2024-04-18 22:03:10,388:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-04-18 22:03:10,389:DEBUG:certbot._internal.main:Arguments: [] 2024-04-18 22:03:10,389:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-04-18 22:03:11,565:DEBUG:certbot._internal.log:Root logging level set at 20 2024-04-18 22:03:11,565:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-04-18 22:03:11,608:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-04-18 22:03:11,652:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-18 22:03:11,938:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-18 22:03:11,939:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert9.pem is signed by the certificate's issuer. 2024-04-18 22:03:11,943:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert9.pem is: OCSPCertStatus.GOOD 2024-04-18 22:03:11,951:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:24 UTC. 2024-04-18 22:03:11,952:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-18 22:03:11,952:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-18 22:03:11,957:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-18 22:03:11,957:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-18 22:03:11,957:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-18 22:03:11,963:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-18 22:03:11,964:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-18 22:03:11,966:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-18 22:03:12,467:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-18 22:03:12,467:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:02:59 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "170zDDy1ntY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-18 22:03:12,468:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-18 22:03:17,590:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7714_key-certbot.pem 2024-04-18 22:03:22,599:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7712_csr-certbot.pem 2024-04-18 22:03:22,600:DEBUG:acme.client:Requesting fresh nonce 2024-04-18 22:03:22,600:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-18 22:03:22,752:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-18 22:03:22,753:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:03:09 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyayL3Vt4jJNE067Apx6Z8EcbY5W26SP2qFeNDtN5n1VPI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-18 22:03:22,753:DEBUG:acme.client:Storing nonce: Y89UXNyayL3Vt4jJNE067Apx6Z8EcbY5W26SP2qFeNDtN5n1VPI 2024-04-18 22:03:22,753:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-04-18 22:03:22,759:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWF5TDNWdDRqSk5FMDY3QXB4Nlo4RWNiWTVXMjZTUDJxRmVORHRONW4xVlBJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "OCtpRGcPICPv64oilVl0H0FkdRWAjNhos7ijIB0PzFwiQGyPmNRKi9mIsvB1EvSP52mdijujJi7-DAwM3oYHUC72Vx6p8nRXdEMyVywjzBI76wbqvpVLjyW-izFie1zMBwGyuz8OFykqt08Wtb53uoS-CtNX1nCISTgLqR9XStgtuCIwFUBdOJLV7w2BypcdC-M39n_rxOYKi9CYtQ0aChQ1dSRbUvTT8V236LU7xrz-InuQxP-K191B3CO85kZIW0g6fSfzGvZ7_P7Aov7WVET-w-gs1LKhxWzQK6e7XtpGhXlyFJgmvNcs8iOToDX0aRfyCCUkW3v4Tj_8ixOLiA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-18 22:03:23,009:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-04-18 22:03:23,010:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 18 Apr 2024 20:03:09 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602379477 Replay-Nonce: Y89UXNyaO6EkVSdXh2Qpx3-YOSPOnEvxLiQt1-fH4FeTsFfMjj8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:01Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432133867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602379477" } 2024-04-18 22:03:23,010:DEBUG:acme.client:Storing nonce: Y89UXNyaO6EkVSdXh2Qpx3-YOSPOnEvxLiQt1-fH4FeTsFfMjj8 2024-04-18 22:03:23,010:DEBUG:acme.client:JWS payload: b'' 2024-04-18 22:03:23,022:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432133867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWFPNkVrVlNkWGgyUXB4My1ZT1NQT25FdnhMaVF0MS1mSDRGZVRzRmZNamo4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIxMzM4NjcifQ", "signature": "Fk9h7aWLJEuVgxMJf9TTtNzKfEno-_jjk_XRzHV0Pt7-eHMWrzR7iWVd68HVxCX-Chp-kZOSQeEPMACf2ObrdVTeiZY7nC6uxpVhm5pIqGYCJ4zkGmdIB3I6JwO8r-1KbLKXUYeAXeZprIbAmZcSkQbH391mSiAQn-bz_ACftx5ZwI9iPoLX6171WCmKlqlquAxhleGl-B70NWmCxs4_jHoe2UCcbM-g3nMjtXNrnyZKkCiBc2Em-6Ps4Hx2u-wruhWCvq3B2m2OOZ_orOVkCcVnmJ-sahVziT-US9iY1LNPpghqtNDTExfc8xP222FSo9Ss8YSXhRGMh4lQAeg9LA", "payload": "" } 2024-04-18 22:03:23,240:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432133867 HTTP/1.1" 200 810 2024-04-18 22:03:23,241:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:03:09 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyavTKGfyuy3F3idGtGFnX30Yc9Lm2gCqqscWiNpAkIJpo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:01Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432133867/bALmag", "token": "K5BL7NCUQz-VErlSqOmjI6HLe61h0mHLoAf5V7HRxcQ" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432133867/gKZ-RA", "token": "K5BL7NCUQz-VErlSqOmjI6HLe61h0mHLoAf5V7HRxcQ" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432133867/BZrX6Q", "token": "K5BL7NCUQz-VErlSqOmjI6HLe61h0mHLoAf5V7HRxcQ" } ] } 2024-04-18 22:03:23,241:DEBUG:acme.client:Storing nonce: Y89UXNyavTKGfyuy3F3idGtGFnX30Yc9Lm2gCqqscWiNpAkIJpo 2024-04-18 22:03:23,242:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-18 22:03:23,242:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-04-18 22:03:23,243:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-18 22:03:23,243:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-18 22:03:23,258:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-18 22:03:23,259:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-18 22:03:23,259:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-18 22:03:23,259:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-18 22:03:23,266:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-18 22:03:23,309:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-18 22:03:23,584:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-18 22:03:23,585:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-18 22:03:23,586:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-18 22:03:23,591:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:42 UTC. 2024-04-18 22:03:23,591:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-18 22:03:23,591:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-18 22:03:23,596:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-18 22:03:23,597:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-18 22:03:23,597:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-18 22:03:23,602:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-18 22:03:23,603:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-18 22:03:23,605:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-18 22:03:24,147:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-18 22:03:24,147:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:03:10 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "ySRVM7vc05Q": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-04-18 22:03:24,148:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-18 22:03:29,121:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7715_key-certbot.pem 2024-04-18 22:03:33,766:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7713_csr-certbot.pem 2024-04-18 22:03:33,767:DEBUG:acme.client:Requesting fresh nonce 2024-04-18 22:03:33,767:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-18 22:03:33,945:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-18 22:03:33,945:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:03:20 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9QjupQLN8ajqkHm2X2itAb6EnS4qurObCX9w9chyLv9rCoK8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-18 22:03:33,945:DEBUG:acme.client:Storing nonce: 1Th9QjupQLN8ajqkHm2X2itAb6EnS4qurObCX9w9chyLv9rCoK8 2024-04-18 22:03:33,946:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-04-18 22:03:33,952:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBRTE44YWpxa0htMlgyaXRBYjZFblM0cXVyT2JDWDl3OWNoeUx2OXJDb0s4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ovtbmrOU7zaw7AYrNroS7YsJvf1uoLIFz3vAui6tpBRUgiRykIYLzwY5b67UgTdvpPRnfi6utaDpVUfkTNyuJnavhl6BGnrhI02vkOgFxMEavpPCtBpRMbGayd9cclSYJm6QYA1t599cwMmFGt0NfhGcQ93E65_Yv8DIMxN0PdHU9VzsrfIgHcOfNEy_pH2Zig4FfVzSgF7h1Ing8lHhL0hr1BH_hX440QPs-9Z4misbklxbQq2H8SsjZZoGj53PrtgRUvSAAqlEBXqQ2r-_GD_yy-AQcUezZFFdnW7mOQdGOIOm8tEXtu8QRYxtW9DW0k7ptJpQV4kZJrdfJJ47Rw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-18 22:03:34,145:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-04-18 22:03:34,146:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 18 Apr 2024 20:03:20 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602436727 Replay-Nonce: 1Th9Qjup9g4VgpW82sn0FqoXE5sZQ4Zif6eg9Yh7vqekcLG2Nd8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:11Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432206077" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602436727" } 2024-04-18 22:03:34,146:DEBUG:acme.client:Storing nonce: 1Th9Qjup9g4VgpW82sn0FqoXE5sZQ4Zif6eg9Yh7vqekcLG2Nd8 2024-04-18 22:03:34,146:DEBUG:acme.client:JWS payload: b'' 2024-04-18 22:03:34,152:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432206077: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXA5ZzRWZ3BXODJzbjBGcW9YRTVzWlE0WmlmNmVnOVloN3ZxZWtjTEcyTmQ4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIyMDYwNzcifQ", "signature": "O9fcir0htvSuLzTUNd0NrnG8IoxO2HTBqbzL1jN10IxcS5mg3djhtQtbPuswT5m3dtv-QswmnZOI2V1o7OvIWkc5mmHghAiyiH7nQHhG5GOFtcCM9-rob6cSJ-qOwAcchFBuqSxutSbs7YFDr1Qxy3Y_vHrRQYh-sQAnlDb_QUd0ifW9wN2zYhO8QMyiDGH3F8qSmTQze8W93dqPoYE9v3c-uNtgXWWchRy5rXGWu4QIr2ksQWjqXz7WDroqKrmZ93cYnuamHsgwgNs2p9ON2oOroYGDSZmnPwjnJjqdWKsFvW2N_DXVQ_nogTjcIv5J-NRSqGBPYNG6JgaU55xk6Q", "payload": "" } 2024-04-18 22:03:34,333:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432206077 HTTP/1.1" 200 804 2024-04-18 22:03:34,333:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:03:20 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9QjupGFe3n4iKbsL88n7-ihcGVmgI8KhmjqietJWit44paWI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:11Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432206077/OpeY4Q", "token": "X4bQwYTZ4W5JqVqboZqq5o8SNpfHBgyfHNBkYg8eWNo" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432206077/WcE4Tg", "token": "X4bQwYTZ4W5JqVqboZqq5o8SNpfHBgyfHNBkYg8eWNo" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432206077/Seqm7Q", "token": "X4bQwYTZ4W5JqVqboZqq5o8SNpfHBgyfHNBkYg8eWNo" } ] } 2024-04-18 22:03:34,334:DEBUG:acme.client:Storing nonce: 1Th9QjupGFe3n4iKbsL88n7-ihcGVmgI8KhmjqietJWit44paWI 2024-04-18 22:03:34,334:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-18 22:03:34,334:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-04-18 22:03:34,335:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-18 22:03:34,335:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-18 22:03:34,336:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-18 22:03:34,336:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-18 22:03:34,336:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-18 22:03:34,337:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-18 22:03:34,338:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-18 22:03:34,391:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-18 22:03:34,627:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-18 22:03:34,627:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-04-18 22:03:34,628:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-04-18 22:03:34,633:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:56 UTC. 2024-04-18 22:03:34,633:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-18 22:03:34,633:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-18 22:03:34,639:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-18 22:03:34,640:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-18 22:03:34,640:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-18 22:03:34,646:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-18 22:03:34,647:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-18 22:03:34,650:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-18 22:03:35,212:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-18 22:03:35,213:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:03:21 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "VEtkrXp5Sqg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-18 22:03:35,214:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-18 22:03:39,982:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7716_key-certbot.pem 2024-04-18 22:03:44,632:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7714_csr-certbot.pem 2024-04-18 22:03:44,632:DEBUG:acme.client:Requesting fresh nonce 2024-04-18 22:03:44,633:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-18 22:03:44,794:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-18 22:03:44,794:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:03:31 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyarzKhMIt6hXdfqQEL4RZWh0IvvuLTMx2NeAnWTr_LqBg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-18 22:03:44,795:DEBUG:acme.client:Storing nonce: Y89UXNyarzKhMIt6hXdfqQEL4RZWh0IvvuLTMx2NeAnWTr_LqBg 2024-04-18 22:03:44,795:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-04-18 22:03:44,801:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWFyektoTUl0NmhYZGZxUUVMNFJaV2gwSXZ2dUxUTXgyTmVBbldUcl9McUJnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "aMNAHHNuZekGwJ5tKiPZ5oQhLW91pJuxJ3GgFSfDnbfMXwAjHi8Bw-rqOLVawEE653TOYHUBINdEKC8T2gkFApbFKwH5e80IgNkhLBoPveMYFvi84DAqpty05OxI56LXmSbqonjvSLN2gBSAVFjAaafuu_UVkhOl2tqMet3bXiLYvnmFdQCiS8EDkiltcferfl9oENdN_vyH_w2-Rf_-pbz2zEoGlWsPK9PNh938ShRrzXgwWjDW7oKppAsfL_kJnl_twOzvIpfGTEFiTCEcMLd_ISJLpVMKnhcd_S48Tz1KQl4VWzVuhsKYBnwUD9U8_e2E0n1BV1QDL0uFAkHEbQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-18 22:03:44,979:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-04-18 22:03:44,980:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 18 Apr 2024 20:03:31 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602470407 Replay-Nonce: Y89UXNyaw_-sf8aRTHNmg9j8TiCB7RYbuN84kxhVA-Nbvnb9WsQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:20Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432255557" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602470407" } 2024-04-18 22:03:44,980:DEBUG:acme.client:Storing nonce: Y89UXNyaw_-sf8aRTHNmg9j8TiCB7RYbuN84kxhVA-Nbvnb9WsQ 2024-04-18 22:03:44,981:DEBUG:acme.client:JWS payload: b'' 2024-04-18 22:03:44,987:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432255557: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWF3Xy1zZjhhUlRITm1nOWo4VGlDQjdSWWJ1Tjg0a3hoVkEtTmJ2bmI5V3NRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIyNTU1NTcifQ", "signature": "klOAf-MUkUI4Fdv8CyXjA8zy809UiScFYqLRy67snjC3AWdOyw7o5WO1XMaV8s2c89R_GjlL7PxSloHIRIPxXoqLpu7tdcNuLur2TThqnmSGYUPRFrVb3YTU65JGlh5SoSOEuA3k6KONaPyhimR9sS983MYkv5G5FZXTyZVyOWzwmPvWwee3Q3A4Mub9bHnY4iO80GCaKznBLsZSjECoWa3VL3sgWxxpx6bnK0vyb1V3OMv7A74mdIVspqc1Xs_MATTKgTNGDs1cpU7qtotJIysL71o0OvOX3h-HV2hGd2zlK7yWR8WbGV_eYn1-jINwKzy97LjEF6ewufgJLbtdEA", "payload": "" } 2024-04-18 22:03:45,167:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432255557 HTTP/1.1" 200 807 2024-04-18 22:03:45,167:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:03:31 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMpyKx-pnehMKt58yAFnQ6AYx0kwvG_YBptEZ0x21cQYYo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:20Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432255557/ipHR3w", "token": "4ALo7VXKOBw9xqOcrY3miutsXnJQ4sVo7evhXW1kyPg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432255557/pey6Vw", "token": "4ALo7VXKOBw9xqOcrY3miutsXnJQ4sVo7evhXW1kyPg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432255557/af6Vwg", "token": "4ALo7VXKOBw9xqOcrY3miutsXnJQ4sVo7evhXW1kyPg" } ] } 2024-04-18 22:03:45,168:DEBUG:acme.client:Storing nonce: FUnC6kMpyKx-pnehMKt58yAFnQ6AYx0kwvG_YBptEZ0x21cQYYo 2024-04-18 22:03:45,168:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-18 22:03:45,168:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-04-18 22:03:45,169:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-18 22:03:45,169:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-18 22:03:45,170:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-18 22:03:45,170:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-18 22:03:45,170:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-18 22:03:45,170:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-18 22:03:45,171:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-18 22:03:45,224:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-18 22:03:45,491:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-18 22:03:45,492:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-18 22:03:45,492:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-18 22:03:45,497:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:14 UTC. 2024-04-18 22:03:45,497:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-18 22:03:45,497:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-18 22:03:45,502:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-18 22:03:45,503:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-18 22:03:45,503:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-18 22:03:45,519:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-18 22:03:45,520:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-18 22:03:45,522:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-18 22:03:45,990:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-18 22:03:45,991:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:03:32 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "vmX2n08FX5g": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-04-18 22:03:45,992:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-18 22:03:50,731:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7717_key-certbot.pem 2024-04-18 22:03:55,402:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7715_csr-certbot.pem 2024-04-18 22:03:55,403:DEBUG:acme.client:Requesting fresh nonce 2024-04-18 22:03:55,403:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-18 22:03:55,574:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-18 22:03:55,575:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:03:42 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMpvp1lGWn5-CJXaVYPEOBjxzt2OltvkSUqy7DTFayo1QI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-18 22:03:55,575:DEBUG:acme.client:Storing nonce: FUnC6kMpvp1lGWn5-CJXaVYPEOBjxzt2OltvkSUqy7DTFayo1QI 2024-04-18 22:03:55,575:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-04-18 22:03:55,582:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXB2cDFsR1duNS1DSlhhVllQRU9Canh6dDJPbHR2a1NVcXk3RFRGYXlvMVFJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "XczB9Bu8LZnlqWCxHVyLuI0pVl8sC1AZ7k5dwJ1BzewssB4XfbZeFGk2nICKwATz8dWyXgNLPJN42JwawgAooyRCE9hQNmGPjeLxnG19WGkMSD9RdEWcUsJN5T4C2_cEiaOEdLTPouKeIveAIj5_0P1WGZz58ErIviU9PSTVei6XDsb5NoaP47mfWRKgVgxgUF2iEqL3gdfD-D97bnzaFyiVqOrz9Tl_Erqjf0vAsAIvrjgvDx5RWhwX_dWMYBumYeSm8QdooWQcp4mYOFRRZNMc_PlRUujt_jkR5F65fnMazuGl--X8yPnN_AWc2fzwzYH2JU9aJBixtBBvWMd8ug", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-18 22:03:55,754:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-04-18 22:03:55,755:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 18 Apr 2024 20:03:42 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602501577 Replay-Nonce: Y89UXNya0rz9BTVXTyxgzqppp_ZB3jGxRAZj0CMU9MkHEdiuJh4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:29Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432301817" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602501577" } 2024-04-18 22:03:55,755:DEBUG:acme.client:Storing nonce: Y89UXNya0rz9BTVXTyxgzqppp_ZB3jGxRAZj0CMU9MkHEdiuJh4 2024-04-18 22:03:55,756:DEBUG:acme.client:JWS payload: b'' 2024-04-18 22:03:55,761:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432301817: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWEwcno5QlRWWFR5eGd6cXBwcF9aQjNqR3hSQVpqMENNVTlNa0hFZGl1Smg0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIzMDE4MTcifQ", "signature": "RCElZN_BjJBt38ywlfrOMBd5b4g6DhFIShmjSCjAkydO1gPxT-SDCgF5zHzYRj32plHbfscKYlyg0JAxlU6M5QUUp1EleR_o926SRgoZv_CkYZz0M8sPSUkQ3rQnhRB8p4vxFCw4ddBWl_vK6rkApGpYe_HkS5dDP3O9fET0uyb8gdHrjdHUuET69VjynvQpkrgyTVcbOrT6vkGzZERx4qs3xtOSdxqPfoqCn8oTuTO0pqhgIFEx_2ySMUvqpTUleBu98f2-TbF53DyDeps-vBGyFZnsZIc4OkO7nne82wkqAVBSQyuw88cVSgTHFm2rC-oeeGnVqVEMEUf-he0npg", "payload": "" } 2024-04-18 22:03:55,929:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432301817 HTTP/1.1" 200 801 2024-04-18 22:03:55,930:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:03:42 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMp_HvkszLVAFqnbazdADZS3wtalJeq06_6CzJ-dD0gQI0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:29Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432301817/KUsjpA", "token": "aJoctLqucZb2n7qPJSTGLKpqSvnhh5SD51cTgx2saDg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432301817/GSkFsw", "token": "aJoctLqucZb2n7qPJSTGLKpqSvnhh5SD51cTgx2saDg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432301817/hKNbdQ", "token": "aJoctLqucZb2n7qPJSTGLKpqSvnhh5SD51cTgx2saDg" } ] } 2024-04-18 22:03:55,930:DEBUG:acme.client:Storing nonce: FUnC6kMp_HvkszLVAFqnbazdADZS3wtalJeq06_6CzJ-dD0gQI0 2024-04-18 22:03:55,931:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-18 22:03:55,931:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-04-18 22:03:55,932:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-18 22:03:55,932:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-18 22:03:55,933:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-18 22:03:55,933:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-18 22:03:55,933:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-18 22:03:55,933:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-18 22:03:55,935:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-18 22:03:55,989:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-18 22:03:56,221:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-18 22:03:56,222:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-18 22:03:56,223:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-18 22:03:56,228:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:32 UTC. 2024-04-18 22:03:56,228:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-18 22:03:56,229:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-18 22:03:56,236:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-18 22:03:56,236:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-18 22:03:56,236:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-18 22:03:56,251:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-18 22:03:56,252:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-18 22:03:56,254:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-18 22:03:56,714:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-18 22:03:56,715:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:03:43 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "gYaJKX49OI0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-18 22:03:56,715:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-18 22:04:01,628:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7718_key-certbot.pem 2024-04-18 22:04:06,190:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7716_csr-certbot.pem 2024-04-18 22:04:06,191:DEBUG:acme.client:Requesting fresh nonce 2024-04-18 22:04:06,191:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-18 22:04:06,352:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-18 22:04:06,352:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:03:52 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNya5mqg-h9TZoK-msd49_f3Fz1mhq8vxK8PCfqYCisNn60 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-18 22:04:06,353:DEBUG:acme.client:Storing nonce: Y89UXNya5mqg-h9TZoK-msd49_f3Fz1mhq8vxK8PCfqYCisNn60 2024-04-18 22:04:06,353:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-04-18 22:04:06,360:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWE1bXFnLWg5VFpvSy1tc2Q0OV9mM0Z6MW1ocTh2eEs4UENmcVlDaXNObjYwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Tu1TV8-6bEd4DExhkrQcpc1DW9dE5mmZZTgFGRGPH_JbRcFySMUiX8B9jFFlh9nlzJXqEH7fOrshX64MnPDb3oOELtd6QnE2CK9JaDHYTmgYG4ep0yJw2I_LfsJnubW_SBNZ3vQ-A6wlXhB-qOAs9IDY_GMHVx8fhOzIZ_hFkhrCS5RevmEP96EUHU35FPVwtlR3Wc3NRgett11OTc00WQDXCjvUhJYHvMKUhLxwnz8TYye4ioLRJA3rLwGseqQTBpUlpDZz1gJW0K5xDc27b5a_A2qt3QlIuuFpd1zfH-33v0HuHICnnXoIOhcgFYF4iD9oXt38Rnkyq4pWMcuNRw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-18 22:04:06,544:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-18 22:04:06,544:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 18 Apr 2024 20:03:53 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602530997 Replay-Nonce: Y89UXNyaWgDrZyBjqqaaLUcvwfh7m_GnDsmQlk0wEIXb18tZUoI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:39Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432345127" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602530997" } 2024-04-18 22:04:06,544:DEBUG:acme.client:Storing nonce: Y89UXNyaWgDrZyBjqqaaLUcvwfh7m_GnDsmQlk0wEIXb18tZUoI 2024-04-18 22:04:06,545:DEBUG:acme.client:JWS payload: b'' 2024-04-18 22:04:06,551:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432345127: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWTg5VVhOeWFXZ0RyWnlCanFxYWFMVWN2d2ZoN21fR25Ec21RbGswd0VJWGIxOHRaVW9JIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIzNDUxMjcifQ", "signature": "WtAwWVlrLGIiLfi6OOG63RRhhSQUs--Ih2YXpEO1nP6262UYKyGjKqI1ITIlYniynpaKMUkWeW57toCoXOgkOpEgzrpy4medsjrJ-SnBb7CXCSnUmHUQoHJyuR1d4kTQETlibZQRNELFoM0syvC3ugkSJhQIDKOXspYYz6jhPC2OabGQtoLEqdkixNprQH8FEeX8nmRAoPui3x2KTU9GJuYsC-fdMx7jbNfxPKwX1EHt1NghvlszwBGwaGxkHswvZt3GEfMdkTEwwkCEcI2XSBkJi1PQ0RJFZObE1mI1igqEsTnUyhBrN7RdfR7plVDA6Lmib6IcjaqmhDxZHGA79Q", "payload": "" } 2024-04-18 22:04:06,723:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432345127 HTTP/1.1" 200 805 2024-04-18 22:04:06,723:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:03:53 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNya7yqXhnYRcFd597pAejiLk3I4xKN9HKTamo79H7198KI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:39Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432345127/eBWc1Q", "token": "5UyKevrNT1gWHZXzXEnwqj5-0dF5Nn0eSvRut9pDKLs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432345127/m8stTw", "token": "5UyKevrNT1gWHZXzXEnwqj5-0dF5Nn0eSvRut9pDKLs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432345127/bNUYKA", "token": "5UyKevrNT1gWHZXzXEnwqj5-0dF5Nn0eSvRut9pDKLs" } ] } 2024-04-18 22:04:06,723:DEBUG:acme.client:Storing nonce: Y89UXNya7yqXhnYRcFd597pAejiLk3I4xKN9HKTamo79H7198KI 2024-04-18 22:04:06,724:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-18 22:04:06,724:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-04-18 22:04:06,725:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-18 22:04:06,725:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-18 22:04:06,726:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-18 22:04:06,726:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-18 22:04:06,726:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-18 22:04:06,727:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-18 22:04:06,728:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-18 22:04:06,779:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-18 22:04:07,058:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-18 22:04:07,060:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-04-18 22:04:07,060:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-04-18 22:04:07,065:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:48 UTC. 2024-04-18 22:04:07,065:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-18 22:04:07,066:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-18 22:04:07,071:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-18 22:04:07,071:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-18 22:04:07,071:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-18 22:04:07,082:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-18 22:04:07,083:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-18 22:04:07,085:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-18 22:04:07,541:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-18 22:04:07,542:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:03:54 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "3C9w0Ujr_tg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-18 22:04:07,542:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-18 22:04:12,148:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7719_key-certbot.pem 2024-04-18 22:04:16,727:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7717_csr-certbot.pem 2024-04-18 22:04:16,728:DEBUG:acme.client:Requesting fresh nonce 2024-04-18 22:04:16,728:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-18 22:04:16,890:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-18 22:04:16,890:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:04:03 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMpHXx6SbY-7nn5y5anSQENosvRFFomvjpnP4sauW0CvZs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-18 22:04:16,890:DEBUG:acme.client:Storing nonce: FUnC6kMpHXx6SbY-7nn5y5anSQENosvRFFomvjpnP4sauW0CvZs 2024-04-18 22:04:16,891:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-04-18 22:04:16,897:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBIWHg2U2JZLTdubjV5NWFuU1FFTm9zdlJGRm9tdmpwblA0c2F1VzBDdlpzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "KQ2CGnPClw-BD12-7g1cvscmegghqonGUbY-91d-x5lg2GpngQhYyJ-HqX9FHsvL7ci6Q0jF7YlZN-FptpnZZ8Z7aV7mbJINJ5KwMujuHdzW6QfC_pPuHZs3JS_-nQwv0SSqWktIJIeHrRqqVxv3HdqABMN9U7IKusnDsWEqay9GbxNesAacrYEvfslSzSdb1QB2N0cy-UEKZiOEfb3ONL9bwGFIbd0tSeZgoN4rhyi8mNI0MCp1aKIFh0bfWPpOwDqOZIrKpeM8iIMfNtEVQ_WzixL3WxvFQKtOWFXcsXjfm9Sv28CBTauHC7_tPiniX82UGdL44pKqF3vh3313xw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-04-18 22:04:17,089:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-04-18 22:04:17,090:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 18 Apr 2024 20:04:03 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602558537 Replay-Nonce: FUnC6kMpn3mvTIEIrsFZG1qTKAKbx3JNFeCGqLRueUK1F2KbzLk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:48Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432384097" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602558537" } 2024-04-18 22:04:17,090:DEBUG:acme.client:Storing nonce: FUnC6kMpn3mvTIEIrsFZG1qTKAKbx3JNFeCGqLRueUK1F2KbzLk 2024-04-18 22:04:17,090:DEBUG:acme.client:JWS payload: b'' 2024-04-18 22:04:17,096:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432384097: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBuM212VElFSXJzRlpHMXFUS0FLYngzSk5GZUNHcUxSdWVVSzFGMktiekxrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIzODQwOTcifQ", "signature": "bjLptBNVI0Y2taVCC83etztO5EH51koBscoaqdPrA_ZrXx6Z57K_uiZfdo3bKrUYbtzqvDhiyNjVqKy9MH8dU6Pe20dyvdj4RAbRmPdAhQ5jAOJmE7TtmaLarSRok80toQLNmLzxQq0SzpVCHzJgI-NsUXRgbNWhtxM0tgGZiX045MnJHcQSgz1tFjUK88wWaK3ZKefuQVSDkjJrq4vQCqxXia3Kcboxwja_bCMOCHy0FmeAzRmsO7S9iLNQdD7XOjfpT4oNE330cji4gTUcTYmRfcX-0vwZPMd5vVVsnGaGXj9wVzpAnygQJtIA3NbZ6Or1aF96zsyHYkW3BdAi2A", "payload": "" } 2024-04-18 22:04:17,369:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432384097 HTTP/1.1" 200 809 2024-04-18 22:04:17,370:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:04:04 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Y89UXNyaV0Fnk_9zw3UYospB2Fitbg3c7c6-xK1ZDLdt2VR5yv0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:48Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432384097/oy60bw", "token": "KdhtE0Xta-NlGc-BLHiR0CXHzhbLLW5SC-IuRAbvcm8" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432384097/_4L04g", "token": "KdhtE0Xta-NlGc-BLHiR0CXHzhbLLW5SC-IuRAbvcm8" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432384097/r2alHg", "token": "KdhtE0Xta-NlGc-BLHiR0CXHzhbLLW5SC-IuRAbvcm8" } ] } 2024-04-18 22:04:17,370:DEBUG:acme.client:Storing nonce: Y89UXNyaV0Fnk_9zw3UYospB2Fitbg3c7c6-xK1ZDLdt2VR5yv0 2024-04-18 22:04:17,370:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-18 22:04:17,371:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-04-18 22:04:17,371:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-18 22:04:17,372:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-18 22:04:17,372:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-18 22:04:17,373:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-18 22:04:17,373:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-18 22:04:17,373:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-18 22:04:17,374:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-18 22:04:17,418:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-18 22:04:17,691:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-18 22:04:17,692:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-18 22:04:17,693:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-18 22:04:17,698:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:06 UTC. 2024-04-18 22:04:17,699:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-18 22:04:17,699:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-18 22:04:17,704:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-18 22:04:17,705:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-18 22:04:17,705:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-18 22:04:17,722:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-18 22:04:17,723:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-18 22:04:17,725:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-18 22:04:18,179:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-18 22:04:18,180:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:04:04 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "ibFRn_70Tbc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-18 22:04:18,181:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-18 22:04:23,225:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7720_key-certbot.pem 2024-04-18 22:04:27,767:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7718_csr-certbot.pem 2024-04-18 22:04:27,767:DEBUG:acme.client:Requesting fresh nonce 2024-04-18 22:04:27,767:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-18 22:04:27,927:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-18 22:04:27,927:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:04:14 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMppIGUIkq6Rzut9PVuwpWINRPUKfeVruPrePww3vAvUCQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-18 22:04:27,927:DEBUG:acme.client:Storing nonce: FUnC6kMppIGUIkq6Rzut9PVuwpWINRPUKfeVruPrePww3vAvUCQ 2024-04-18 22:04:27,927:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-04-18 22:04:27,933:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBwSUdVSWtxNlJ6dXQ5UFZ1d3BXSU5SUFVLZmVWcnVQcmVQd3czdkF2VUNRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "QeGVrJCQ70ZNmn4__h8epUror-p3HLBCiwdkQLjv9PQUbkKk3NDVtrc1cjrZTHJW2TcS-HKcugg6erGc0TRDy_qy6sSDfgjfkWO_KlFTSMq3_29JMftIbpOu-Srnw9D3jaurps7IV_T2R5S8daaOCJL3beyj-1pFQE7MvlvRg2ZnI9uFP_Tetm4_D9qb1FCbdVoHqQ-AvC-F7JnV9WqeB0HORKZXn4UFlTR0iiPxe8Eza6pAfnqwYTm2U3ww0v99HwOzFYI9O91ldHKaa7-n3W4Cw2tE1sadTj7r6RvdJgpZSm7VIXaw5T-QKrc6cXH0yhQWgKj9BsRFj3VwDZCP4A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-04-18 22:04:28,185:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-04-18 22:04:28,186:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 18 Apr 2024 20:04:14 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602586927 Replay-Nonce: FUnC6kMp0Who1S5FyPaVoJ3PqX_UNBka9pNFmYlcMTZw_MOB20g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:58Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432423627" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602586927" } 2024-04-18 22:04:28,186:DEBUG:acme.client:Storing nonce: FUnC6kMp0Who1S5FyPaVoJ3PqX_UNBka9pNFmYlcMTZw_MOB20g 2024-04-18 22:04:28,186:DEBUG:acme.client:JWS payload: b'' 2024-04-18 22:04:28,191:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432423627: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXAwV2hvMVM1RnlQYVZvSjNQcVhfVU5Ca2E5cE5GbVlsY01UWndfTU9CMjBnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI0MjM2MjcifQ", "signature": "xEiK2GtS8LM9HJM3ov9hZp9pD7GimFQ7iid87ASsT_u31YrJX9d7CQ53RfJldWqlQeWkHU1y-NNzJtwKjaBd1VvQAJfz6nXvrBEJHpo4apW2thlc3FBWucTnnnwXaAHl5vJAOcCh6KYnJEeQEj8dlqw23xcADhE41czSzGGJi-TPqV7dMhwPYA-diM14un3Xfeip2cVP5C7ugREY0TVMhYvtmARLFJkFlf8Cy-6e2-HqW-DEPmYJYgdm0m5M7PxAoZpaNjPK1seWU93eAiRM1tydPK_9Uly4tkg7nu8kjaaVtdvT9M9qGbsLSQXy6FAfwOJObUZs22vkHY5-h4jEbQ", "payload": "" } 2024-04-18 22:04:28,487:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432423627 HTTP/1.1" 200 806 2024-04-18 22:04:28,487:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:04:15 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMpcx7-QUu3cwUPLyq90KJDq_PqQzVZdsiFvfQAiPRzvOU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:58Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432423627/-JWQ0A", "token": "FtGkmJLV6hVEahLLQUvN4xbgvT0vMtoyMkbghQ-HtEA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432423627/YJ2jiA", "token": "FtGkmJLV6hVEahLLQUvN4xbgvT0vMtoyMkbghQ-HtEA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432423627/r6TG8Q", "token": "FtGkmJLV6hVEahLLQUvN4xbgvT0vMtoyMkbghQ-HtEA" } ] } 2024-04-18 22:04:28,488:DEBUG:acme.client:Storing nonce: FUnC6kMpcx7-QUu3cwUPLyq90KJDq_PqQzVZdsiFvfQAiPRzvOU 2024-04-18 22:04:28,488:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-18 22:04:28,489:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-04-18 22:04:28,489:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-18 22:04:28,489:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-18 22:04:28,490:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-18 22:04:28,491:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-18 22:04:28,491:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-18 22:04:28,491:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-18 22:04:28,493:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-18 22:04:28,545:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-04-18 22:04:28,545:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-18 22:04:28,545:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-04-18 22:04:28,553:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-04-18 22:04:28,556:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-04-18 22:04:28,556:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-04-18 22:04:28,556:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-04-18 22:04:28,557:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-04-18 22:04:28,559:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-04-18 22:04:28,603:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-18 22:04:28,988:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-18 22:04:28,989:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-18 22:04:28,990:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-18 22:04:28,997:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:23 UTC. 2024-04-18 22:04:28,998:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-18 22:04:28,998:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-18 22:04:29,003:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-18 22:04:29,003:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-18 22:04:29,004:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-18 22:04:29,018:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-18 22:04:29,019:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-18 22:04:29,021:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-18 22:04:29,482:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-18 22:04:29,483:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:04:16 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "VGKgupau7QQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-18 22:04:29,483:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-18 22:04:34,077:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7721_key-certbot.pem 2024-04-18 22:04:38,496:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7719_csr-certbot.pem 2024-04-18 22:04:38,497:DEBUG:acme.client:Requesting fresh nonce 2024-04-18 22:04:38,497:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-18 22:04:38,652:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-18 22:04:38,653:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:04:25 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMpGC31cM6miTNo72ZQg5-9Wp812tvJqP2u8wJ1zPdMRq4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-18 22:04:38,653:DEBUG:acme.client:Storing nonce: FUnC6kMpGC31cM6miTNo72ZQg5-9Wp812tvJqP2u8wJ1zPdMRq4 2024-04-18 22:04:38,653:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-04-18 22:04:38,659:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBHQzMxY002bWlUTm83MlpRZzUtOVdwODEydHZKcVAydTh3SjF6UGRNUnE0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "aleaoBmK_-1nHFOUkB3StaJxSvs5UUnJgN6KI20DVHvsfY3oSuvhuq9SSPb-b9rHCswM8S0XCzlIn0JUeFr6D7M437Wp2VOEiStZ7H39Nbmk4oMqznUwzfFMIrABJ6WxJShcm7__vLmAv5y-7Gao0SdgRlT4XeL_sww64g4Ze7sXP2kUe3tBL2OlcUUBB42jrfz_768FwdudINta0qtnUn3fOgZWxQoxFg-DyvDwWQu0R-97r-taPsCIg5v0W9eqaqs8m3CtBtgje9SXOja8cC8-hntd8GFmaZjPcWY4G7YuvTczv6Zzp99novPU7lU1-_MoF5pw2FXV0zoc55RNuA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-18 22:04:38,901:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-04-18 22:04:38,902:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 18 Apr 2024 20:04:25 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602629937 Replay-Nonce: FUnC6kMpW0w11U3gAUsRgJzK5qicErHte7Y9Z72vyzeHV6gHf24 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:16:07Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432480227" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602629937" } 2024-04-18 22:04:38,903:DEBUG:acme.client:Storing nonce: FUnC6kMpW0w11U3gAUsRgJzK5qicErHte7Y9Z72vyzeHV6gHf24 2024-04-18 22:04:38,903:DEBUG:acme.client:JWS payload: b'' 2024-04-18 22:04:38,911:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432480227: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiRlVuQzZrTXBXMHcxMVUzZ0FVc1JnSnpLNXFpY0VySHRlN1k5Wjcydnl6ZUhWNmdIZjI0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI0ODAyMjcifQ", "signature": "otXBon9CSc5pjyWZQyJEPrG9rFksnazyES2DETZRpPMAYRxkCBBEO0vp4PQenwGQF37hnpgKBPt3bRniJ63r1nlVgIktXNQZiDEGH7MkSWlDcLkNzacJQ3I34cXQxzqN8TbRf7EzrmNDtCMmrCdRysBCE6o1SdpfcKeWfxvmScygjGvu17BklwiteS54ahQjlopDG-FDeSPL5lRcuGhvwXhea3rShQBQi_ShvEtolG4lDpGqn_68ro2QJM_PVbv-YWZNxaEyNSKGGm0SEe2WmeFi53Be3Vlb4Sn2Um8t4z8fSBBSP0rySd3SC5_zkfy8gztyfyNpao74_JYfGkgkUQ", "payload": "" } 2024-04-18 22:04:39,142:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432480227 HTTP/1.1" 200 811 2024-04-18 22:04:39,143:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:04:25 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: FUnC6kMpS95UiiRgnDPzNggkfIwHpHzIASAOlktIodYQ0_h8qGQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:16:07Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432480227/1ONL0g", "token": "ITCDO08nCvNE1DIOCRls7iq_D7UJHrIPtfdyCmW-Hto" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432480227/E9W28w", "token": "ITCDO08nCvNE1DIOCRls7iq_D7UJHrIPtfdyCmW-Hto" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432480227/K6R9wQ", "token": "ITCDO08nCvNE1DIOCRls7iq_D7UJHrIPtfdyCmW-Hto" } ] } 2024-04-18 22:04:39,143:DEBUG:acme.client:Storing nonce: FUnC6kMpS95UiiRgnDPzNggkfIwHpHzIASAOlktIodYQ0_h8qGQ 2024-04-18 22:04:39,144:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-18 22:04:39,144:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-04-18 22:04:39,145:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-18 22:04:39,145:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-18 22:04:39,146:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-18 22:04:39,146:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-18 22:04:39,146:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-18 22:04:39,147:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-18 22:04:39,148:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-18 22:04:39,203:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-18 22:04:39,502:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-18 22:04:39,504:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-18 22:04:39,504:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-18 22:04:39,509:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:41 UTC. 2024-04-18 22:04:39,509:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-18 22:04:39,509:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-18 22:04:39,514:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-18 22:04:39,515:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-18 22:04:39,515:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-18 22:04:39,533:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-18 22:04:39,534:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-18 22:04:39,536:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-18 22:04:40,071:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-18 22:04:40,071:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:04:26 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "T8Wh9YGXlWE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-18 22:04:40,072:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-18 22:04:44,619:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7722_key-certbot.pem 2024-04-18 22:04:49,053:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7720_csr-certbot.pem 2024-04-18 22:04:49,053:DEBUG:acme.client:Requesting fresh nonce 2024-04-18 22:04:49,054:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-18 22:04:49,232:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-18 22:04:49,232:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:04:35 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9QjupU-_OVjEQQIHiSqCguUktJhQUsRvTi3cdyG0_NB_PR_E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-18 22:04:49,232:DEBUG:acme.client:Storing nonce: 1Th9QjupU-_OVjEQQIHiSqCguUktJhQUsRvTi3cdyG0_NB_PR_E 2024-04-18 22:04:49,233:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-04-18 22:04:49,240:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBVLV9PVmpFUVFJSGlTcUNndVVrdEpoUVVzUnZUaTNjZHlHMF9OQl9QUl9FIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "eJQpsWczgNYmLQQ1qfz8abqPLCf1ZUOF2CmV9BupzEh10wg80MMvqvj7Nojoo2RVQ77kjgeDDbox9pvd6s4wy9c3UoDvrinys-GOIgrwiQlxoRC85od9duVtxM9ygSH28CCSaYW-Ilzo2dKtaNwZjUVWIGFoJRC7HPYx5r989-InJIOq4Rfwz2Bbq7EyuQAHnKO7X75t-wL2pohaPX1kGUxF4NOcxEIhXPx0WD4m4-qAbfWPglxFp_FIpp6H4c5FEmPop1abnb6cEo7RXecq99KnlZiYZzsS90P3iRCdfT_19LnlZZgwCqLOySAlyYsLWkmxLUFWYf2uhipQAUjoIQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-18 22:04:49,431:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-04-18 22:04:49,432:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 18 Apr 2024 20:04:36 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602663067 Replay-Nonce: 1Th9QjupT7Z1E-anEr0ygE03Xcxzx--lS_AD3kwKW9rCgYk3qtE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:16:16Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432528027" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602663067" } 2024-04-18 22:04:49,432:DEBUG:acme.client:Storing nonce: 1Th9QjupT7Z1E-anEr0ygE03Xcxzx--lS_AD3kwKW9rCgYk3qtE 2024-04-18 22:04:49,433:DEBUG:acme.client:JWS payload: b'' 2024-04-18 22:04:49,437:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432528027: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBUN1oxRS1hbkVyMHlnRTAzWGN4engtLWxTX0FEM2t3S1c5ckNnWWszcXRFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI1MjgwMjcifQ", "signature": "ci6s7pzbRvnmifqSfAcA6Z6D9p7hxYk0RaHXiPRudQHIb4ct2F0nDJhV3FDbyKUB2lOCCzt-XZ5oEO9khTVTd9b7a1b757TAdI-3bUje_RkkEfazEjfXHSMR9cvZIAW2SSb9Y1dHuwuZFqR9XEqnRn01qNwx7wslyfKqMfb5u6ul8vfBBM1Ijit7TxCTSjStSDcMkISFnlWbR3pWg7Wtj1lfJl1H0nAhsDhXnanOh5IL25c52QFxTJ9EhmQtRueq54y8gqgSwElXrLb_M6844xT033cHh4OvCcD2g7crKbeCMEbPeKem8e1htR6L94BOa5N4xs2ftseqDcI4zTHICQ", "payload": "" } 2024-04-18 22:04:49,618:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432528027 HTTP/1.1" 200 810 2024-04-18 22:04:49,619:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:04:36 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9Qjup_rtfVb0NlD9qD8FP3y5e6Q59qSDELlWW9UdaUr45z50 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:16:16Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432528027/fZogaQ", "token": "h0h-k3kZQGgl45o3tvwNVxLq541oGGp1Pw1lsGcDtWA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432528027/ApLG9Q", "token": "h0h-k3kZQGgl45o3tvwNVxLq541oGGp1Pw1lsGcDtWA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432528027/eOLRKQ", "token": "h0h-k3kZQGgl45o3tvwNVxLq541oGGp1Pw1lsGcDtWA" } ] } 2024-04-18 22:04:49,619:DEBUG:acme.client:Storing nonce: 1Th9Qjup_rtfVb0NlD9qD8FP3y5e6Q59qSDELlWW9UdaUr45z50 2024-04-18 22:04:49,619:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-18 22:04:49,620:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-04-18 22:04:49,620:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-18 22:04:49,621:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-18 22:04:49,621:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-18 22:04:49,622:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-18 22:04:49,622:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-18 22:04:49,622:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-18 22:04:49,623:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-18 22:04:49,662:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-18 22:04:49,884:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-18 22:04:49,885:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-04-18 22:04:49,886:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-04-18 22:04:49,890:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:58 UTC. 2024-04-18 22:04:49,890:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-18 22:04:49,891:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-18 22:04:49,896:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-18 22:04:49,896:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-18 22:04:49,896:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-18 22:04:49,901:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-18 22:04:49,902:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-18 22:04:49,904:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-18 22:04:50,440:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-18 22:04:50,440:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:04:37 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "5LzmB9rhX2g": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-18 22:04:50,441:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-18 22:04:54,900:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7723_key-certbot.pem 2024-04-18 22:04:59,420:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7721_csr-certbot.pem 2024-04-18 22:04:59,421:DEBUG:acme.client:Requesting fresh nonce 2024-04-18 22:04:59,421:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-18 22:04:59,598:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-18 22:04:59,599:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:04:46 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9QjupTtKezuRUo3anFPA0ohg6L7jCXUMVAMB42vzU9yj6dHk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-18 22:04:59,599:DEBUG:acme.client:Storing nonce: 1Th9QjupTtKezuRUo3anFPA0ohg6L7jCXUMVAMB42vzU9yj6dHk 2024-04-18 22:04:59,599:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-04-18 22:04:59,605:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBUdEtlenVSVW8zYW5GUEEwb2hnNkw3akNYVU1WQU1CNDJ2elU5eWo2ZEhrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "YcwN8KdZYtZajfkk1iyE3P8l0hPoRit_mNgELLGX1poIHDD50GhWrjM7tje2qFMboAWNtuA9Aq63WEsD1cNxd4s-66yEWjbwNk4ECePzbsIyGqO3e0n0EFyaq5O1ncUYS9CQg7FiMMvJJPYJP58HVJQmKtIjyR43bd_p2SD1yzJdnAZvlyaRVYF5Q_TGU8j3HvhStRTMb5N1tlhmiwPMtaCrv9pnbacMd68bdh9RuFf9GJrDuKx9j3bZ5wF1PZaQqYiATHR4tEt8gkwMIOR2VM6H2AX19p8KHNZsrr__zBSqwy2fU-XRx8SxzKgg9rYY98yaUYs25XHpbZUFRQL-Dg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-04-18 22:04:59,798:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-04-18 22:04:59,799:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 18 Apr 2024 20:04:46 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602692837 Replay-Nonce: sW-8q43N9DH2IwagdcaxNsO8hHlFkpMcYno9iG6Hob5TAuUWB7M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:16:25Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432570877" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602692837" } 2024-04-18 22:04:59,799:DEBUG:acme.client:Storing nonce: sW-8q43N9DH2IwagdcaxNsO8hHlFkpMcYno9iG6Hob5TAuUWB7M 2024-04-18 22:04:59,800:DEBUG:acme.client:JWS payload: b'' 2024-04-18 22:04:59,805:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432570877: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M045REgySXdhZ2RjYXhOc084aEhsRmtwTWNZbm85aUc2SG9iNVRBdVVXQjdNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI1NzA4NzcifQ", "signature": "yXR6zwKnzK0ApM_ev_O2RhbYxwAEwgz6ogRevNBq-PveiGNvCyfwCQzEXGsOiZ0vvXr5ulJfVozbiuj3A6yUgnISUt7niccEYGVXhA3p_G3KjN-oOvbzNrtORN0-_maRncDa7bo1A68GJS8_tPG5K8raUTPSjapOnf1Y6le99Hr9vyr8OVigGkUwE5oTE8bCvBi92auAQozM4cN1NRWEUoejqk6V-2rQbXr61Cig1LVMgMu0N_Fko-wN5EjWiWCHBT2-_kKFCg23K3HegZfnQczpn2HQNTNGgVnlCGQzPdpADQbxYeqGzIUzQRoPFG_0p1brZuzwxIhoGVIWms2yeg", "payload": "" } 2024-04-18 22:04:59,986:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432570877 HTTP/1.1" 200 809 2024-04-18 22:04:59,987:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:04:46 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43NGw5NoXrPu5bxto7Dm5pNU_hoa_nz5SdwlCf-AJXLwwY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:16:25Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432570877/IP7Jnw", "token": "6wDg_FeOhbW91soX0twO-HqBmGz9rn_f6CKB-7YK190" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432570877/jfJGPg", "token": "6wDg_FeOhbW91soX0twO-HqBmGz9rn_f6CKB-7YK190" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432570877/AYFk4w", "token": "6wDg_FeOhbW91soX0twO-HqBmGz9rn_f6CKB-7YK190" } ] } 2024-04-18 22:04:59,987:DEBUG:acme.client:Storing nonce: sW-8q43NGw5NoXrPu5bxto7Dm5pNU_hoa_nz5SdwlCf-AJXLwwY 2024-04-18 22:04:59,987:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-18 22:04:59,988:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-04-18 22:04:59,988:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-18 22:04:59,989:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-18 22:04:59,989:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-18 22:04:59,990:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-18 22:04:59,990:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-18 22:04:59,990:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-18 22:04:59,992:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-18 22:05:00,041:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-18 22:05:00,312:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-18 22:05:00,314:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2024-04-18 22:05:00,314:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2024-04-18 22:05:00,319:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:17 UTC. 2024-04-18 22:05:00,319:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-18 22:05:00,320:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-18 22:05:00,324:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-18 22:05:00,324:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-18 22:05:00,324:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-18 22:05:00,329:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-18 22:05:00,330:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-18 22:05:00,332:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-18 22:05:00,882:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-18 22:05:00,883:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:04:47 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "up-Q2_q8LBU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-04-18 22:05:00,884:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-18 22:05:05,880:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7724_key-certbot.pem 2024-04-18 22:05:10,206:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7722_csr-certbot.pem 2024-04-18 22:05:10,206:DEBUG:acme.client:Requesting fresh nonce 2024-04-18 22:05:10,206:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-18 22:05:10,390:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-18 22:05:10,390:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:04:57 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43NnKuBEx7fgHZ9O0-TtDbyf74x0rJN16zVWgLlGSyOQ7s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-18 22:05:10,391:DEBUG:acme.client:Storing nonce: sW-8q43NnKuBEx7fgHZ9O0-TtDbyf74x0rJN16zVWgLlGSyOQ7s 2024-04-18 22:05:10,391:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-04-18 22:05:10,397:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAic1ctOHE0M05uS3VCRXg3ZmdIWjlPMC1UdERieWY3NHgwckpOMTZ6VldnTGxHU3lPUTdzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "GnwIuDIS6XIMr3uQ0ljwyBV6J46IfMHf28RyXJlDDvIAQfw10GgoQxenaf9rx9fv9A9iSPzc3VEVZnZnj5kOQE3FCqxSAd05tBbRvwZIga3auobTarlNgFpHnelPn2gv4RWHK0RaXrJAoXMg-Uy6jJCovMUZeRSR9Ez8UXvIGg8kV3om9Ut8uFRdssEJHr9nhGcT3l7fJ8qXZ2I-db9c6iGX1JLbbHQ8OA4enUMWXadeeJZTicc69Dnrzt3cWZJ_lbylok2w150q7e79tA0duFiUrbcfpjBaGpOutij1IKf17nIGXPldnEk6JPyLVXABSdR6WqBKTqsMxO7HpaJKkw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-18 22:05:10,593:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-18 22:05:10,594:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 18 Apr 2024 20:04:57 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602722417 Replay-Nonce: 1Th9QjupbDxObBuC6v_7p8-87OF6DUeNiyUa9TT805xakTiPkoM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:16:35Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432614317" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602722417" } 2024-04-18 22:05:10,595:DEBUG:acme.client:Storing nonce: 1Th9QjupbDxObBuC6v_7p8-87OF6DUeNiyUa9TT805xakTiPkoM 2024-04-18 22:05:10,595:DEBUG:acme.client:JWS payload: b'' 2024-04-18 22:05:10,602:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432614317: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBiRHhPYkJ1QzZ2XzdwOC04N09GNkRVZU5peVVhOVRUODA1eGFrVGlQa29NIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI2MTQzMTcifQ", "signature": "YW8zB-GoGW1araclUMMeXkO-NQCCcw5LD1UJMqdLIcP6EhCSrV-vRMASRuRNEXbP95IiVLgVkjkJfymapeQu0Ywi8PJNj5XopaVQ0qEF-qEkhGRecO2i_YKrMogH0rigx-LSNReAM0EBlaY26I3-UopzBINjjjlFBs-H6Zki6lZ7v8lRCBnTVkqN4lb-G4tzACFI_Y-_l-xwkjGVM2G7VhnGkg7iOTm9jPG-bE9mFJXJHtbBbTL0lxjke6YLbLbImylGou5x5Kpl9rdpyGgpYdPu566eoe2Qqf5cPn72Ug5fNM2N8nbbmU4L3sAhucpZOF8xjI9mPRbPyF7_oyB3zQ", "payload": "" } 2024-04-18 22:05:10,785:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432614317 HTTP/1.1" 200 805 2024-04-18 22:05:10,786:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:04:57 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9QjupWqFrX9U3lbzSTOIgyfw1IbVFeXVu1vqdN-6QhjLS9YI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:16:35Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432614317/xAjnBA", "token": "RG1vFP3wsSY4J9gUkurgcdKS0Hmm4ra8cQyi1u1JM6U" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432614317/eaCuPQ", "token": "RG1vFP3wsSY4J9gUkurgcdKS0Hmm4ra8cQyi1u1JM6U" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432614317/2jUEjw", "token": "RG1vFP3wsSY4J9gUkurgcdKS0Hmm4ra8cQyi1u1JM6U" } ] } 2024-04-18 22:05:10,786:DEBUG:acme.client:Storing nonce: 1Th9QjupWqFrX9U3lbzSTOIgyfw1IbVFeXVu1vqdN-6QhjLS9YI 2024-04-18 22:05:10,786:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-18 22:05:10,786:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-04-18 22:05:10,787:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-18 22:05:10,787:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-18 22:05:10,788:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-18 22:05:10,788:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-18 22:05:10,788:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-18 22:05:10,788:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-18 22:05:10,789:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-18 22:05:10,829:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-18 22:05:11,162:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-18 22:05:11,164:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-18 22:05:11,164:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-18 22:05:11,169:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:34 UTC. 2024-04-18 22:05:11,169:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-18 22:05:11,170:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-18 22:05:11,174:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-18 22:05:11,174:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-18 22:05:11,174:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-18 22:05:11,190:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-18 22:05:11,191:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-18 22:05:11,193:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-18 22:05:11,725:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-18 22:05:11,726:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:04:58 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "mCYouY9UO1o": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-18 22:05:11,727:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-18 22:05:16,297:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7725_key-certbot.pem 2024-04-18 22:05:20,669:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7723_csr-certbot.pem 2024-04-18 22:05:20,669:DEBUG:acme.client:Requesting fresh nonce 2024-04-18 22:05:20,669:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-18 22:05:20,846:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-18 22:05:20,847:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:05:07 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9Qjup768vkNdk6z4qYrR-QfEjXZ2p8Igv8WlrpwVuc1j_hCY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-18 22:05:20,847:DEBUG:acme.client:Storing nonce: 1Th9Qjup768vkNdk6z4qYrR-QfEjXZ2p8Igv8WlrpwVuc1j_hCY 2024-04-18 22:05:20,847:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-04-18 22:05:20,854:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXA3Njh2a05kazZ6NHFZclItUWZFalhaMnA4SWd2OFdscnB3VnVjMWpfaENZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "rzK6XTzqhZAGZ1Vk_SmZOjrMoA9eeN0Zv0SyxP_ELfkXRwom2M9FGoPZrF0Mc_8kUv0HS22q_AqI396__5RgUogklzSyLbqcuH9RMAEd_UU2OXozi51xEP4zpaeHZY59Jm1E-MRCdCbmF1X-vjaFzB9gpL-hfhZtNrTKmpZaSV9BsAiEalc2jXpUkb2uj8ayIGJY1IBeZLuuGAdXnKiZf5DUUVJRWi-rz5ofkdDEpbPueVK0RQ78VL38iu2jy6Lo_slv0q1J__bFihZGujqmRYXxPTjU0bpngFbtPvz8Hl06574gNIpohazc2D_kl5qeEOokxLaxxsS7spNakAFfBw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-18 22:05:21,054:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-18 22:05:21,054:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 18 Apr 2024 20:05:07 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602748407 Replay-Nonce: 1Th9QjupG71KSRMvBroTibuvfjGprqgcydfEoiGvGw83fjlmY80 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:16:44Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432651637" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602748407" } 2024-04-18 22:05:21,054:DEBUG:acme.client:Storing nonce: 1Th9QjupG71KSRMvBroTibuvfjGprqgcydfEoiGvGw83fjlmY80 2024-04-18 22:05:21,055:DEBUG:acme.client:JWS payload: b'' 2024-04-18 22:05:21,060:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432651637: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBHNzFLU1JNdkJyb1RpYnV2ZmpHcHJxZ2N5ZGZFb2lHdkd3ODNmamxtWTgwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI2NTE2MzcifQ", "signature": "jGobnsFP0_qpwvwYL40N4k_hoX3xygMMRqFkIcWIUJJHZi1ak5vk8STcBoRVsBO8EIPAKBhfL0VafItR7ALUzqOrSCFIw64e-nbe2NRJ3e23uSuRgHPaSTjVrsti1DWblT-q1ie_oA2WVDTnHPOz721HpUjv4l4MIZWb8Jgd12Y1fbdoS9WoBJCAOrmL1ljehYjx5ln7KrIQyajNtVG-m9UhabaO123LvyFo-9hT43nX3orpgpMnoWpnM1e8pKygDe_pXVKRgqhnOV6CYw7yPRXLE8tXuNg1mIi320ZZjWaXaB783-r2R4-iyAHJInZYFFpNYmavAL-D40bLvSXgLA", "payload": "" } 2024-04-18 22:05:21,242:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432651637 HTTP/1.1" 200 805 2024-04-18 22:05:21,243:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:05:07 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43Np0UgrEpTGZmnN-kfTRCGjaQksEgWGdUj4OCC_fVqyVw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:16:44Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432651637/MmDBAg", "token": "tp6ABUDDbWbczEBv42KG5z6hEJeiI6L08Lc5HKW8gjA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432651637/zq-rkw", "token": "tp6ABUDDbWbczEBv42KG5z6hEJeiI6L08Lc5HKW8gjA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432651637/n89D0Q", "token": "tp6ABUDDbWbczEBv42KG5z6hEJeiI6L08Lc5HKW8gjA" } ] } 2024-04-18 22:05:21,243:DEBUG:acme.client:Storing nonce: sW-8q43Np0UgrEpTGZmnN-kfTRCGjaQksEgWGdUj4OCC_fVqyVw 2024-04-18 22:05:21,244:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-18 22:05:21,244:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-04-18 22:05:21,245:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-18 22:05:21,245:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-18 22:05:21,246:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-18 22:05:21,246:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-18 22:05:21,246:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-18 22:05:21,247:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-18 22:05:21,248:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-18 22:05:21,286:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-18 22:05:21,548:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-18 22:05:21,549:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-04-18 22:05:21,550:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-04-18 22:05:21,554:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:48 UTC. 2024-04-18 22:05:21,554:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-18 22:05:21,555:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-18 22:05:21,559:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-04-18 22:05:21,560:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-04-18 22:05:21,560:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-18 22:05:21,565:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-04-18 22:05:21,566:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-18 22:05:21,569:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-18 22:05:22,103:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-18 22:05:22,103:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:05:08 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Tga0L5rdFPc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-18 22:05:22,104:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-18 22:05:26,778:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7726_key-certbot.pem 2024-04-18 22:05:31,068:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7724_csr-certbot.pem 2024-04-18 22:05:31,069:DEBUG:acme.client:Requesting fresh nonce 2024-04-18 22:05:31,069:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-18 22:05:31,246:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-18 22:05:31,247:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:05:17 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1Th9QjupqHtcj9vuYOe_WjwWdln4nPfmYmqy3BFM_jVL-i3DehE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-18 22:05:31,247:DEBUG:acme.client:Storing nonce: 1Th9QjupqHtcj9vuYOe_WjwWdln4nPfmYmqy3BFM_jVL-i3DehE 2024-04-18 22:05:31,247:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-04-18 22:05:31,253:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXBxSHRjajl2dVlPZV9XandXZGxuNG5QZm1ZbXF5M0JGTV9qVkwtaTNEZWhFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "IyQAzKZuxQviJUaRnA8Xx34GV7DMbsI7amft_9gjVn076wZKE46e_voGpW_UgcRFKHLImI36xkcMGzCrFr8IP7L2Bybd6TH4SU-8aN8De8Th0mqAU5vedWPYSCtWLrHwU5IDlfVOJ9xw7toof7XJqjnKC6aSnYpfYeDx8ZRba-CeKbHCFDwLpSz-9SZkNBJzEredzRAtpU6dQye5VarH1r2xrvCrhpcORMinpGYGCJfEDdyduj34sNpMbPim1o5-zV6EurTyDGz0uyKU7WF-Ex2s2IbCMA3D2Z3Tkh66Oax8spj5dSX8kx98-jte5r_s44r7bO-ztu-bOP8Dt2n-Rw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-18 22:05:31,456:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-18 22:05:31,456:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 18 Apr 2024 20:05:18 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602776607 Replay-Nonce: 1Th9QjupzWnylOuWn5ALLAhPQ5zjm8ZZQRcgaddoVILxSgUM38A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:16:53Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432691097" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602776607" } 2024-04-18 22:05:31,457:DEBUG:acme.client:Storing nonce: 1Th9QjupzWnylOuWn5ALLAhPQ5zjm8ZZQRcgaddoVILxSgUM38A 2024-04-18 22:05:31,457:DEBUG:acme.client:JWS payload: b'' 2024-04-18 22:05:31,463:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432691097: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMVRoOVFqdXB6V255bE91V241QUxMQWhQUTV6am04WlpRUmNnYWRkb1ZJTHhTZ1VNMzhBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI2OTEwOTcifQ", "signature": "yqRARtUkC_b6AefhJs_y9QnjRmScyYt7B_u4Zr8HPPZlmY5Z5DqolmyBEsPMr40rqSWu2iU1-hhED33nx7eVik8AoqYn_29f9PqGclXX2POKqhBhjojdIJSs2UYG42GA_HZWVo-TWXX0__7Vr_rjrw9ofcHElM-9Ziqtkc4RRarbZ6nl58xds2FV_adpAwGowoZgwTli7Fo_PM8i4HjfG3N4Qf3hMe99tejtsxlJmrZIFzswgX6ClEt8QSNosh_nS85gVbc-EAZnK5uqUIGDUKPDsJVzO4x698PEGTmpsf7Tz3BOec9YIH4n0vdOpb6vg8FS1X7LRryTMJbfqQ5pkw", "payload": "" } 2024-04-18 22:05:31,644:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432691097 HTTP/1.1" 200 805 2024-04-18 22:05:31,645:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 18 Apr 2024 20:05:18 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: sW-8q43ND3HJ0PCcuN2zegaaYpYS4Do19DFICGlA27hmeqy4K6I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:16:53Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432691097/PSRvrQ", "token": "RlxqSNpNGDiYI8pHcb4-btU3K4CtHRMPAT7ZeQIyKUU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432691097/SZF9hg", "token": "RlxqSNpNGDiYI8pHcb4-btU3K4CtHRMPAT7ZeQIyKUU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432691097/9pqO_A", "token": "RlxqSNpNGDiYI8pHcb4-btU3K4CtHRMPAT7ZeQIyKUU" } ] } 2024-04-18 22:05:31,645:DEBUG:acme.client:Storing nonce: sW-8q43ND3HJ0PCcuN2zegaaYpYS4Do19DFICGlA27hmeqy4K6I 2024-04-18 22:05:31,645:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-18 22:05:31,646:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-04-18 22:05:31,646:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-18 22:05:31,646:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-18 22:05:31,647:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-18 22:05:31,647:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-18 22:05:31,647:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-18 22:05:31,648:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-18 22:05:31,649:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-18 22:05:31,649:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-04-18 22:05:31,649:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-04-18 22:05:31,651:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-04-18 22:05:31,653:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)