2024-04-20 16:30:55,212:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-04-20 16:30:55,212:DEBUG:certbot._internal.main:Arguments: [] 2024-04-20 16:30:55,212:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-04-20 16:30:56,181:DEBUG:certbot._internal.log:Root logging level set at 20 2024-04-20 16:30:56,181:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-04-20 16:30:56,216:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-04-20 16:30:56,258:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-20 16:30:56,569:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-20 16:30:56,581:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert9.pem is signed by the certificate's issuer. 2024-04-20 16:30:56,586:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert9.pem is: OCSPCertStatus.GOOD 2024-04-20 16:30:56,594:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:24 UTC. 2024-04-20 16:30:56,594:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-20 16:30:56,594:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-20 16:30:56,599:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-20 16:30:56,599:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-20 16:30:56,599:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-20 16:30:56,605:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-20 16:30:56,606:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-20 16:30:56,608:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-20 16:30:57,083:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-20 16:30:57,084:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:30:42 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Gji5ueXPXkM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-20 16:30:57,085:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-20 16:31:01,614:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7766_key-certbot.pem 2024-04-20 16:31:05,994:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7764_csr-certbot.pem 2024-04-20 16:31:05,995:DEBUG:acme.client:Requesting fresh nonce 2024-04-20 16:31:05,995:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-20 16:31:06,144:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-20 16:31:06,145:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:30:51 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyab67fBMGGZrJyMRIDLfqvrUY8ALe1LPWtm6hAGjwUFsQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-20 16:31:06,146:DEBUG:acme.client:Storing nonce: Y89UXNyab67fBMGGZrJyMRIDLfqvrUY8ALe1LPWtm6hAGjwUFsQ 2024-04-20 16:31:06,146:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-04-20 16:31:06,157:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWFiNjdmQk1HR1pySnlNUklETGZxdnJVWThBTGUxTFBXdG02aEFHandVRnNRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "QF6bkzGZchHqyEXw1uM8YMi0pCE97-PTXS32hBbO-wsGZrS8rxtaB3X2Thwcb60ARvfA499W5JMR2fnRE7UMPuH9Ks-Sdvg7tlN2OigkMlH9NP5Eb0BRliWFi1uQ1m1IUrCT3BFYwA7csWZtQAWeyJ4bpajz59Ej80F3pUZ-itCtXvkM0sJpA5l31XyijgEYhaueQGoL0kn69qVtrg1-oheVOg8ER2IjAbQqMlzWRXPYRkD1KyIYQS7XKbEqmmgrOxutBcC1u8YG1B5qIxBaw3CUUG4wQmRT3IzihEKjoWte96ouP2FW_xtG_3MoLsorWwMWDsaFKzwdxH_uSz6xsg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-20 16:31:06,329:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-04-20 16:31:06,330:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 20 Apr 2024 14:30:51 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602379477 Replay-Nonce: Y89UXNyak6tisjUXEfAYWKQ6UywMwM92A2eI4dGfx8m_luxCpng X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:01Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432133867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602379477" } 2024-04-20 16:31:06,330:DEBUG:acme.client:Storing nonce: Y89UXNyak6tisjUXEfAYWKQ6UywMwM92A2eI4dGfx8m_luxCpng 2024-04-20 16:31:06,330:DEBUG:acme.client:JWS payload: b'' 2024-04-20 16:31:06,340:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432133867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWFrNnRpc2pVWEVmQVlXS1E2VXl3TXdNOTJBMmVJNGRHZng4bV9sdXhDcG5nIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIxMzM4NjcifQ", "signature": "EMHIHMjfRjyaXt26HghPkHTdglvNjoRDUCwrBccFbP_8slGH0PkZq14n-hbRkdV-sfREE2nU9M5ZL0sWl6vJwI9T2H4QcmoRiIr1_RwOXzuku2ReHZgYQ4ibJlvcXxDLUPePYCuZfKGncBEIBwzgsfmuPgIuVV_rsNbLa0cgCmU9ClNe_yhv2zp2g3MBnEAqwDL9PaAGUA24OFqcEyQMqW6XlJJ6kIBQPutF_UHhnplraqhDchgkCeGn5elBMTSRIFhivWq0xCjC8s6qoNDz7ehBmopF2w8FLMWjqZT02D6Pp5I9qj3V6sLKAJcezPxlg2I_Ogbc4_xDRcTlhCJeXw", "payload": "" } 2024-04-20 16:31:06,490:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432133867 HTTP/1.1" 200 810 2024-04-20 16:31:06,491:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:30:51 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMpC-jjbIO3zKh7Mv9dJS47ecP6fvHBEDU8sa5yd-SvGfE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:01Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432133867/bALmag", "token": "K5BL7NCUQz-VErlSqOmjI6HLe61h0mHLoAf5V7HRxcQ" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432133867/gKZ-RA", "token": "K5BL7NCUQz-VErlSqOmjI6HLe61h0mHLoAf5V7HRxcQ" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432133867/BZrX6Q", "token": "K5BL7NCUQz-VErlSqOmjI6HLe61h0mHLoAf5V7HRxcQ" } ] } 2024-04-20 16:31:06,491:DEBUG:acme.client:Storing nonce: FUnC6kMpC-jjbIO3zKh7Mv9dJS47ecP6fvHBEDU8sa5yd-SvGfE 2024-04-20 16:31:06,492:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-20 16:31:06,492:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-04-20 16:31:06,492:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-20 16:31:06,493:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-20 16:31:06,506:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-20 16:31:06,506:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-20 16:31:06,506:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-20 16:31:06,506:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-20 16:31:06,512:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-20 16:31:06,549:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-20 16:31:07,152:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-20 16:31:07,154:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-20 16:31:07,154:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-20 16:31:07,160:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:42 UTC. 2024-04-20 16:31:07,160:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-20 16:31:07,180:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-20 16:31:07,184:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-20 16:31:07,184:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-20 16:31:07,184:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-20 16:31:07,188:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-20 16:31:07,189:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-20 16:31:07,191:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-20 16:31:07,636:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-20 16:31:07,637:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:30:52 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "nc3ZRZtB2YY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-20 16:31:07,637:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-20 16:31:12,312:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7767_key-certbot.pem 2024-04-20 16:31:16,303:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7765_csr-certbot.pem 2024-04-20 16:31:16,304:DEBUG:acme.client:Requesting fresh nonce 2024-04-20 16:31:16,304:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-20 16:31:16,452:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-20 16:31:16,453:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:31:01 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyaGmk2UhaWbVD7sCpZHhRiQaKfrRgOJzoiNYKwgXInkWg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-20 16:31:16,454:DEBUG:acme.client:Storing nonce: Y89UXNyaGmk2UhaWbVD7sCpZHhRiQaKfrRgOJzoiNYKwgXInkWg 2024-04-20 16:31:16,454:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-04-20 16:31:16,464:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWFHbWsyVWhhV2JWRDdzQ3BaSGhSaVFhS2ZyUmdPSnpvaU5ZS3dnWElua1dnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "kFJir51BUTJQa6KFEtuECztl8XNMeq8OmgOeRXNzxOI1JLQamcul2-Iqw4JwlXJ6gsAgaDTkJXaZVcVs377EpAvH2iMrCzLY1p6EtpXkJLToMGVsVQ29q-RpALvYy3FXVaAOX89YEDYT2ISC1kJVfkl5phJLJ_AyD2v0vKAsc0foFmurgPDaZPULaSoj7wF5oa1e7mxs1LhOyo44kuIlPC1jHcpgqNAoAXXcf8i-cahqyE0DzUMv4ohxdzEq2I3xLFMkahw4SpLxYc2PKMepHCfDOTTF7d-RqSkn4tXBBdSA0n1fWgIJttRQwhcS6C5DnW6jpD7fRxAdC4jp6FKvvQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-20 16:31:16,631:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-04-20 16:31:16,633:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 20 Apr 2024 14:31:01 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602436727 Replay-Nonce: Y89UXNyanvtBQid9aT3DYqsrCCvTTC26aMhVonrT2Z5-9l73WUM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:11Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432206077" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602436727" } 2024-04-20 16:31:16,633:DEBUG:acme.client:Storing nonce: Y89UXNyanvtBQid9aT3DYqsrCCvTTC26aMhVonrT2Z5-9l73WUM 2024-04-20 16:31:16,634:DEBUG:acme.client:JWS payload: b'' 2024-04-20 16:31:16,644:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432206077: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWFudnRCUWlkOWFUM0RZcXNyQ0N2VFRDMjZhTWhWb25yVDJaNS05bDczV1VNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIyMDYwNzcifQ", "signature": "x9yXjzT_MAlsQPWNFcm4S_qlYrnpXbiboBC26d-tbfPIkw7juXjArUWVAfme2iTBysZS1H-8yZDU-gSFrzoOHBzjqwrEDAbuOzQJyvdE51fqJqXSgWFAu-tUe3-Hkq73ZAKg9VzIQdQoEJuMUu1Kp9aKx7LDAuz6G5sYvONA-lapK0jGv8V9rTBbbusjHwXf7j8bsTzJPAomGILXvMc1WqevBlTQkWzqlliUqO4alIYB1d7NQ7CE3qfFyIzAI2kGKg4I8dz8IN4C15-8GDzGNHZ5fHrkFEZSTwRLU2KFILF6RwLt7YXMWZji5xxjvoI7tml7TBF8mQRWIgPzXa9rSQ", "payload": "" } 2024-04-20 16:31:16,813:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432206077 HTTP/1.1" 200 804 2024-04-20 16:31:16,814:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:31:01 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyaGDy79-foMp0NQUXah5d6rvSJX_DHxVHAvoSwx_Pn2zA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:11Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432206077/OpeY4Q", "token": "X4bQwYTZ4W5JqVqboZqq5o8SNpfHBgyfHNBkYg8eWNo" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432206077/WcE4Tg", "token": "X4bQwYTZ4W5JqVqboZqq5o8SNpfHBgyfHNBkYg8eWNo" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432206077/Seqm7Q", "token": "X4bQwYTZ4W5JqVqboZqq5o8SNpfHBgyfHNBkYg8eWNo" } ] } 2024-04-20 16:31:16,814:DEBUG:acme.client:Storing nonce: Y89UXNyaGDy79-foMp0NQUXah5d6rvSJX_DHxVHAvoSwx_Pn2zA 2024-04-20 16:31:16,814:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-20 16:31:16,815:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-04-20 16:31:16,815:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-20 16:31:16,815:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-20 16:31:16,816:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-20 16:31:16,816:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-20 16:31:16,816:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-20 16:31:16,816:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-20 16:31:16,817:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-20 16:31:16,855:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-20 16:31:17,205:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-20 16:31:17,206:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-04-20 16:31:17,207:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-04-20 16:31:17,212:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:56 UTC. 2024-04-20 16:31:17,212:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-20 16:31:17,212:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-20 16:31:17,218:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-20 16:31:17,218:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-20 16:31:17,218:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-20 16:31:17,222:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-20 16:31:17,223:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-20 16:31:17,225:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-20 16:31:17,664:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-20 16:31:17,664:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:31:02 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "F436HcROpWc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-20 16:31:17,665:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-20 16:31:21,476:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7768_key-certbot.pem 2024-04-20 16:31:25,181:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7766_csr-certbot.pem 2024-04-20 16:31:25,182:DEBUG:acme.client:Requesting fresh nonce 2024-04-20 16:31:25,182:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-20 16:31:25,353:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-20 16:31:25,354:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:31:10 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyaBc4C8KD-fEFclJK7PZp3MAcZfIzLiyxDXOfuwL40IQU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-20 16:31:25,354:DEBUG:acme.client:Storing nonce: Y89UXNyaBc4C8KD-fEFclJK7PZp3MAcZfIzLiyxDXOfuwL40IQU 2024-04-20 16:31:25,354:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-04-20 16:31:25,360:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWFCYzRDOEtELWZFRmNsSks3UFpwM01BY1pmSXpMaXl4RFhPZnV3TDQwSVFVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "N4LruQPdUZ8MlaDC74VdUawfk-by_-Eq0nVCNym-RXAbLAyGQ0Vlvh4SIEFY3jYYlBTN69Ux3DqmJjwUDbulE4ofElTExQfdIgTNXEpm3gVUKbR3a5nx9pkwH_kLtz_S18FkCt59yjTfJlHxOR--zpDiMOtRT8sn-BxpkMAPpfMscM1dk89yYiFkkAHxNxbjpAOLGxssee_4NyiKqp5aclzXwDunRnhYpM3LCnNLfOMlIplWr8FvCHjpzAHCQwocMYikWkzLpKxapL64qXvpHDIDZPx0RgdHsLUCEWRtpbtTgb3XuTcyniC2yb-pExBmBkE3xbxuFDs3FRfM1vwv0g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-20 16:31:25,528:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-04-20 16:31:25,530:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 20 Apr 2024 14:31:10 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602470407 Replay-Nonce: FUnC6kMpauYJlnOBeCG0PWGg6VdVhY_M5b0nZFJnhe_RSJB70j4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:20Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432255557" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602470407" } 2024-04-20 16:31:25,530:DEBUG:acme.client:Storing nonce: FUnC6kMpauYJlnOBeCG0PWGg6VdVhY_M5b0nZFJnhe_RSJB70j4 2024-04-20 16:31:25,531:DEBUG:acme.client:JWS payload: b'' 2024-04-20 16:31:25,541:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432255557: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBhdVlKbG5PQmVDRzBQV0dnNlZkVmhZX001YjBuWkZKbmhlX1JTSkI3MGo0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIyNTU1NTcifQ", "signature": "lIto6gTwCdFYl4jQG2v9cmXkdZtLhU729QfWDT3UKdYQz239Db2kxa1aV0nr_z5biP5f_-Ms4hnWmTWBePqhTvj5M9ODKrKBX9i5ibmv5IpQEE7pkjDbvmU7gi3rv_FdG32uUUizJUteU2pqKJWZs7tV13kMlqnTb__zkITEMkTDO3K30u2vmvrAOQwtucw6s-RZIEOQQZvMp9GMwbQOWEXAZQ-XLjrHlErGcMU5xHEXWxJcNFT2TDhnGKs-SO2WxIs92fmbRFzMtooeZSz9zB0_h22qzIQifW1F7LVgvW0S-zptuymLC9Vasd9lfG5YCSO7xpOLZYv59vzuVLAGzw", "payload": "" } 2024-04-20 16:31:25,708:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432255557 HTTP/1.1" 200 807 2024-04-20 16:31:25,709:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:31:10 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyaqhnFJB_syJgne-7ABSHBwgsii2tC9BW-JWczdWVhlhc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:20Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432255557/ipHR3w", "token": "4ALo7VXKOBw9xqOcrY3miutsXnJQ4sVo7evhXW1kyPg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432255557/pey6Vw", "token": "4ALo7VXKOBw9xqOcrY3miutsXnJQ4sVo7evhXW1kyPg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432255557/af6Vwg", "token": "4ALo7VXKOBw9xqOcrY3miutsXnJQ4sVo7evhXW1kyPg" } ] } 2024-04-20 16:31:25,709:DEBUG:acme.client:Storing nonce: Y89UXNyaqhnFJB_syJgne-7ABSHBwgsii2tC9BW-JWczdWVhlhc 2024-04-20 16:31:25,710:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-20 16:31:25,710:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-04-20 16:31:25,711:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-20 16:31:25,711:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-20 16:31:25,712:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-20 16:31:25,712:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-20 16:31:25,712:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-20 16:31:25,712:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-20 16:31:25,714:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-20 16:31:25,771:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-20 16:31:26,072:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-20 16:31:26,073:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-20 16:31:26,074:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-20 16:31:26,078:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:14 UTC. 2024-04-20 16:31:26,078:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-20 16:31:26,078:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-20 16:31:26,083:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-20 16:31:26,083:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-20 16:31:26,083:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-20 16:31:26,087:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-20 16:31:26,088:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-20 16:31:26,089:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-20 16:31:26,555:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-20 16:31:26,556:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:31:11 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "tjXHBx6ltpQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-04-20 16:31:26,556:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-20 16:31:30,604:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7769_key-certbot.pem 2024-04-20 16:31:34,288:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7767_csr-certbot.pem 2024-04-20 16:31:34,289:DEBUG:acme.client:Requesting fresh nonce 2024-04-20 16:31:34,289:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-20 16:31:34,444:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-20 16:31:34,445:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:31:19 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9QjuppiPb02qbUBoiRSQz-cu2MQE7FUyxjiDk0k5BT0DC6-c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-20 16:31:34,445:DEBUG:acme.client:Storing nonce: 1Th9QjuppiPb02qbUBoiRSQz-cu2MQE7FUyxjiDk0k5BT0DC6-c 2024-04-20 16:31:34,446:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-04-20 16:31:34,452:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBwaVBiMDJxYlVCb2lSU1F6LWN1Mk1RRTdGVXl4amlEazBrNUJUMERDNi1jIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "q6tBL7CZXnFT7_6rMgpAMwwheeEytdBlXXDLrp1XCZnVbrgQTiZINQGXpAhzqxbyilObcm-HIlRFd0dO3oWmyevQHNQ3bz6YuZxGq813G_d42UfGyQHcnFldvcmn2HS9bRyNDfTsBN4tW_ByuH3BVSgCGPItgvkLq3age09qvluiup5rqEgVTLmzghRNRPs_SQtdHZQqiZqlq8-QUHADRsfesLqrdP4n6bEahubYEpEDZWFAAGLTCILO1q1gRDGM2XXyD4X2bjD82ooUDI3K57WaMcogT7ww7Tqg7FJja7-TWjzPLsBqj9sVccHwV3Pc8ruyRoyfER4tAo_m-82EZg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-20 16:31:34,621:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-04-20 16:31:34,622:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 20 Apr 2024 14:31:19 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602501577 Replay-Nonce: sW-8q43NcHwYYB1zpOrRCV7d4BEu3yAR8bKkSgt-1hy3F8BrEIw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:29Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432301817" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602501577" } 2024-04-20 16:31:34,623:DEBUG:acme.client:Storing nonce: sW-8q43NcHwYYB1zpOrRCV7d4BEu3yAR8bKkSgt-1hy3F8BrEIw 2024-04-20 16:31:34,623:DEBUG:acme.client:JWS payload: b'' 2024-04-20 16:31:34,631:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432301817: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M05jSHdZWUIxenBPclJDVjdkNEJFdTN5QVI4YktrU2d0LTFoeTNGOEJyRUl3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIzMDE4MTcifQ", "signature": "X8uB42HV8x5msppLAMhtFtSVaFc874g2eOED78tPkICV03h9VM-bxRwaw1prqFbtj7dNpdvfwqC5cMDHNgHfLlCDOMvkijEYhbnfPbDqaGZ6fnlLCud5bmq2J020bFT9qSWyeKdoz1zXv0DjGFaKF4WT0AWNvm2zrxzBQwv-93Twu6QupdXaarDhcvGxJKYnj0uelUwY6h0-IZbcJJWSMpmt0COqpuXBDvpp8b9SD46BZpdur2kp0YgLLKzEgQALQOdhDyHgF2gsL2jfpidwEWu_RF5N7L1b_JmI5RTecnLLEEwct36dmnYC3UHUO46hBN4EXMXaJV0zbAtpEweD6Q", "payload": "" } 2024-04-20 16:31:34,791:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432301817 HTTP/1.1" 200 801 2024-04-20 16:31:34,792:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:31:19 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9QjupyVscwoTAnAUYTHn2YKVghEEqdxZrPYIrJCr0xMBzw2g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:29Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432301817/KUsjpA", "token": "aJoctLqucZb2n7qPJSTGLKpqSvnhh5SD51cTgx2saDg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432301817/GSkFsw", "token": "aJoctLqucZb2n7qPJSTGLKpqSvnhh5SD51cTgx2saDg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432301817/hKNbdQ", "token": "aJoctLqucZb2n7qPJSTGLKpqSvnhh5SD51cTgx2saDg" } ] } 2024-04-20 16:31:34,792:DEBUG:acme.client:Storing nonce: 1Th9QjupyVscwoTAnAUYTHn2YKVghEEqdxZrPYIrJCr0xMBzw2g 2024-04-20 16:31:34,793:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-20 16:31:34,793:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-04-20 16:31:34,794:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-20 16:31:34,794:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-20 16:31:34,795:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-20 16:31:34,795:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-20 16:31:34,795:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-20 16:31:34,795:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-20 16:31:34,796:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-20 16:31:34,848:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-20 16:31:35,297:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-20 16:31:35,298:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-20 16:31:35,299:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-20 16:31:35,303:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:32 UTC. 2024-04-20 16:31:35,303:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-20 16:31:35,303:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-20 16:31:35,307:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-20 16:31:35,308:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-20 16:31:35,308:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-20 16:31:35,311:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-20 16:31:35,312:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-20 16:31:35,314:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-20 16:31:35,747:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-20 16:31:35,748:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:31:20 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "ldDwK_gkK64": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-20 16:31:35,749:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-20 16:31:39,857:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7770_key-certbot.pem 2024-04-20 16:31:43,548:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7768_csr-certbot.pem 2024-04-20 16:31:43,549:DEBUG:acme.client:Requesting fresh nonce 2024-04-20 16:31:43,549:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-20 16:31:43,695:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-20 16:31:43,695:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:31:28 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyaM6P_JjynvuJL0dyNcNESVAERJGOz-NpRwND5Y7ValAo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-20 16:31:43,695:DEBUG:acme.client:Storing nonce: Y89UXNyaM6P_JjynvuJL0dyNcNESVAERJGOz-NpRwND5Y7ValAo 2024-04-20 16:31:43,696:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-04-20 16:31:43,701:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWFNNlBfSmp5bnZ1SkwwZHlOY05FU1ZBRVJKR096LU5wUndORDVZN1ZhbEFvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "SiSWX34x22MLBDoLywtfBddgpmhiuQTyAcJCvWfXXzlE8okThBoxBI69FD6Uyf0_j2ckcbJE8Ufb3sjEhIRGTOCq0xY51t8BFPya5y121nN3c0fp0JEuNRnDvhej5Rdg-lexwpmM4gHFNQYnWDizzWcBBohd-kz2o7yfuI55RRLP6pSY-dAXSlpvSZ7wiqqGkxXke2ZgQfgplvNd3Qi8aQ5tW8jHD-UnfNSamyawRJKtD9ejF3eaGIhUoSJnJ1bpPTvXQk69b53niGApXEQoBmro6tR_WCyFq7q2HVUFNgIemQpDXQMfWiak_7YxgrezVMUh5cm-t3cis2CVTY4Avw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-20 16:31:43,871:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-20 16:31:43,873:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 20 Apr 2024 14:31:29 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602530997 Replay-Nonce: Y89UXNyaxLdX-l1qYDTpIy4CQES4thsTfMEFAb6p2SiQl_cSCl8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:39Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432345127" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602530997" } 2024-04-20 16:31:43,873:DEBUG:acme.client:Storing nonce: Y89UXNyaxLdX-l1qYDTpIy4CQES4thsTfMEFAb6p2SiQl_cSCl8 2024-04-20 16:31:43,873:DEBUG:acme.client:JWS payload: b'' 2024-04-20 16:31:43,883:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432345127: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWF4TGRYLWwxcVlEVHBJeTRDUUVTNHRoc1RmTUVGQWI2cDJTaVFsX2NTQ2w4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIzNDUxMjcifQ", "signature": "CWv39A6r5YKIvBcdERipY78DvZ6A42wbuWIIfO5FEaGpbuCpQhV7aPC_xC6YNxqoCQbDV5-LVooHSj2Qp43RYYTBpkh6y26Hl3hqdi2u5TnN7Ay5RG2Aft7pYEsrfBAJSDGCR7wnVh7La_svaEquGmy8LfSH8W4ZMro_r3YSSomythf1y7I3aqEDC-H-YbcA_GLyEOzNN8JTS30pMqy8FFJb5VnoBVcsUuN542XSMZAVSazfCk-olj1z4UyyvLylQK2jpCcoEBdxH29yHHS9fX2NHbtWGU3Pf3k1gee8_VAhwmyy8OAicovLaBPqKx-otoZCR_ow6YyBcj29AK_YEA", "payload": "" } 2024-04-20 16:31:44,045:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432345127 HTTP/1.1" 200 805 2024-04-20 16:31:44,046:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:31:29 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMpFgSmQI01hHET2ostHQhw4qyMz_DuLeFYtBO1NMJ_kZQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:39Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432345127/eBWc1Q", "token": "5UyKevrNT1gWHZXzXEnwqj5-0dF5Nn0eSvRut9pDKLs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432345127/m8stTw", "token": "5UyKevrNT1gWHZXzXEnwqj5-0dF5Nn0eSvRut9pDKLs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432345127/bNUYKA", "token": "5UyKevrNT1gWHZXzXEnwqj5-0dF5Nn0eSvRut9pDKLs" } ] } 2024-04-20 16:31:44,046:DEBUG:acme.client:Storing nonce: FUnC6kMpFgSmQI01hHET2ostHQhw4qyMz_DuLeFYtBO1NMJ_kZQ 2024-04-20 16:31:44,046:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-20 16:31:44,047:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-04-20 16:31:44,047:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-20 16:31:44,048:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-20 16:31:44,048:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-20 16:31:44,049:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-20 16:31:44,049:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-20 16:31:44,049:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-20 16:31:44,052:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-20 16:31:44,090:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-20 16:31:44,647:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-20 16:31:44,648:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-04-20 16:31:44,649:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-04-20 16:31:44,655:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:48 UTC. 2024-04-20 16:31:44,655:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-20 16:31:44,655:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-20 16:31:44,664:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-20 16:31:44,665:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-20 16:31:44,665:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-20 16:31:44,669:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-20 16:31:44,670:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-20 16:31:44,672:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-20 16:31:45,104:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-20 16:31:45,105:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:31:30 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "hm0i9Q_vykk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-20 16:31:45,105:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-20 16:31:48,885:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7771_key-certbot.pem 2024-04-20 16:31:52,685:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7769_csr-certbot.pem 2024-04-20 16:31:52,686:DEBUG:acme.client:Requesting fresh nonce 2024-04-20 16:31:52,686:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-20 16:31:52,835:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-20 16:31:52,837:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:31:37 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMp-UhQ5LXWwsZdhzQE3siKODOzwKz6gPn7T7PUj96T35k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-20 16:31:52,837:DEBUG:acme.client:Storing nonce: FUnC6kMp-UhQ5LXWwsZdhzQE3siKODOzwKz6gPn7T7PUj96T35k 2024-04-20 16:31:52,838:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-04-20 16:31:52,843:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXAtVWhRNUxYV3dzWmRoelFFM3NpS09ET3p3S3o2Z1BuN1Q3UFVqOTZUMzVrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "jBzlDPU6h22D9oCL6B_xAkxUrOC1rVfEbvCoTxpdmJYCXFXJe1l-5hGo4eocnVhS61u54osFYhFdGCzqLk_zxhWkdBdG5MeKTtZT-UoXZIMOZC4ZFqp3p8tFd2qke5nh0soneoueLeorUdB1ZCavFOBn1CeJv_x2nlnW854SO0Utr6fZuMyOTJg7-XfOdEHF5IxacsoPkvKdSYUqt_A-fxuh57SWyeeyOedhOb2mjeutRdeaPRNq5gXK4636KfHXs1oswvvNAhqCkubbWyio93VZQ997HZGUJUhIjsS5hsWnUFPBYABgjFkFNAfDXYu4nd6unPYmXtOE0K4Bm62mMw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-04-20 16:31:53,007:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-04-20 16:31:53,008:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 20 Apr 2024 14:31:38 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602558537 Replay-Nonce: FUnC6kMpOyzQoNi6o4_sqr8ARPq9oEwzUFFQ9X4uvQRSgHNXgkw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:48Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432384097" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602558537" } 2024-04-20 16:31:53,008:DEBUG:acme.client:Storing nonce: FUnC6kMpOyzQoNi6o4_sqr8ARPq9oEwzUFFQ9X4uvQRSgHNXgkw 2024-04-20 16:31:53,009:DEBUG:acme.client:JWS payload: b'' 2024-04-20 16:31:53,017:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432384097: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBPeXpRb05pNm80X3NxcjhBUlBxOW9Fd3pVRkZROVg0dXZRUlNnSE5YZ2t3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIzODQwOTcifQ", "signature": "VRdfLNbPVfnpR_6yaBSW1JGX_GokKoL4H1nTSKOoyHDW3sUmyxJjn6UNpIP_vIAuxquAdUHO0bwWTdFoBmpbsui62e2MwqgX-iRe6NFI7ljjqmUNDd-KhoSyjUMmj_9Wle5Hvl7W5nl5_AQTDvOBxUwqRpQYq0QkxYvo5kQE41NWQE0lmC_ejqLQoIT1H_xyFRRhge_n0QbVm4QIUusLFNHRzt3y__r35Y9b_TxuI3VPJShtPHlIQbByaJXWygikeG1IDp0i7wfSX44jx-gTFkQVMw9bxi5bMQ7cSvgKgrU-h2KI2dla-miTVcOlzPqwuAePYhCAsBvzhshAz2ZGxg", "payload": "" } 2024-04-20 16:31:53,163:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432384097 HTTP/1.1" 200 809 2024-04-20 16:31:53,165:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:31:38 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMp4Hq1tD5Qlc0-A8c5D5rbVZy_n9mqOsHbJZsjdHhM1x8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:48Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432384097/oy60bw", "token": "KdhtE0Xta-NlGc-BLHiR0CXHzhbLLW5SC-IuRAbvcm8" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432384097/_4L04g", "token": "KdhtE0Xta-NlGc-BLHiR0CXHzhbLLW5SC-IuRAbvcm8" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432384097/r2alHg", "token": "KdhtE0Xta-NlGc-BLHiR0CXHzhbLLW5SC-IuRAbvcm8" } ] } 2024-04-20 16:31:53,165:DEBUG:acme.client:Storing nonce: FUnC6kMp4Hq1tD5Qlc0-A8c5D5rbVZy_n9mqOsHbJZsjdHhM1x8 2024-04-20 16:31:53,166:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-20 16:31:53,167:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-04-20 16:31:53,168:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-20 16:31:53,168:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-20 16:31:53,169:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-20 16:31:53,169:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-20 16:31:53,169:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-20 16:31:53,170:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-20 16:31:53,172:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-20 16:31:53,210:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-20 16:31:53,497:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-20 16:31:53,499:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-20 16:31:53,499:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-20 16:31:53,505:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:06 UTC. 2024-04-20 16:31:53,505:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-20 16:31:53,505:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-20 16:31:53,510:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-20 16:31:53,511:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-20 16:31:53,511:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-20 16:31:53,515:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-20 16:31:53,516:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-20 16:31:53,518:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-20 16:31:53,952:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-20 16:31:53,952:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:31:39 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "M-c8ThOiYeM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-20 16:31:53,953:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-20 16:31:58,211:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7772_key-certbot.pem 2024-04-20 16:32:01,945:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7770_csr-certbot.pem 2024-04-20 16:32:01,945:DEBUG:acme.client:Requesting fresh nonce 2024-04-20 16:32:01,946:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-20 16:32:02,091:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-20 16:32:02,093:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:31:47 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyaOJCKwBx1bnpV-EwG9bCqHssKgKQjSdVQcmQAlsDr2Yk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-20 16:32:02,093:DEBUG:acme.client:Storing nonce: Y89UXNyaOJCKwBx1bnpV-EwG9bCqHssKgKQjSdVQcmQAlsDr2Yk 2024-04-20 16:32:02,093:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-04-20 16:32:02,099:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWFPSkNLd0J4MWJucFYtRXdHOWJDcUhzc0tnS1FqU2RWUWNtUUFsc0RyMllrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "QTeDPa7D8cpSyEz3rUJTgs3NcDnjFSa8X1-Rc6asoFtlznBKcYYyM4MgWGKyhyS9ZMVIae1ur-MFxy27KjxKPL7ey56qUQfU4DFsIEqc3oWCqH9lBlC8QwewXuVNXtB75aTWnkJKsjQKDQZJbHkodvO60jAj1atlaxClF9ZEiJHM3xKidi3iJkEKoHcn9vZeTkQrIIx470AIcvJVRa88U4qre6X_DVajARny5md5SIBA0Evxlml4p-zwRM2u6bssDbkjy9w081xxd7N6P3Xx7Z4eHSkIZojQF9zJ--QeXklmCYekxvwc8n0YJiQBvhyvCKSMk6c9dgM2JcPty40cpg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-04-20 16:32:02,274:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-04-20 16:32:02,276:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 20 Apr 2024 14:31:47 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602586927 Replay-Nonce: FUnC6kMpAwVgAFVeGZQ2oQur8LKmh1h4ZJiZjuZ91XtCaw01CN8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:58Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432423627" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602586927" } 2024-04-20 16:32:02,276:DEBUG:acme.client:Storing nonce: FUnC6kMpAwVgAFVeGZQ2oQur8LKmh1h4ZJiZjuZ91XtCaw01CN8 2024-04-20 16:32:02,277:DEBUG:acme.client:JWS payload: b'' 2024-04-20 16:32:02,288:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432423627: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBBd1ZnQUZWZUdaUTJvUXVyOExLbWgxaDRaSmlaanVaOTFYdENhdzAxQ044IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI0MjM2MjcifQ", "signature": "IuBISl-1WmfFSnPisMzyyyDo3z8W-LyCVtIftYgTLundl7qM--JA4V0XH2H3HragAd_uGbUYeuAArJr9az9GGwYYhW0F41T9tttQEmEZZ7ikgD_uePRoAYynyoSomgSBMDwqkbVOVneqBEIOtgmePCKJrLzKqcoFRyjoAl5VCwzgaNvOHaoa74BZ_9wAMXs_IuHrvcp41LmB2cGvjc16jx-3QTO87b4n7ZRq0MaFTErNW3okataRg6z3AHE8RjhLjf4d1E-7BKUGixVb9rs_WXOSkfdxAR7veZoBi3hhYPsclHC84gl2Y_3GdIm3JSyOS0h3WgWHtoV8yq2CnWZE0w", "payload": "" } 2024-04-20 16:32:02,437:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432423627 HTTP/1.1" 200 806 2024-04-20 16:32:02,438:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:31:47 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMpHdmBc3cm6PNjS1tMOm7AnpxCMRSzgzm3lQ8Tbl-ra2o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:58Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432423627/-JWQ0A", "token": "FtGkmJLV6hVEahLLQUvN4xbgvT0vMtoyMkbghQ-HtEA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432423627/YJ2jiA", "token": "FtGkmJLV6hVEahLLQUvN4xbgvT0vMtoyMkbghQ-HtEA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432423627/r6TG8Q", "token": "FtGkmJLV6hVEahLLQUvN4xbgvT0vMtoyMkbghQ-HtEA" } ] } 2024-04-20 16:32:02,439:DEBUG:acme.client:Storing nonce: FUnC6kMpHdmBc3cm6PNjS1tMOm7AnpxCMRSzgzm3lQ8Tbl-ra2o 2024-04-20 16:32:02,440:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-20 16:32:02,440:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-04-20 16:32:02,441:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-20 16:32:02,442:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-20 16:32:02,443:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-20 16:32:02,444:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-20 16:32:02,444:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-20 16:32:02,445:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-20 16:32:02,447:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-20 16:32:02,484:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-04-20 16:32:02,484:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-20 16:32:02,484:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-04-20 16:32:02,491:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-04-20 16:32:02,494:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-04-20 16:32:02,494:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-04-20 16:32:02,494:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-04-20 16:32:02,494:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-04-20 16:32:02,496:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-04-20 16:32:02,536:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-20 16:32:02,909:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-20 16:32:02,911:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-20 16:32:02,913:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-20 16:32:02,920:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:23 UTC. 2024-04-20 16:32:02,920:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-20 16:32:02,921:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-20 16:32:02,925:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-20 16:32:02,925:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-20 16:32:02,926:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-20 16:32:02,929:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-20 16:32:02,930:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-20 16:32:02,932:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-20 16:32:03,397:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-20 16:32:03,398:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:31:48 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "uJv45Luwce4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-04-20 16:32:03,398:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-20 16:32:07,367:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7773_key-certbot.pem 2024-04-20 16:32:11,117:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7771_csr-certbot.pem 2024-04-20 16:32:11,117:DEBUG:acme.client:Requesting fresh nonce 2024-04-20 16:32:11,118:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-20 16:32:11,273:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-20 16:32:11,275:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:31:56 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9QjupBRhyfx1DJ6LfI0mvPVNz3TVWWoDb4xKojvCb2RXkZNw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-20 16:32:11,275:DEBUG:acme.client:Storing nonce: 1Th9QjupBRhyfx1DJ6LfI0mvPVNz3TVWWoDb4xKojvCb2RXkZNw 2024-04-20 16:32:11,276:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-04-20 16:32:11,284:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBCUmh5ZngxREo2TGZJMG12UFZOejNUVldXb0RiNHhLb2p2Q2IyUlhrWk53IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "CryvVaPqoze9kqHfK9M6n4X8xNbF-mOQOUHBv3MhmRVcN-24pGAixpPFl_WoizhALfeTDOVSmkyVDnwVN0rqblx2NIVy36hi7fK2HWUvxnVGp7tknDcO8jZPdkJ6JtCWa0a1BZsx5EUjgEKQW21T4zSH_6FdYADjTgMUq8Z48d8tuXhznGj4ZA_Bl_f2h__jyEBY7rkce8LR6p9GLghnjDrkKiuML8qp7DDBc_8sxvg6Olhg5GxrWDxZl8IS3RUfHGfYRkcQYIlo7R9wFCOQQe_GMP8v9PGmcWBC_s6SCJo0m8LoXgb351qhlHlZs37-HBJgeqiyHCfbfK09LMo-0w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-20 16:32:11,456:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-04-20 16:32:11,457:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 20 Apr 2024 14:31:56 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602629937 Replay-Nonce: sW-8q43Na8PpEUJqMLhy1OEiZY574Lm80rXCRzl2Vfuo3ZH8GHI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:16:07Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432480227" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602629937" } 2024-04-20 16:32:11,458:DEBUG:acme.client:Storing nonce: sW-8q43Na8PpEUJqMLhy1OEiZY574Lm80rXCRzl2Vfuo3ZH8GHI 2024-04-20 16:32:11,458:DEBUG:acme.client:JWS payload: b'' 2024-04-20 16:32:11,469:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432480227: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M05hOFBwRVVKcU1MaHkxT0VpWlk1NzRMbTgwclhDUnpsMlZmdW8zWkg4R0hJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI0ODAyMjcifQ", "signature": "a17J9U9H02JMwE4PlNSlAjh4HhtpDITUTlOkPTgYLZ3Tk2X0qcoMimTSDdagYA1SggyzhUuAzBBlGXdMsb-wLi2CfT1l0pbxsJWtUzDD7OEDVtnS_WsFXqYRrUa6nsFn4Xmwt0P9Vsu3gMOHAbfelNhMMqv195rfqK4vw8W_sZc4tZigaSBuOnyKMvfXQ0WpSITSX7Ia-g7IlVDgRoZ4vFIMf8sr7hvowM_fZSq5Hbdgg-hKbtuDk4LSJpqRIekBXN-nvnuGkzmMIRDWJhPA70ql1zcwikaUTIwzJ3-rnJKnJq1Wzy7UP4AAUhd7iHURezeLArzZ1xaZOf_3XeQgdA", "payload": "" } 2024-04-20 16:32:11,628:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432480227 HTTP/1.1" 200 811 2024-04-20 16:32:11,629:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:31:56 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9QjupJcxz4zkTA1oc_w9BzjZ5L1sF4C5vP3PXVNih-BktcWk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:16:07Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432480227/1ONL0g", "token": "ITCDO08nCvNE1DIOCRls7iq_D7UJHrIPtfdyCmW-Hto" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432480227/E9W28w", "token": "ITCDO08nCvNE1DIOCRls7iq_D7UJHrIPtfdyCmW-Hto" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432480227/K6R9wQ", "token": "ITCDO08nCvNE1DIOCRls7iq_D7UJHrIPtfdyCmW-Hto" } ] } 2024-04-20 16:32:11,629:DEBUG:acme.client:Storing nonce: 1Th9QjupJcxz4zkTA1oc_w9BzjZ5L1sF4C5vP3PXVNih-BktcWk 2024-04-20 16:32:11,630:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-20 16:32:11,630:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-04-20 16:32:11,631:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-20 16:32:11,631:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-20 16:32:11,632:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-20 16:32:11,632:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-20 16:32:11,633:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-20 16:32:11,633:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-20 16:32:11,634:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-20 16:32:11,684:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-20 16:32:11,940:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-20 16:32:11,943:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-20 16:32:11,944:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-20 16:32:11,951:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:41 UTC. 2024-04-20 16:32:11,951:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-20 16:32:11,952:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-20 16:32:11,956:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-20 16:32:11,956:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-20 16:32:11,956:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-20 16:32:11,960:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-20 16:32:11,961:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-20 16:32:11,962:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-20 16:32:12,405:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-20 16:32:12,407:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:31:57 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "5MQP1m19rSQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-20 16:32:12,408:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-20 16:32:16,428:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7774_key-certbot.pem 2024-04-20 16:32:20,169:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7772_csr-certbot.pem 2024-04-20 16:32:20,170:DEBUG:acme.client:Requesting fresh nonce 2024-04-20 16:32:20,170:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-20 16:32:20,317:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-20 16:32:20,318:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:32:05 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMp9rZbSIk70_00FQB3G5-1iNM6MtYdwJqqxNZaY8t-vg0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-20 16:32:20,318:DEBUG:acme.client:Storing nonce: FUnC6kMp9rZbSIk70_00FQB3G5-1iNM6MtYdwJqqxNZaY8t-vg0 2024-04-20 16:32:20,322:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-04-20 16:32:20,329:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXA5clpiU0lrNzBfMDBGUUIzRzUtMWlOTTZNdFlkd0pxcXhOWmFZOHQtdmcwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "J2AnGJ35GIME3ra3fuyDEU8N_kpiThBBER_ZkHA_m9AqiRQ1qy_XlwcIMdxU9YWB2lfjByeB3_p-4CPXFoFstY8XMGnZ7yf878h22VHYK6SwY1uLIUEbCx7CqEcs6XBgh8JFeFF301hbFVjN6iTH1LtnUyGsncGgRu4T95JaOPCmxpIire_hpArvPER1FI3xYzj37sMUBucyERYQcvK7LuGgbpp88MgFRFHeqC7swbTUlqSf3kjnhsxGfywHbJ6t_Zd9w75Nzv5HKP1mzjOB_1r6R4k0zvgMXj_6NLjU2Z1y3HtDnI9tN8PoPAMx4vmGxTcBcc4EooL7MK-ULzeulw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-20 16:32:20,499:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-04-20 16:32:20,500:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 20 Apr 2024 14:32:05 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602663067 Replay-Nonce: Y89UXNya36BA5kqEaSF2ysFp0RmBOgmWaxhs2tDRCT2X4ljlBRo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:16:16Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432528027" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602663067" } 2024-04-20 16:32:20,500:DEBUG:acme.client:Storing nonce: Y89UXNya36BA5kqEaSF2ysFp0RmBOgmWaxhs2tDRCT2X4ljlBRo 2024-04-20 16:32:20,500:DEBUG:acme.client:JWS payload: b'' 2024-04-20 16:32:20,505:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432528027: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWEzNkJBNWtxRWFTRjJ5c0ZwMFJtQk9nbVdheGhzMnREUkNUMlg0bGpsQlJvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI1MjgwMjcifQ", "signature": "k62qu5LDy9eHon3SZPRtoFW_z9scgsS5qFVtTpfhD_sTmf4QkE4Ri4EaSC8D2UqPw4U7Br7X2tB04N0mKQ3y9EQeqo302ZQOHZL809zR8PpNCw14MjWA4EaJU3qPdZsWKS31NRWtOZjr0EGKWwwECujOV9gR_NjsD7VSEhqI5OIiyxgPpbMKyQQskZCXNTtCFLXO1tvaaAFWqQsxozNOw04gCXeofbVIhR9sJhgb2MFhvrB9K6mS35sgUS1QwVwXxOHYfwmK08IeZDwvJbqQbNkaMNQ51N8YFneNoRIJaBQ_lUK8FYwUBbJh17Gm9MCp0CiXCvoHnD6vo1kBtF3Z2A", "payload": "" } 2024-04-20 16:32:20,706:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432528027 HTTP/1.1" 200 810 2024-04-20 16:32:20,706:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:32:05 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNya0c2WGnk7eIWDruq2AuTttQ4Z7r70rVfGa_Evh90vQEc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:16:16Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432528027/fZogaQ", "token": "h0h-k3kZQGgl45o3tvwNVxLq541oGGp1Pw1lsGcDtWA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432528027/ApLG9Q", "token": "h0h-k3kZQGgl45o3tvwNVxLq541oGGp1Pw1lsGcDtWA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432528027/eOLRKQ", "token": "h0h-k3kZQGgl45o3tvwNVxLq541oGGp1Pw1lsGcDtWA" } ] } 2024-04-20 16:32:20,707:DEBUG:acme.client:Storing nonce: Y89UXNya0c2WGnk7eIWDruq2AuTttQ4Z7r70rVfGa_Evh90vQEc 2024-04-20 16:32:20,707:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-20 16:32:20,707:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-04-20 16:32:20,708:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-20 16:32:20,708:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-20 16:32:20,709:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-20 16:32:20,709:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-20 16:32:20,709:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-20 16:32:20,710:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-20 16:32:20,711:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-20 16:32:20,759:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-20 16:32:21,020:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-20 16:32:21,022:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-04-20 16:32:21,024:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-04-20 16:32:21,032:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:58 UTC. 2024-04-20 16:32:21,033:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-20 16:32:21,033:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-20 16:32:21,038:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-20 16:32:21,038:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-20 16:32:21,038:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-20 16:32:21,042:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-20 16:32:21,043:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-20 16:32:21,044:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-20 16:32:21,520:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-20 16:32:21,521:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:32:06 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "W5npKYJoQJE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-20 16:32:21,522:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-20 16:32:25,626:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7775_key-certbot.pem 2024-04-20 16:32:29,402:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7773_csr-certbot.pem 2024-04-20 16:32:29,402:DEBUG:acme.client:Requesting fresh nonce 2024-04-20 16:32:29,402:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-20 16:32:29,562:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-20 16:32:29,563:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:32:14 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43NjQJ6UtTqFL66pGIybf00Ddklp_Rs30G4l8Ns1DYgx9Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-20 16:32:29,563:DEBUG:acme.client:Storing nonce: sW-8q43NjQJ6UtTqFL66pGIybf00Ddklp_Rs30G4l8Ns1DYgx9Q 2024-04-20 16:32:29,564:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-04-20 16:32:29,573:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M05qUUo2VXRUcUZMNjZwR0l5YmYwMERka2xwX1JzMzBHNGw4TnMxRFlneDlRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "SHbC0IKiohtGjWvG_y8gLsNP5nVzTWl_OjQBHWzMlXqcBa99zNkPFEVR7R63N0nvF7aEaDOtQC6QBsEa84aalHJ-yQLE3NSz7N29Kud0DFdPazPyoBrhrsHFI30N60JiAz5c_q2VIyz5wJLGKep20m0MGrAg1_e64DszytE8NGRgdldwxrCd7XsxWHZLX1gktepW4PhH2wSYPFme5eUYfklFCqJ9ctxQL2-GCTfTku8ccYFee7wC_RU8yg4MjHCOLzUZE-nCnXSE3AFXRrA8wxoKR398KVtx3V-8jLmsgfMojlfmHHGOPFTUwIdW6mimFqLCYtpdfwfibVsokvvbQA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-04-20 16:32:29,748:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-04-20 16:32:29,748:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 20 Apr 2024 14:32:14 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602692837 Replay-Nonce: 1Th9QjuppI0nQSZFM_D7qiyPYJ7tvWkobk4DwV20o7A9Cq_7lO8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:16:25Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432570877" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602692837" } 2024-04-20 16:32:29,749:DEBUG:acme.client:Storing nonce: 1Th9QjuppI0nQSZFM_D7qiyPYJ7tvWkobk4DwV20o7A9Cq_7lO8 2024-04-20 16:32:29,749:DEBUG:acme.client:JWS payload: b'' 2024-04-20 16:32:29,755:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432570877: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBwSTBuUVNaRk1fRDdxaXlQWUo3dHZXa29iazREd1YyMG83QTlDcV83bE84IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI1NzA4NzcifQ", "signature": "x2QI5Zaot2Y0XjEmLu-JDbE3f9ZN-C-_tYlkshEyGtg8ly4EHNcQB_1CL2VDm3q7p15775eLxWM-8nZCBlP8_RN4pYLS3nz9elvs1htDDtjuMJSvLCTHT--kN9akBiZGkThRpdtmqa715kg-fU4Aqzv7PsxTQhDlVcmOnem5FlIjN7CF_0S-7YfVjWAia1l7OEqq6Lpp-EbBaW4ZnnNhRAzHwBK5KmEvUkoJNUqGLXyBcinJ7LvIJiLQ6S0k5Wc9l_WLX3jj8Tvz0946fOao-FsgHyN2GG_6FcFzhgYXDF63JWkTBa2eFre1t8mWCM4cncxm2xLRg95mxPHS6Ue4AA", "payload": "" } 2024-04-20 16:32:29,917:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432570877 HTTP/1.1" 200 809 2024-04-20 16:32:29,918:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:32:15 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9Qjupq4rVg4J6oRXYCcmS1ZEQVkag_Mh4fG14AoNYaXKU1Kc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:16:25Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432570877/IP7Jnw", "token": "6wDg_FeOhbW91soX0twO-HqBmGz9rn_f6CKB-7YK190" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432570877/jfJGPg", "token": "6wDg_FeOhbW91soX0twO-HqBmGz9rn_f6CKB-7YK190" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432570877/AYFk4w", "token": "6wDg_FeOhbW91soX0twO-HqBmGz9rn_f6CKB-7YK190" } ] } 2024-04-20 16:32:29,919:DEBUG:acme.client:Storing nonce: 1Th9Qjupq4rVg4J6oRXYCcmS1ZEQVkag_Mh4fG14AoNYaXKU1Kc 2024-04-20 16:32:29,919:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-20 16:32:29,920:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-04-20 16:32:29,920:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-20 16:32:29,921:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-20 16:32:29,922:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-20 16:32:29,923:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-20 16:32:29,923:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-20 16:32:29,923:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-20 16:32:29,924:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-20 16:32:29,976:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-20 16:32:30,338:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-20 16:32:30,340:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2024-04-20 16:32:30,341:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2024-04-20 16:32:30,349:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:17 UTC. 2024-04-20 16:32:30,350:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-20 16:32:30,350:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-20 16:32:30,355:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-20 16:32:30,355:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-20 16:32:30,355:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-20 16:32:30,360:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-20 16:32:30,361:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-20 16:32:30,364:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-20 16:32:30,827:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-20 16:32:30,828:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:32:15 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "86aBj0E2-fI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-20 16:32:30,828:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-20 16:32:34,875:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7776_key-certbot.pem 2024-04-20 16:32:38,605:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7774_csr-certbot.pem 2024-04-20 16:32:38,605:DEBUG:acme.client:Requesting fresh nonce 2024-04-20 16:32:38,605:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-20 16:32:38,773:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-20 16:32:38,774:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:32:23 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9QjuphwKpQSNv0T3rTOHeusBKwc1cwD3M_fQVQ8KbSnUsGIE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-20 16:32:38,774:DEBUG:acme.client:Storing nonce: 1Th9QjuphwKpQSNv0T3rTOHeusBKwc1cwD3M_fQVQ8KbSnUsGIE 2024-04-20 16:32:38,774:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-04-20 16:32:38,779:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBod0twUVNOdjBUM3JUT0hldXNCS3djMWN3RDNNX2ZRVlE4S2JTblVzR0lFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "wltSc7tLvD5rjCAiYNH7NFlWIlC_awhFexT12Fu1SxjRr0XPrfVJJQaRZR0KRcEoRq4MuondTWz9D2JmNcLJ_9USV6DBNi6yyeXsR3HtKDo9eM6uvcmDdgXCOoTA08lfByGJVg7g0hwzuG50kLPMDDLDhdu3LRs-uP_fLOD9u5ZUr6MAiEAb-jh0I7_3OeOqo1uo29kuVyGRIvBAWjeNIHuswTSk9_TaQyfrQWe_vXdIyiDCaKkYum4KfQuLNsWYQoX8OWF5EUwbOhkKF7uqYY1KoxCk3kXsr0SWdfohd81LHTheoEKKwLPc2P27qNhCPqvku4sA50xQpr4vgPJJLQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-20 16:32:39,022:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-20 16:32:39,024:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 20 Apr 2024 14:32:24 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602722417 Replay-Nonce: sW-8q43NL1I43ZlumtnAwPmgdENghQODLFuDx0nHwhX6fkEnNk8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:16:35Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432614317" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602722417" } 2024-04-20 16:32:39,024:DEBUG:acme.client:Storing nonce: sW-8q43NL1I43ZlumtnAwPmgdENghQODLFuDx0nHwhX6fkEnNk8 2024-04-20 16:32:39,025:DEBUG:acme.client:JWS payload: b'' 2024-04-20 16:32:39,037:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432614317: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M05MMUk0M1psdW10bkF3UG1nZEVOZ2hRT0RMRnVEeDBuSHdoWDZma0VuTms4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI2MTQzMTcifQ", "signature": "q7SdpQXn9pKVDrjEgE3RcpPQw7pcR9GTW2HbtMgadInyhLJ1uyRzFf4q-FoYS-qj0C88KSWF2jX89vmFUNBgKCyWXwjMG5HytIFuWnybd0JmwsYY-6QjShwph59SxMpGNJnmfoJK5BmYkQyE2JXXjo6oSVMCPNbN5uuRxyym_yJMznEiD-do1guXT8638jjgtWiaO3fYX3R63rhVi-uLt5ydt95gFLOIzApdjxbjamF2ItfTrKsPG-_LlKYOiHB7rDeKlUMZbxWNEKZn-BrOd0Jbb-_A6K2zqe8WbMq8VU0EzZim-XuSc1XfjRlG8UA2LgyWzTo8GYrt4pkadiv86A", "payload": "" } 2024-04-20 16:32:39,197:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432614317 HTTP/1.1" 200 805 2024-04-20 16:32:39,197:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:32:24 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9QjupifOYwbroJvsBvW0Db1D2zDd4KVuXqZ_VUDqUNyfpiyI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:16:35Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432614317/xAjnBA", "token": "RG1vFP3wsSY4J9gUkurgcdKS0Hmm4ra8cQyi1u1JM6U" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432614317/eaCuPQ", "token": "RG1vFP3wsSY4J9gUkurgcdKS0Hmm4ra8cQyi1u1JM6U" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432614317/2jUEjw", "token": "RG1vFP3wsSY4J9gUkurgcdKS0Hmm4ra8cQyi1u1JM6U" } ] } 2024-04-20 16:32:39,197:DEBUG:acme.client:Storing nonce: 1Th9QjupifOYwbroJvsBvW0Db1D2zDd4KVuXqZ_VUDqUNyfpiyI 2024-04-20 16:32:39,198:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-20 16:32:39,198:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-04-20 16:32:39,199:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-20 16:32:39,199:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-20 16:32:39,200:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-20 16:32:39,200:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-20 16:32:39,200:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-20 16:32:39,201:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-20 16:32:39,202:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-20 16:32:39,256:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-20 16:32:40,436:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-20 16:32:40,438:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-20 16:32:40,439:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-20 16:32:40,448:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:34 UTC. 2024-04-20 16:32:40,448:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-20 16:32:40,448:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-20 16:32:40,453:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-20 16:32:40,453:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-20 16:32:40,453:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-20 16:32:40,457:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-20 16:32:40,458:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-20 16:32:40,460:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-20 16:32:40,926:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-20 16:32:40,926:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:32:26 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "bd4pUVgzmyo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-20 16:32:40,927:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-20 16:32:44,709:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7777_key-certbot.pem 2024-04-20 16:32:48,447:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7775_csr-certbot.pem 2024-04-20 16:32:48,448:DEBUG:acme.client:Requesting fresh nonce 2024-04-20 16:32:48,448:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-20 16:32:48,603:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-20 16:32:48,604:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:32:33 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43NSSNjO6nh63dCHiQRzZf9--yJiNqG3uAmrRLApf65rpo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-20 16:32:48,604:DEBUG:acme.client:Storing nonce: sW-8q43NSSNjO6nh63dCHiQRzZf9--yJiNqG3uAmrRLApf65rpo 2024-04-20 16:32:48,605:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-04-20 16:32:48,613:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M05TU05qTzZuaDYzZENIaVFSelpmOS0teUppTnFHM3VBbXJSTEFwZjY1cnBvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "VpXlRJofvlOIGdhubB45HncZS3t4LMypf-PdpkVLjPKhR__qtC_FbtPFV74RMiAdB_mmAm5Mcj7qXfDkA8rnKPaQy2qovUrPUP4qcgtWv5g6O6qh33BFsGge9WQYDpF5BvX5-J5Y2N0aHSRtVf23NDrRkxDlUs2Bxts5H7SZnrFv6NQEu35UwW1LISfFC3oW5QkbzVtYuorjVz8PhCnZiefW6q3jPgiijiimHmuY0qSf-oQ21j72x-jtYJ6byNDg_CfOM6O0zOyCcsnnqD9H9Gi1atpsS0LDnTMKYMMBysnXvmnVqLf4C0Cj8yd2OzhluyTPGviqFsGB_AyW22IewQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-20 16:32:48,782:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-20 16:32:48,783:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 20 Apr 2024 14:32:33 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602748407 Replay-Nonce: sW-8q43NhaynjOJueDBBcp7NJPKWi4NvN48-BSwN-nLOMoj0Fc4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:16:44Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432651637" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602748407" } 2024-04-20 16:32:48,783:DEBUG:acme.client:Storing nonce: sW-8q43NhaynjOJueDBBcp7NJPKWi4NvN48-BSwN-nLOMoj0Fc4 2024-04-20 16:32:48,784:DEBUG:acme.client:JWS payload: b'' 2024-04-20 16:32:48,789:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432651637: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M05oYXluak9KdWVEQkJjcDdOSlBLV2k0TnZONDgtQlN3Ti1uTE9Nb2owRmM0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI2NTE2MzcifQ", "signature": "yxlBLch13hjitJyYkoEhaNik0ZYpW42LLGvemZKVvq2cK5VRUx70jM_UJIsZjF179nl5p8SNwQjqida7tbEZT2XNBMPgQY5rW0dlCVO3t7s703GOuFzhvBX73FsLaD8nz7d1-Zg6QsaClwemvGav9YA2JKrVL5RMefzEZTopYRLLf9SNkm2PQTixed2v80hqe5x6XnFn0X53lpIPNO5rIbAsVxl4SsBc5DHv0x2YINxjJekTX-LFGf1kwEjseQXswdyfbq9fcJQ8xGB8aCbEzVWFtWJf-tMZXR2Kw1Ah4azHdVvRqvVLyXfCXL4I64FV778XZcirmvrta_4rq1VQjQ", "payload": "" } 2024-04-20 16:32:48,949:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432651637 HTTP/1.1" 200 805 2024-04-20 16:32:48,950:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:32:34 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43NfRdN99zN4iGGsn4DYjeeMrmmfj4dvSfvb0XtLwRj7ig X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:16:44Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432651637/MmDBAg", "token": "tp6ABUDDbWbczEBv42KG5z6hEJeiI6L08Lc5HKW8gjA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432651637/zq-rkw", "token": "tp6ABUDDbWbczEBv42KG5z6hEJeiI6L08Lc5HKW8gjA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432651637/n89D0Q", "token": "tp6ABUDDbWbczEBv42KG5z6hEJeiI6L08Lc5HKW8gjA" } ] } 2024-04-20 16:32:48,951:DEBUG:acme.client:Storing nonce: sW-8q43NfRdN99zN4iGGsn4DYjeeMrmmfj4dvSfvb0XtLwRj7ig 2024-04-20 16:32:48,952:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-20 16:32:48,953:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-04-20 16:32:48,954:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-20 16:32:48,954:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-20 16:32:48,956:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-20 16:32:48,956:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-20 16:32:48,956:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-20 16:32:48,957:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-20 16:32:48,959:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-20 16:32:49,010:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-20 16:32:49,352:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-20 16:32:49,353:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-04-20 16:32:49,353:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-04-20 16:32:49,358:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:48 UTC. 2024-04-20 16:32:49,358:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-20 16:32:49,358:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-20 16:32:49,363:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-20 16:32:49,363:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-20 16:32:49,363:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-20 16:32:49,367:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-20 16:32:49,369:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-20 16:32:49,373:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-20 16:32:49,804:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-20 16:32:49,805:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:32:34 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "nwceAMSBuBY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-20 16:32:49,805:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-20 16:32:53,626:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7778_key-certbot.pem 2024-04-20 16:32:57,380:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7776_csr-certbot.pem 2024-04-20 16:32:57,381:DEBUG:acme.client:Requesting fresh nonce 2024-04-20 16:32:57,381:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-20 16:32:57,526:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-20 16:32:57,527:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:32:42 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyaMcJ5BOLpNw7VRQIbqak81swDvkat1LKdSwlWAO-FvAE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-20 16:32:57,528:DEBUG:acme.client:Storing nonce: Y89UXNyaMcJ5BOLpNw7VRQIbqak81swDvkat1LKdSwlWAO-FvAE 2024-04-20 16:32:57,528:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-04-20 16:32:57,536:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWFNY0o1Qk9McE53N1ZSUUlicWFrODFzd0R2a2F0MUxLZFN3bFdBTy1GdkFFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "OVrlc_sjnzec6-Nq6-gz-y4kSwSuKz6XinibXwsLihNjUun-_Z6KxxqD98wiFPGOWvGY9RXOqf1999RGDmrg0DBDj2A9HF7bIy-PPcvLbJPQAEVfqdsu4FYDxG6q7Yh2bhZJbmtm5gb6rxnEjyeKKuBW_vj0zly1WwbalavkDz-ZTFBBA5mikw1is4CPsd8Q2i9f1AiNzfBH-FRwZfStUkbnKVe_q79OVYDIRNRs3OxXXZJl5qEJfP068gZaLp-3bSi-lK5UKccr8zw_CTBXV9bJu6k_x5vct38-P3xdpHG1va8-b2SFTxjz8LYLImKYgoUP_4FHXiGvhAHZYVikrA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-20 16:32:57,700:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-20 16:32:57,700:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 20 Apr 2024 14:32:42 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602776607 Replay-Nonce: FUnC6kMpHUALz0EB6DH8V3pORQhzQKBehzprkduRcn1S7YvLKB0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:16:53Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432691097" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602776607" } 2024-04-20 16:32:57,701:DEBUG:acme.client:Storing nonce: FUnC6kMpHUALz0EB6DH8V3pORQhzQKBehzprkduRcn1S7YvLKB0 2024-04-20 16:32:57,701:DEBUG:acme.client:JWS payload: b'' 2024-04-20 16:32:57,706:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432691097: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBIVUFMejBFQjZESDhWM3BPUlFoelFLQmVoenBya2R1UmNuMVM3WXZMS0IwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI2OTEwOTcifQ", "signature": "Ijlw4w-uSM2BkqiyHOKl4XShgH7NEp2bkqA1ENK86xHOexsSfGLKXsPfEXOp4yV3buW-COsrK_5_86CERcV33b__cJ81uampLXBzzyx_ziajyt1lZpGGp77QIpK8BZmF9jSA4mIT71JZaTpAHdaKoKuWBw8CAr0jaOy_L4GSLByw-07ClbwMKst2dITy4Oqt7pSjXaUlOFrS8sgE02ISnGrX-NB5EmXHUS9-53YbRtRkxUlH-Ng3ZydaafUUqQ8TQ1lvakTLEUZ85RFPKbtkoT5OL_MCNqOsV6wXGyrpjjbJnACHtY_BNts2a1jPlUb87fZd33zVRbMXf6es5h3hig", "payload": "" } 2024-04-20 16:32:57,877:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432691097 HTTP/1.1" 200 805 2024-04-20 16:32:57,877:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 20 Apr 2024 14:32:43 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMpjWPM4DSrWPfiJSgGwTK0SPHwumEPQQWy4DAasASXzM4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:16:53Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432691097/PSRvrQ", "token": "RlxqSNpNGDiYI8pHcb4-btU3K4CtHRMPAT7ZeQIyKUU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432691097/SZF9hg", "token": "RlxqSNpNGDiYI8pHcb4-btU3K4CtHRMPAT7ZeQIyKUU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432691097/9pqO_A", "token": "RlxqSNpNGDiYI8pHcb4-btU3K4CtHRMPAT7ZeQIyKUU" } ] } 2024-04-20 16:32:57,877:DEBUG:acme.client:Storing nonce: FUnC6kMpjWPM4DSrWPfiJSgGwTK0SPHwumEPQQWy4DAasASXzM4 2024-04-20 16:32:57,878:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-20 16:32:57,878:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-04-20 16:32:57,879:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-20 16:32:57,879:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-20 16:32:57,880:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-20 16:32:57,880:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-20 16:32:57,880:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-20 16:32:57,881:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-20 16:32:57,882:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-20 16:32:57,882:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-04-20 16:32:57,882:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-04-20 16:32:57,894:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-04-20 16:32:57,895:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)