:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-22 21:53:37,410:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-22 21:53:37,410:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-22 21:53:37,410:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-22 21:53:37,411:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-22 21:53:37,412:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-22 21:53:37,457:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-22 21:53:37,732:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-22 21:53:37,734:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-22 21:53:37,734:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-22 21:53:37,739:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:32 UTC. 2024-04-22 21:53:37,739:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-22 21:53:37,739:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-22 21:53:37,745:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-22 21:53:37,745:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-22 21:53:37,746:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-22 21:53:37,750:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-22 21:53:37,751:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-22 21:53:37,753:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-22 21:53:38,196:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-22 21:53:38,196:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:54:21 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "akD4m-9GEMI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-22 21:53:38,197:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-22 21:53:42,901:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7822_key-certbot.pem 2024-04-22 21:53:47,431:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7820_csr-certbot.pem 2024-04-22 21:53:47,431:DEBUG:acme.client:Requesting fresh nonce 2024-04-22 21:53:47,431:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-22 21:53:47,581:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-22 21:53:47,581:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:54:31 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMpFQjJR4c_nOpmDK-KmfRot0b0E8ZWWNfEEMNH0zBdxzU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-22 21:53:47,582:DEBUG:acme.client:Storing nonce: FUnC6kMpFQjJR4c_nOpmDK-KmfRot0b0E8ZWWNfEEMNH0zBdxzU 2024-04-22 21:53:47,582:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-04-22 21:53:47,588:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBGUWpKUjRjX25PcG1ESy1LbWZSb3QwYjBFOFpXV05mRUVNTkgwekJkeHpVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "OR2zkTQ7TqqEXT_XBP9wBVen9n5u_5mdRJzDYKgCLrgFicriqBlM-_rVCbLD4OGgGmgbKewwiqGLtjYNXFabaqavivWhI1-Avq_F_Sihyqcrp83TrHVmBxMkiei52x8frjVw25-TXLHKo6_2I34vZKKCPM4sluLIxgrMh7vxlVoZoh2gi5e03OzwFzCbLfTUM1rt8HZDxwQu8BaIKE1hjbKvB-KQEhrKQQAaTEplXHdl9xDNqpxpy3LGVtJkxg1p74akc_w56wEmCGlj8PQi3OJ3iKGJCm_xooaAYrQmsH_yrSLOxbF9Ll_AK_i2H6y_bT0T1WA5wBtOnbW7MVRfVQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-22 21:53:47,753:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-22 21:53:47,754:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 22 Apr 2024 19:54:31 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602530997 Replay-Nonce: FUnC6kMpsDf1S5TfRVD6VP6taIBb5ILpii1Gw8xSy3V4ZzZyYD4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:39Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432345127" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602530997" } 2024-04-22 21:53:47,754:DEBUG:acme.client:Storing nonce: FUnC6kMpsDf1S5TfRVD6VP6taIBb5ILpii1Gw8xSy3V4ZzZyYD4 2024-04-22 21:53:47,754:DEBUG:acme.client:JWS payload: b'' 2024-04-22 21:53:47,760:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432345127: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBzRGYxUzVUZlJWRDZWUDZ0YUlCYjVJTHBpaTFHdzh4U3kzVjRaelp5WUQ0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIzNDUxMjcifQ", "signature": "ckR4bMtAS8l0XX2HT6V590LZ7K2JsLVuRbOvmQW2L507QzWKG2HoMaDID9lp2tcCVyTwtFeTIbohCm3gpRsg7CqcYnmDLRuMNpfO9ucL6I7GixFuN4Q_CnKca39AABvzjsr1-3pmL9HN3hSV4QOck_vHCgcPvopuXJ-zEsJ1-PlpbaSsha0-55LnPz2IflrwLfEuf1BOrIkTfMeKX3FV-K60CrePkl0MsHYhdCTXILaOfJplDVDCYF5i8lh3xw3T9wB2SNEAs4qSbUXUmlXXI6RdNIHUof1TYTvQ0fVqQ_hBfqgNtCoO_vC0PRLPNQlfxWkFwPPXJTil8r30ZzJtmg", "payload": "" } 2024-04-22 21:53:47,911:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432345127 HTTP/1.1" 200 805 2024-04-22 21:53:47,912:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:54:31 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMpEcZVZznAeQfHZuGYJ14To4wBXt2LVOT-_Z30ASGUwj8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:39Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432345127/eBWc1Q", "token": "5UyKevrNT1gWHZXzXEnwqj5-0dF5Nn0eSvRut9pDKLs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432345127/m8stTw", "token": "5UyKevrNT1gWHZXzXEnwqj5-0dF5Nn0eSvRut9pDKLs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432345127/bNUYKA", "token": "5UyKevrNT1gWHZXzXEnwqj5-0dF5Nn0eSvRut9pDKLs" } ] } 2024-04-22 21:53:47,912:DEBUG:acme.client:Storing nonce: FUnC6kMpEcZVZznAeQfHZuGYJ14To4wBXt2LVOT-_Z30ASGUwj8 2024-04-22 21:53:47,913:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-22 21:53:47,913:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-04-22 21:53:47,913:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-22 21:53:47,914:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-22 21:53:47,914:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-22 21:53:47,914:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-22 21:53:47,915:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-22 21:53:47,915:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-22 21:53:47,916:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-22 21:53:47,966:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-22 21:53:48,265:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-22 21:53:48,266:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-04-22 21:53:48,266:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-04-22 21:53:48,271:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:48 UTC. 2024-04-22 21:53:48,271:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-22 21:53:48,272:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-22 21:53:48,275:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-22 21:53:48,276:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-22 21:53:48,276:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-22 21:53:48,281:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-22 21:53:48,282:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-22 21:53:48,284:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-22 21:53:48,715:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-22 21:53:48,715:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:54:32 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "NAAfm0n1P-g": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-22 21:53:48,716:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-22 21:53:53,577:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7823_key-certbot.pem 2024-04-22 21:53:58,149:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7821_csr-certbot.pem 2024-04-22 21:53:58,150:DEBUG:acme.client:Requesting fresh nonce 2024-04-22 21:53:58,150:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-22 21:53:58,303:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-22 21:53:58,304:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:54:41 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMpbslb7yIX0jM-4-WbrnuHBEV7qf55rK4G5wXdeY_UsN4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-22 21:53:58,304:DEBUG:acme.client:Storing nonce: FUnC6kMpbslb7yIX0jM-4-WbrnuHBEV7qf55rK4G5wXdeY_UsN4 2024-04-22 21:53:58,304:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-04-22 21:53:58,310:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBic2xiN3lJWDBqTS00LVdicm51SEJFVjdxZjU1cks0RzV3WGRlWV9Vc040IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "vpyzBWEqoZzBCONMn-rum_2dc39D3-LUlgY7OfNLPfSiVQqe1fzGmBEdJSBOXntFO1_BEzxN5ATM6QQobzzGiC-FjH3Qf3E20yBlKlu5durkQieN85iAuejxVnDp3tby2Dme2iobGXPkVZAEL0RhnVvfU_AaRBCD2WAwPoA5QkZq0xokNCWmjbGcuxhs50wYfZehwEUUc5zRQZ7X3UctiKyzIJftpeOdAIYu3LthCZ2X4vAN0VbAHyd6mJZcMFkz1UC4-L2rGpU062pQ6XLdkHtbsz6tRyG5M70uJKY3YQjzw2DmGZ6HKG8Nv2CIGv_B9AVqMvgrEKpB4kd-r0CR9Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-04-22 21:53:58,475:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-04-22 21:53:58,476:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 22 Apr 2024 19:54:42 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602558537 Replay-Nonce: FUnC6kMps_jBxq4vVmqlOjX4_EyJy_GqZzyN0PvyTwxoduHzwm4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:48Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432384097" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602558537" } 2024-04-22 21:53:58,476:DEBUG:acme.client:Storing nonce: FUnC6kMps_jBxq4vVmqlOjX4_EyJy_GqZzyN0PvyTwxoduHzwm4 2024-04-22 21:53:58,476:DEBUG:acme.client:JWS payload: b'' 2024-04-22 21:53:58,482:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432384097: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBzX2pCeHE0dlZtcWxPalg0X0V5SnlfR3FaenlOMFB2eVR3eG9kdUh6d200IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIzODQwOTcifQ", "signature": "RlWWgxf5yZtwT2axdaPTLhwQ9KujKebqvOS9klE9nl4ynJcGoEtaAQ8pgInT0bqzAzPTbew8qY3ze5EA9UfeCtvdB6uKaHTOTc_daA4hshll_NAmtJkilIrL4SpfClNvvJ_Mgg3YjVwZeKzRTA7vYBtXG7tfIh3Ph26WNW-Uv1llBJ0b9OICDBUQxxPt84DJZWxO3HE2drRazTvNopHz8nroAQZx_BRjdPZCP5NWtzmPKY39BU71QDpPQ6rSEgpJwVkVJbln58jAYo9CdtDpn5U6Ut7h8Rqxq38NGk4DS2H2-aqD0OTLQCr_2BG5X-RBvWDAGg7tq81A7Tiw2c5J_Q", "payload": "" } 2024-04-22 21:53:58,661:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432384097 HTTP/1.1" 200 809 2024-04-22 21:53:58,662:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:54:42 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyavBniH4dXZfF4zUG8A_1618NoYBzC9OEBT5wXbw9PMDc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:48Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432384097/oy60bw", "token": "KdhtE0Xta-NlGc-BLHiR0CXHzhbLLW5SC-IuRAbvcm8" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432384097/_4L04g", "token": "KdhtE0Xta-NlGc-BLHiR0CXHzhbLLW5SC-IuRAbvcm8" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432384097/r2alHg", "token": "KdhtE0Xta-NlGc-BLHiR0CXHzhbLLW5SC-IuRAbvcm8" } ] } 2024-04-22 21:53:58,662:DEBUG:acme.client:Storing nonce: Y89UXNyavBniH4dXZfF4zUG8A_1618NoYBzC9OEBT5wXbw9PMDc 2024-04-22 21:53:58,662:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-22 21:53:58,663:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-04-22 21:53:58,663:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-22 21:53:58,663:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-22 21:53:58,664:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-22 21:53:58,664:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-22 21:53:58,664:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-22 21:53:58,665:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-22 21:53:58,666:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-22 21:53:58,721:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-22 21:53:58,967:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-22 21:53:58,968:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-22 21:53:58,968:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-22 21:53:58,973:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:06 UTC. 2024-04-22 21:53:58,973:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-22 21:53:58,973:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-22 21:53:58,978:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-22 21:53:58,978:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-22 21:53:58,978:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-22 21:53:58,994:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-22 21:53:58,994:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-22 21:53:58,996:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-22 21:53:59,476:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-22 21:53:59,477:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:54:43 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "g3QcHP1HgG8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-22 21:53:59,477:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-22 21:54:04,240:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7824_key-certbot.pem 2024-04-22 21:54:08,709:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7822_csr-certbot.pem 2024-04-22 21:54:08,709:DEBUG:acme.client:Requesting fresh nonce 2024-04-22 21:54:08,709:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-22 21:54:08,868:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-22 21:54:08,869:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:54:52 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43N-ZGxtLxQpHM5PZV67Qhlzd5WMacZJg71NzJvUIi0AyY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-22 21:54:08,869:DEBUG:acme.client:Storing nonce: sW-8q43N-ZGxtLxQpHM5PZV67Qhlzd5WMacZJg71NzJvUIi0AyY 2024-04-22 21:54:08,870:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-04-22 21:54:08,876:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M04tWkd4dEx4UXBITTVQWlY2N1FobHpkNVdNYWNaSmc3MU56SnZVSWkwQXlZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "PLzq0tkJSIrgjwDkxuGLRYU3zoTqn0UBga6MvHAZ75DzA4R4ZxIRrCnYggSa8h-pBLnMxL36SSWn0Uur8qi-0_rMcm5sulzRo8gdgZLV2RM4Iom6WimefcR9-KYJ_uIeEm3rqcJu2GbuaNDkslufIjNTl_F17lmMgLmyjplt7kEbWGX9QIrhO3-uwTrYLKYV3TKH85qCQ3tK9Xcj7Z96uyr-_UL1FllUy5xWV7tOw-FSAT4X9Y7Asr9eSEhE8QdACNRECk4AqgeN6X1NrQvfKAoNCNPdtZznMP1LdtGg4AufPeNlTJ7hqJ1eMQ1wMEe5_Gocb3cVf2rjxmQ2QGcWnQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-04-22 21:54:09,046:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-04-22 21:54:09,047:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 22 Apr 2024 19:54:52 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602586927 Replay-Nonce: sW-8q43NyHPfIMOVs9zGOGqyT37IUfDMomQchI-INjrBRHH_R2k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:58Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432423627" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602586927" } 2024-04-22 21:54:09,047:DEBUG:acme.client:Storing nonce: sW-8q43NyHPfIMOVs9zGOGqyT37IUfDMomQchI-INjrBRHH_R2k 2024-04-22 21:54:09,047:DEBUG:acme.client:JWS payload: b'' 2024-04-22 21:54:09,053:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432423627: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M055SFBmSU1PVnM5ekdPR3F5VDM3SVVmRE1vbVFjaEktSU5qckJSSEhfUjJrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI0MjM2MjcifQ", "signature": "B9hkx1uUES0OX5OGDRklcZUHUxgwIE5zVl17CNw5_uv30qeqGFwRfyUOguend4CxzsvSfzRGx_QyU31J2gvFP4YEyRH_j1_1LAFVo5CInPmyR99vuBYjWl28rZ6I7_hlEe_04c83CaYw6svkK_38oQP7HU52ctJ4zLRm0Rn_dCEmJGSXPT7qWkA-7607E-EkjTHT7Gz4XrxsI-Jtcu0SDqndYxRNsvhzYGIbi8SFUQEcr5gkymuYI4ptEXlnfzlcWYTM1xmwe7-GFDwL3vkWK6M5hcFB7VU1aRXNLciL33IG1Szs0kSF6FwlEx9WIHqs0ywRUTZtlOaZz1VWjSU-tA", "payload": "" } 2024-04-22 21:54:09,215:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432423627 HTTP/1.1" 200 806 2024-04-22 21:54:09,215:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:54:52 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43N4KR1z76670RfjJggNrjQk7lLWWXqZqEIbRzHHO9Ib44 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:58Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432423627/-JWQ0A", "token": "FtGkmJLV6hVEahLLQUvN4xbgvT0vMtoyMkbghQ-HtEA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432423627/YJ2jiA", "token": "FtGkmJLV6hVEahLLQUvN4xbgvT0vMtoyMkbghQ-HtEA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432423627/r6TG8Q", "token": "FtGkmJLV6hVEahLLQUvN4xbgvT0vMtoyMkbghQ-HtEA" } ] } 2024-04-22 21:54:09,215:DEBUG:acme.client:Storing nonce: sW-8q43N4KR1z76670RfjJggNrjQk7lLWWXqZqEIbRzHHO9Ib44 2024-04-22 21:54:09,216:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-22 21:54:09,216:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-04-22 21:54:09,217:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-22 21:54:09,217:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-22 21:54:09,218:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-22 21:54:09,218:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-22 21:54:09,218:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-22 21:54:09,219:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-22 21:54:09,220:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-22 21:54:09,269:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-04-22 21:54:09,269:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-22 21:54:09,269:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-04-22 21:54:09,277:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-04-22 21:54:09,280:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-04-22 21:54:09,280:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-04-22 21:54:09,280:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-04-22 21:54:09,280:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-04-22 21:54:09,282:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-04-22 21:54:09,323:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-22 21:54:09,582:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-22 21:54:09,584:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-22 21:54:09,584:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-22 21:54:09,589:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:23 UTC. 2024-04-22 21:54:09,589:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-22 21:54:09,590:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-22 21:54:09,595:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-22 21:54:09,595:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-22 21:54:09,595:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-22 21:54:09,610:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-22 21:54:09,611:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-22 21:54:09,613:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-22 21:54:10,086:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-22 21:54:10,087:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:54:53 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "O9ZlS9CNxsc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-22 21:54:10,088:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-22 21:54:14,790:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7825_key-certbot.pem 2024-04-22 21:54:19,301:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7823_csr-certbot.pem 2024-04-22 21:54:19,302:DEBUG:acme.client:Requesting fresh nonce 2024-04-22 21:54:19,302:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-22 21:54:19,461:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-22 21:54:19,462:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:55:03 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9QjupzRFcxQnGn45NtZA3fTDLls9SGD7oMhHazyrq-_YvBj8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-22 21:54:19,462:DEBUG:acme.client:Storing nonce: 1Th9QjupzRFcxQnGn45NtZA3fTDLls9SGD7oMhHazyrq-_YvBj8 2024-04-22 21:54:19,462:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-04-22 21:54:19,467:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXB6UkZjeFFuR240NU50WkEzZlRETGxzOVNHRDdvTWhIYXp5cnEtX1l2Qmo4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "NoH-O9Fo6fbyILrxtCHQae63K0Lx9SsUgOOkte1o3Lq7a_Pqmcu8tOr5DBdaxMxwV7RmkaTvB5FOSME2N9Ad28xm6_7NHC1kflW_y5rXSWCbnZBXx5EsuzxDW9QgBEXelOKmdXjNBTjXaVNmGIWoskZck5xRI5jvqLXoklN43EEkVoKk-r3IhQsYLK9bNK-25yEAQ4UNzuoDFR2WQJy1vrgzjhN7U9_SzC29Y7yLoKpqeHQ-WC6eJgZu2PoTmoEqFeDlO67X-RCiAsfGYxj-bIoNwoKlNUaULyC7By-KseWCDveCw8G2qv9PE8C1ZdEMbOsWJ49UffuoD-yULvfK4w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-22 21:54:19,638:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-04-22 21:54:19,639:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 22 Apr 2024 19:55:03 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602629937 Replay-Nonce: 1Th9Qjupgx0nLfCrnLgRMCCY2AYwvGb1ocvYBg84dNriEn-0rck X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:16:07Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432480227" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602629937" } 2024-04-22 21:54:19,639:DEBUG:acme.client:Storing nonce: 1Th9Qjupgx0nLfCrnLgRMCCY2AYwvGb1ocvYBg84dNriEn-0rck 2024-04-22 21:54:19,639:DEBUG:acme.client:JWS payload: b'' 2024-04-22 21:54:19,645:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432480227: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBneDBuTGZDcm5MZ1JNQ0NZMkFZd3ZHYjFvY3ZZQmc4NGROcmlFbi0wcmNrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI0ODAyMjcifQ", "signature": "QM_4Z7G49h42q3-Iud1kDZ-hDwmj_WEb2k7iSI7fM1GOAAsBIEEpClvlRWRLZXEdPNiHYausygB4UBQ5wIOPF8SHBc-1PkXqAHXmoqsEgmQiTKeNwgrn5gAf3b1ZNms1rEulEsRoAXmrzYQWgaZqo4uOlspr8hyO_vWwQ6F7xuCWyww0poCycIValvtweEOkEeJIaL5d7IuZy9_pZaLJPlTweJmRkjlnrVqvTBDGSGoJ6rWubOKOFiYnGuaeplS_VX0Ul_CAZrPGZk4MkBIK55q8yryuR9w28uP_NxYL2zoHRrnFIAUl6unQtvuOUEn1ndZyt1hYVqWi7BLW5eIFJw", "payload": "" } 2024-04-22 21:54:19,808:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432480227 HTTP/1.1" 200 811 2024-04-22 21:54:19,809:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:55:03 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9Qjuplb_I7QH76JsLWGzEa0eJ9jM5I0UQ2LrOY58ORHdTF68 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:16:07Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432480227/1ONL0g", "token": "ITCDO08nCvNE1DIOCRls7iq_D7UJHrIPtfdyCmW-Hto" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432480227/E9W28w", "token": "ITCDO08nCvNE1DIOCRls7iq_D7UJHrIPtfdyCmW-Hto" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432480227/K6R9wQ", "token": "ITCDO08nCvNE1DIOCRls7iq_D7UJHrIPtfdyCmW-Hto" } ] } 2024-04-22 21:54:19,809:DEBUG:acme.client:Storing nonce: 1Th9Qjuplb_I7QH76JsLWGzEa0eJ9jM5I0UQ2LrOY58ORHdTF68 2024-04-22 21:54:19,809:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-22 21:54:19,810:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-04-22 21:54:19,810:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-22 21:54:19,811:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-22 21:54:19,811:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-22 21:54:19,811:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-22 21:54:19,812:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-22 21:54:19,812:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-22 21:54:19,813:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-22 21:54:19,888:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-22 21:54:20,172:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-22 21:54:20,174:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-22 21:54:20,175:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-22 21:54:20,179:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:41 UTC. 2024-04-22 21:54:20,180:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-22 21:54:20,180:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-22 21:54:20,185:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-22 21:54:20,185:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-22 21:54:20,185:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-22 21:54:20,189:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-22 21:54:20,190:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-22 21:54:20,192:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-22 21:54:20,633:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-22 21:54:20,634:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:55:04 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "fiMx8MjffJ4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-22 21:54:20,635:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-22 21:54:25,466:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7826_key-certbot.pem 2024-04-22 21:54:29,736:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7824_csr-certbot.pem 2024-04-22 21:54:29,736:DEBUG:acme.client:Requesting fresh nonce 2024-04-22 21:54:29,736:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-22 21:54:29,885:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-22 21:54:29,886:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:55:13 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMp2rKsFT0twbOHGNIeGgsw4UHF-h9OvvPzkjqHH_BYaQY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-22 21:54:29,886:DEBUG:acme.client:Storing nonce: FUnC6kMp2rKsFT0twbOHGNIeGgsw4UHF-h9OvvPzkjqHH_BYaQY 2024-04-22 21:54:29,890:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-04-22 21:54:29,896:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXAycktzRlQwdHdiT0hHTkllR2dzdzRVSEYtaDlPdnZQemtqcUhIX0JZYVFZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "KatqoWmXeTao32Hi_Hv2IYud37pJ2CPSJJXz3hsJwyh45X7venuFAtGPwDT9cSnTJu7QZoLzdDXrb5k2A9XR1gsOtZxCG0k48r24WWBn465cjwJvXu5E0XkI8tCshs9DrsctG4DOcuknTQFNbBnk5x_6cVEdbzd4PpWgIWkI1YZajUKYeRgIpoMwb6P6NryLuk4-OpL2HymVVDGKu8N0yrgZxd7FWE29xF1H8i1Ah5n8UE8pxGVhVCtCe9ynYl___KdbDLMIm4kDZ1t2ArMkaBqkJ41nbYLrsXtOnFsl27hjxsI4G3JIEMfw7O85Z-YOVWMfnobZdn5FgkDBhbsMkQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-22 21:54:30,069:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-04-22 21:54:30,070:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 22 Apr 2024 19:55:13 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602663067 Replay-Nonce: Y89UXNyazAt4Ua4C5Sa2p7ab2wpmYvDROb80FGKFBukn2Ezr-II X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:16:16Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432528027" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602663067" } 2024-04-22 21:54:30,070:DEBUG:acme.client:Storing nonce: Y89UXNyazAt4Ua4C5Sa2p7ab2wpmYvDROb80FGKFBukn2Ezr-II 2024-04-22 21:54:30,071:DEBUG:acme.client:JWS payload: b'' 2024-04-22 21:54:30,076:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432528027: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWF6QXQ0VWE0QzVTYTJwN2FiMndwbVl2RFJPYjgwRkdLRkJ1a24yRXpyLUlJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI1MjgwMjcifQ", "signature": "jw5W42m2oLVL3yYiy8JME7Z4q9-JZxTU9zEubYJMYJ3GAKk71B-Xg36Ri8wSqzGcmfTrwT0wX7zNc8CFeC0tZiUS0dMLJPORYvxty8dRZ48XU_t5461wIMvCsPRRtFunBzrxz0IG1EoPjI57fHLtJQV44xY0kn2hXUwcv-8EfcN33jqlRJSmnpNyCOOH_HmvbXASbuWnEaSBX11DbWFZ-ZcTQzoJBmum031qHbLDQuou6Sq8QuE5CpjXXpOfB5yUa5_BGXecQwujW731ML8t_GDozL3iNBi5F0-ohDj2m7T0LbLvQGOShZ5P2GovRoF_yeLn2gYuKmFNgLsk_Tq3Xg", "payload": "" } 2024-04-22 21:54:30,235:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432528027 HTTP/1.1" 200 810 2024-04-22 21:54:30,236:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:55:13 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMpQodSaJqnbIYD40cNEoJ0yDa22ktvZMfzOWb1s9Cac98 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:16:16Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432528027/fZogaQ", "token": "h0h-k3kZQGgl45o3tvwNVxLq541oGGp1Pw1lsGcDtWA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432528027/ApLG9Q", "token": "h0h-k3kZQGgl45o3tvwNVxLq541oGGp1Pw1lsGcDtWA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432528027/eOLRKQ", "token": "h0h-k3kZQGgl45o3tvwNVxLq541oGGp1Pw1lsGcDtWA" } ] } 2024-04-22 21:54:30,236:DEBUG:acme.client:Storing nonce: FUnC6kMpQodSaJqnbIYD40cNEoJ0yDa22ktvZMfzOWb1s9Cac98 2024-04-22 21:54:30,236:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-22 21:54:30,237:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-04-22 21:54:30,237:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-22 21:54:30,237:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-22 21:54:30,237:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-22 21:54:30,237:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-22 21:54:30,238:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-22 21:54:30,238:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-22 21:54:30,239:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-22 21:54:30,290:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-22 21:54:30,557:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-22 21:54:30,558:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-04-22 21:54:30,559:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-04-22 21:54:30,563:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:58 UTC. 2024-04-22 21:54:30,563:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-22 21:54:30,564:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-22 21:54:30,568:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-22 21:54:30,569:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-22 21:54:30,569:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-22 21:54:30,574:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-22 21:54:30,575:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-22 21:54:30,577:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-22 21:54:31,042:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-22 21:54:31,042:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:55:14 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "ERHhP5jivlY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-22 21:54:31,043:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-22 21:54:36,370:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7827_key-certbot.pem 2024-04-22 21:54:40,682:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7825_csr-certbot.pem 2024-04-22 21:54:40,682:DEBUG:acme.client:Requesting fresh nonce 2024-04-22 21:54:40,683:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-22 21:54:40,838:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-22 21:54:40,839:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:55:24 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43Ny3FOEiTqD1lVOhTV4mxaJdR1jMxsHsyUbOqPkGpHZ-s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-22 21:54:40,839:DEBUG:acme.client:Storing nonce: sW-8q43Ny3FOEiTqD1lVOhTV4mxaJdR1jMxsHsyUbOqPkGpHZ-s 2024-04-22 21:54:40,839:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-04-22 21:54:40,844:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M055M0ZPRWlUcUQxbFZPaFRWNG14YUpkUjFqTXhzSHN5VWJPcVBrR3BIWi1zIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "JAo8tcsxuF5NuI0QlRcn-wDgEX9YdpdzIBecvVL-Ubm4sozK5uRRK8xJmkRUKElIF3zZRvm8_Y6jjPPiZwJvLdya_jt-xw9MJmWdNboT2yEmLbXZzxZiOqlntcH6VhuEHNcZJlPUJL2losOhus-lsWoVmHZZ4VDJ2kHGUKO7Yp50XM_kXRer1eiC_3B8kPYPZAFCBIyv1dDd9kg29jnYIAzDfqPoVaXieFBQixiliaV_X2VtbdISVYv65NVFRpM01JSYU618an9pZdzyGmJCRapSfMHlYiOS6STsUstcZjttz0WK5oLNZktue-Uk2TZCpYak4xBeCYRKAlxZDzHruw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-04-22 21:54:41,012:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-04-22 21:54:41,013:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 22 Apr 2024 19:55:24 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602692837 Replay-Nonce: sW-8q43NXjvaTmom-aY1jb-IOE-PryDfNrNv-PJWqFulkth4HJI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:16:25Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432570877" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602692837" } 2024-04-22 21:54:41,013:DEBUG:acme.client:Storing nonce: sW-8q43NXjvaTmom-aY1jb-IOE-PryDfNrNv-PJWqFulkth4HJI 2024-04-22 21:54:41,014:DEBUG:acme.client:JWS payload: b'' 2024-04-22 21:54:41,018:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432570877: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M05YanZhVG1vbS1hWTFqYi1JT0UtUHJ5RGZOck52LVBKV3FGdWxrdGg0SEpJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI1NzA4NzcifQ", "signature": "NVe807Pl_obOx79-jlbMo1iE_Pn-XUg08xL8K6pttGCJExIsx_Zyr4-sQJdZGfxmT2A7jmGncKND_-X8TMvIDmfmUvv9de7D-SWo0nbucR7nCBrDMtlCSjK8OY6PDnXuhU2PKXSv1w51FUiO3fhhQqF8jP39uWi-HbfDqM4cMhhyy0wfLnSx-OsqwZ6JWI9qRhQok-OcTQ6UeI-iE_R8kurewRM5rpm6sl246ECUnUXqnSyRGjp8aSVmCf9gePW2uXasH3QIMdFarlIrihuNS4a-_LZZZAK525cl1M5Z32U-d_-3tkx_ttms-dY0bT51Ap_THPty2gmWVmPbJgf6Kw", "payload": "" } 2024-04-22 21:54:41,176:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432570877 HTTP/1.1" 200 809 2024-04-22 21:54:41,177:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:55:24 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43N3LSLBgw2LL1rJJ3IN_0SIRMVPi0u42QsIacyuOiTVnw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:16:25Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432570877/IP7Jnw", "token": "6wDg_FeOhbW91soX0twO-HqBmGz9rn_f6CKB-7YK190" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432570877/jfJGPg", "token": "6wDg_FeOhbW91soX0twO-HqBmGz9rn_f6CKB-7YK190" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432570877/AYFk4w", "token": "6wDg_FeOhbW91soX0twO-HqBmGz9rn_f6CKB-7YK190" } ] } 2024-04-22 21:54:41,177:DEBUG:acme.client:Storing nonce: sW-8q43N3LSLBgw2LL1rJJ3IN_0SIRMVPi0u42QsIacyuOiTVnw 2024-04-22 21:54:41,177:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-22 21:54:41,178:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-04-22 21:54:41,178:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-22 21:54:41,179:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-22 21:54:41,179:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-22 21:54:41,180:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-22 21:54:41,180:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-22 21:54:41,180:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-22 21:54:41,181:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-22 21:54:41,235:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-22 21:54:41,457:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-22 21:54:41,458:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2024-04-22 21:54:41,459:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2024-04-22 21:54:41,463:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:17 UTC. 2024-04-22 21:54:41,463:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-22 21:54:41,464:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-22 21:54:41,469:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-22 21:54:41,469:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-22 21:54:41,469:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-22 21:54:41,474:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-22 21:54:41,475:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-22 21:54:41,477:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-22 21:54:41,920:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-22 21:54:41,921:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:55:25 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "-Am1wcZbjr0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-22 21:54:41,921:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-22 21:54:46,650:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7828_key-certbot.pem 2024-04-22 21:54:50,867:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7826_csr-certbot.pem 2024-04-22 21:54:50,868:DEBUG:acme.client:Requesting fresh nonce 2024-04-22 21:54:50,868:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-22 21:54:51,016:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-22 21:54:51,016:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:55:34 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMpOneUjES6HC7SrUV0JDYWQm_KkPrUbzb8eOFOuZsSqJQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-22 21:54:51,017:DEBUG:acme.client:Storing nonce: FUnC6kMpOneUjES6HC7SrUV0JDYWQm_KkPrUbzb8eOFOuZsSqJQ 2024-04-22 21:54:51,017:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-04-22 21:54:51,023:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBPbmVVakVTNkhDN1NyVVYwSkRZV1FtX0trUHJVYnpiOGVPRk91WnNTcUpRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "JTLU5Vply7_oVZVhw9UOLvJ86beHaluz5w5e3Ks0RP1QvGNaWVlcCCyN24rtm1T2sJqENNJUdE5DPp71lz8kLELWxetAuu9Ui8WfMwEVFWzqCDBfek9Vba2O_nTf1Wg4VwffWNDg5mSgpXN4CkhwKLKmIqwglkwKvS6SB9Ps8fC1T3qEqM51Zj7sd8Z6EK4JyqErRYs9xPM7Mt5fp6iVfye-F6gF4AwbyYa1YLAbCKMqTV5x3AwfEEKlnszVwF0Xv8-7tyvd3sfrLNBXzE3Ab9J7W18kltQTEvhuJUy6vQUZD8hOfPLhyZGP7dMmi0gE6j7_QZh7DyrpBmvr10mevA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-22 21:54:51,226:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-22 21:54:51,227:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 22 Apr 2024 19:55:34 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602722417 Replay-Nonce: FUnC6kMpnQ3tHhzYjpJkJs9LfKduZyXTGQTQZ5VxXOTyQ5hDS9U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:16:35Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432614317" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602722417" } 2024-04-22 21:54:51,227:DEBUG:acme.client:Storing nonce: FUnC6kMpnQ3tHhzYjpJkJs9LfKduZyXTGQTQZ5VxXOTyQ5hDS9U 2024-04-22 21:54:51,228:DEBUG:acme.client:JWS payload: b'' 2024-04-22 21:54:51,233:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432614317: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBuUTN0SGh6WWpwSmtKczlMZktkdVp5WFRHUVRRWjVWeFhPVHlRNWhEUzlVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI2MTQzMTcifQ", "signature": "BT3HJRgPdUm4O7zftiXqAIS_eOHbsys3g_AZcvu-6C8KzdKoG-cg5pFB6hAm0c97tN_UliZudL-bz9PqfbbEdiuTH5JXkxXrrTn5aADFWAq54T7xoWu70wwvFzE37vusih4-7XaQvQViAFQD996wsldvNV0b0NlyuAZpBZ5P4pSlpYIW02QeSUBEyD3WutXC7vEq1GZ45qtCsKCgYtIqaYIwCE6IQcLZvrjWQaiU-CDBuwFU_8WoMcVB7NQctT13xjVf3D0d2IpeMEzdXOSsZYhog7U8Oq6xDHos_8IZQgN2PQerpJdsinWUP5S_vO2N8vN6KTXo43c7YoLyFKCYPQ", "payload": "" } 2024-04-22 21:54:51,387:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432614317 HTTP/1.1" 200 805 2024-04-22 21:54:51,388:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:55:34 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMp8TnafDNn5f9Og2KyKQEsMIfXQcsBCHo-DjpCrWCvWv0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:16:35Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432614317/xAjnBA", "token": "RG1vFP3wsSY4J9gUkurgcdKS0Hmm4ra8cQyi1u1JM6U" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432614317/eaCuPQ", "token": "RG1vFP3wsSY4J9gUkurgcdKS0Hmm4ra8cQyi1u1JM6U" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432614317/2jUEjw", "token": "RG1vFP3wsSY4J9gUkurgcdKS0Hmm4ra8cQyi1u1JM6U" } ] } 2024-04-22 21:54:51,388:DEBUG:acme.client:Storing nonce: FUnC6kMp8TnafDNn5f9Og2KyKQEsMIfXQcsBCHo-DjpCrWCvWv0 2024-04-22 21:54:51,389:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-22 21:54:51,389:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-04-22 21:54:51,390:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-22 21:54:51,390:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-22 21:54:51,391:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-22 21:54:51,391:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-22 21:54:51,391:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-22 21:54:51,391:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-22 21:54:51,392:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-22 21:54:51,444:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-22 21:54:51,712:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-22 21:54:51,713:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-22 21:54:51,714:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-22 21:54:51,719:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:34 UTC. 2024-04-22 21:54:51,719:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-22 21:54:51,720:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-22 21:54:51,723:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-22 21:54:51,723:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-22 21:54:51,724:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-22 21:54:51,728:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-22 21:54:51,729:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-22 21:54:51,732:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-22 21:54:52,173:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-22 21:54:52,174:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:55:35 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "9cB2a7UPmqY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-22 21:54:52,175:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-22 21:54:56,492:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7829_key-certbot.pem 2024-04-22 21:55:00,524:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7827_csr-certbot.pem 2024-04-22 21:55:00,525:DEBUG:acme.client:Requesting fresh nonce 2024-04-22 21:55:00,525:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-22 21:55:00,673:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-22 21:55:00,673:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:55:44 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMp7Wc36PdmVtr1GaHuiocxS0XHA1y4EkKM_pxHX6XZ058 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-22 21:55:00,674:DEBUG:acme.client:Storing nonce: FUnC6kMp7Wc36PdmVtr1GaHuiocxS0XHA1y4EkKM_pxHX6XZ058 2024-04-22 21:55:00,674:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-04-22 21:55:00,681:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXA3V2MzNlBkbVZ0cjFHYUh1aW9jeFMwWEhBMXk0RWtLTV9weEhYNlhaMDU4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "iYiTrEiMh0_EFltT9ejsibL55HMCBf9kLr1-jn1Ees2ZNyB8w0QCVfkGJNy5y99Yo77_Ne5U5EXnSBCgqEcCAVsdeUcEjFg96bBObid5_Tz6mwFPffNYJu4hAp-r1BTCng4rdPuhhY-STgPhg4wWVhVdk56WpUoIT5cam29zzcF7_DAPMXSrcIQ7YlUfgifhUMXUPOIuFyU0MWdxhoNPXHCOzPZjpodtMk9oOzN6x1s_mumNvGVJ9D5PWzJ1IAXcZFmq92qKiZqPXJRXkiSeQgOgWwwdlIMahb7ZywofGVIPPOhYdBNJi4ymBbhAFRGQoK7wniIcyXE0QrN6d11mTQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-22 21:55:00,855:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-22 21:55:00,855:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 22 Apr 2024 19:55:44 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602748407 Replay-Nonce: Y89UXNya6_Z7WIbnGXx5nW0i8XQqmsP1zD4WpoawMsYE_mnQUa0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:16:44Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432651637" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602748407" } 2024-04-22 21:55:00,855:DEBUG:acme.client:Storing nonce: Y89UXNya6_Z7WIbnGXx5nW0i8XQqmsP1zD4WpoawMsYE_mnQUa0 2024-04-22 21:55:00,855:DEBUG:acme.client:JWS payload: b'' 2024-04-22 21:55:00,861:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432651637: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWE2X1o3V0libkdYeDVuVzBpOFhRcW1zUDF6RDRXcG9hd01zWUVfbW5RVWEwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI2NTE2MzcifQ", "signature": "q4heZM0NPHdsW2owDfjrQZlNZk334D0lLlFM2hOULPHcj1v1dF-fQj0DsF_SWl2Quqh4NqcFtG4ChE8yU9nvX3OarQzt8_2rPHiomyniih_BqEL-nf76o2Bddt1KTvcJanUGmSMXD5KXYmmaAOc4GP7MVPt9MKhCdYbqCrdEfJBL6HaMfF5P5Sof3L297nfv7Ai3x-CKFy6ttK9PTKkTK-j_gs9QSCwr127nYMbZgyQb-3izJGwsgCY_dCKoYMGDl6ATmvK4ZduH-SxyYdOvvCMJ_MuKb-68iLavpnqh7UdIau8c_Bg63urkoC2lS2j7kyHtFlq1I8JSIFNAQf0sBg", "payload": "" } 2024-04-22 21:55:01,020:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432651637 HTTP/1.1" 200 805 2024-04-22 21:55:01,021:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:55:44 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyawSozgKLVxKN3lM5DTWbXM2Yvgx42GBBRVVwC16xK6QE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:16:44Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432651637/MmDBAg", "token": "tp6ABUDDbWbczEBv42KG5z6hEJeiI6L08Lc5HKW8gjA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432651637/zq-rkw", "token": "tp6ABUDDbWbczEBv42KG5z6hEJeiI6L08Lc5HKW8gjA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432651637/n89D0Q", "token": "tp6ABUDDbWbczEBv42KG5z6hEJeiI6L08Lc5HKW8gjA" } ] } 2024-04-22 21:55:01,021:DEBUG:acme.client:Storing nonce: Y89UXNyawSozgKLVxKN3lM5DTWbXM2Yvgx42GBBRVVwC16xK6QE 2024-04-22 21:55:01,021:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-22 21:55:01,022:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-04-22 21:55:01,022:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-22 21:55:01,022:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-22 21:55:01,023:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-22 21:55:01,023:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-22 21:55:01,023:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-22 21:55:01,024:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-22 21:55:01,025:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-22 21:55:01,074:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-22 21:55:01,390:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-22 21:55:01,391:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-04-22 21:55:01,392:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-04-22 21:55:01,396:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:48 UTC. 2024-04-22 21:55:01,396:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-22 21:55:01,397:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-22 21:55:01,401:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-22 21:55:01,402:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-22 21:55:01,402:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-22 21:55:01,406:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-22 21:55:01,407:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-22 21:55:01,409:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-22 21:55:01,884:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-22 21:55:01,885:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:55:45 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "CLOV4g0SgXU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-22 21:55:01,885:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-22 21:55:06,157:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7830_key-certbot.pem 2024-04-22 21:55:10,172:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7828_csr-certbot.pem 2024-04-22 21:55:10,173:DEBUG:acme.client:Requesting fresh nonce 2024-04-22 21:55:10,173:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-22 21:55:10,333:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-22 21:55:10,333:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:55:53 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9Qjup6FSzEqNTWwIYay-6S4sT9v9euV_YFHo1he1vU0s8jJ0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-22 21:55:10,333:DEBUG:acme.client:Storing nonce: 1Th9Qjup6FSzEqNTWwIYay-6S4sT9v9euV_YFHo1he1vU0s8jJ0 2024-04-22 21:55:10,334:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-04-22 21:55:10,340:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXA2RlN6RXFOVFd3SVlheS02UzRzVDl2OWV1Vl9ZRkhvMWhlMXZVMHM4akowIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "m4yW9UVN8tmNNJI8adyegx02qbn_AB7OetEq8-Gsu_KnQ_nWQN2rE1vw7bNcdPpFvipuW1bhlYX2aFYNc51g3CmBNkJNiSb6zT2fW1-NKrfQ3B9mPPvoca6r378dRT9PuQedkOjpR21YQiB6gFT1OO2hQddeL7-q9cJb0yG4i-_oDIzA7Q05PqQklY0f-my-DltqDq0lXVQa-A6PYSFCksIUpYz3LDCL5HjS3UlEYootB6xNVq634NlTPNRYexPAJ3QcF0NKd-41ZXCNmqki6RRZ6USxfvjXQXfz2z2fFb8nL5qHYSW4Jo6qD1ayVlchANLVblpFfJhzSLpVVIPt_w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-22 21:55:10,513:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-22 21:55:10,513:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 22 Apr 2024 19:55:54 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602776607 Replay-Nonce: sW-8q43N1-OwE4q5Wf8eFos-6pBj6VB95RCc5A2Bu6TOpogdXyk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:16:53Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432691097" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602776607" } 2024-04-22 21:55:10,514:DEBUG:acme.client:Storing nonce: sW-8q43N1-OwE4q5Wf8eFos-6pBj6VB95RCc5A2Bu6TOpogdXyk 2024-04-22 21:55:10,514:DEBUG:acme.client:JWS payload: b'' 2024-04-22 21:55:10,519:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432691097: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M04xLU93RTRxNVdmOGVGb3MtNnBCajZWQjk1UkNjNUEyQnU2VE9wb2dkWHlrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI2OTEwOTcifQ", "signature": "foNGNEnZnjvNuvlZd7llEmj9rBX-oSMacU0_AXQ4dH4uA49gREq5bvj50F2Z--JopvzD3WFWFmEyGcKnb6Kj1X0lPGCjzOrOq6WlGPSkvAQ4TrrrrGQME8munsR74ObPfm3K41WNDxZ6JfeXKmsHIJSZnsL9BQsWFBWNVsAEF3sXe7MryQFSiE60lW6IkgzTmtEt9R1L5JQi2a5j-iQA0N-RdMY7dumCJ7TAS__cXejRZ3E3cN1GawYAqBdjjvQNXZ8ScRnnoSu7in6fYq6de3lW85sTC_yZxycqGPWShC_Clrb9sE8q1BcGjOAEPODa21Akq5h4sc00wRILGZlcRw", "payload": "" } 2024-04-22 21:55:10,682:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432691097 HTTP/1.1" 200 805 2024-04-22 21:55:10,683:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 22 Apr 2024 19:55:54 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43N612BjO3XXF8QbnRcqpCa9-iVcS5y2kqXGnEt6Q_OswA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:16:53Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432691097/PSRvrQ", "token": "RlxqSNpNGDiYI8pHcb4-btU3K4CtHRMPAT7ZeQIyKUU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432691097/SZF9hg", "token": "RlxqSNpNGDiYI8pHcb4-btU3K4CtHRMPAT7ZeQIyKUU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432691097/9pqO_A", "token": "RlxqSNpNGDiYI8pHcb4-btU3K4CtHRMPAT7ZeQIyKUU" } ] } 2024-04-22 21:55:10,683:DEBUG:acme.client:Storing nonce: sW-8q43N612BjO3XXF8QbnRcqpCa9-iVcS5y2kqXGnEt6Q_OswA 2024-04-22 21:55:10,684:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-22 21:55:10,684:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-04-22 21:55:10,685:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-22 21:55:10,685:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-22 21:55:10,686:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-22 21:55:10,686:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-22 21:55:10,686:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-22 21:55:10,687:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-22 21:55:10,688:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-22 21:55:10,688:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-04-22 21:55:10,689:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-04-22 21:55:10,700:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-04-22 21:55:10,702:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)