2024-04-17 05:15:03,086:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-04-17 05:15:03,086:DEBUG:certbot._internal.main:Arguments: [] 2024-04-17 05:15:03,086:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-04-17 05:15:04,046:DEBUG:certbot._internal.log:Root logging level set at 20 2024-04-17 05:15:04,046:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-04-17 05:15:04,087:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x04646FD0> and installer <certbot._internal.cli.cli_utils._Default object at 0x04646FD0> 2024-04-17 05:15:04,130:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-17 05:15:04,376:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-17 05:15:04,388:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert9.pem is signed by the certificate's issuer. 2024-04-17 05:15:04,391:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert9.pem is: OCSPCertStatus.GOOD 2024-04-17 05:15:04,398:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:24 UTC. 2024-04-17 05:15:04,398:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-17 05:15:04,399:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-17 05:15:04,406:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x040B72F0> Prep: True 2024-04-17 05:15:04,407:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x040B72F0> and installer None 2024-04-17 05:15:04,407:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-17 05:15:04,414:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-04-17 05:15:04,415:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-17 05:15:04,418:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-17 05:15:04,933:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-17 05:15:04,934:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:14:52 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "gMrZjepkd1I": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-17 05:15:04,934:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-17 05:15:09,334:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7675_key-certbot.pem 2024-04-17 05:15:13,557:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7673_csr-certbot.pem 2024-04-17 05:15:13,557:DEBUG:acme.client:Requesting fresh nonce 2024-04-17 05:15:13,558:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-17 05:15:13,717:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-17 05:15:13,717:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:15:01 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: fYM0lmBiBrWnOrruc6vBiOH40NTguTfGZZR6tCoReY4WLb1sj-M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-17 05:15:13,717:DEBUG:acme.client:Storing nonce: fYM0lmBiBrWnOrruc6vBiOH40NTguTfGZZR6tCoReY4WLb1sj-M 2024-04-17 05:15:13,718:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-04-17 05:15:13,723:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZllNMGxtQmlCclduT3JydWM2dkJpT0g0ME5UZ3VUZkdaWlI2dENvUmVZNFdMYjFzai1NIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "tpiXrOjkz2Nycbge5OJI6E8yzGc4xZY3PZeAMpb1XPPVz_EZ8pwGFUTliMSdlIoTQNscBEtop4CPwkb046qBL9FWixIB79tUswj__h8ii9qECdso1WHxgfE5U5dKbasXuo4PmYtlqMKIVsE06fyAk0m4kKOD-LYSyg0pTxMtYl64NCxvC519EkTmLHurCJlalVuSdfp_9gqSC9kWkwYOpUoR4gX9DxkznG3ALKrfTwrVlgVllJzrELUcCDN5OV-Xk4HIf7YZi5e5fJdds1HFCuUgIiwkWUrsyqOS-1eMCMxFtMuOaH55IX2SgCs-noNcw5F9pkag-z8cUQdRdBJ2aQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-17 05:15:13,928:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-04-17 05:15:13,928:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 17 Apr 2024 03:15:01 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602379477 Replay-Nonce: 41Xn7EjcO2CK41lToDW9Y2DgzPoHRiKeelBYDs2RDeiCP8GYExM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:01Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432133867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602379477" } 2024-04-17 05:15:13,928:DEBUG:acme.client:Storing nonce: 41Xn7EjcO2CK41lToDW9Y2DgzPoHRiKeelBYDs2RDeiCP8GYExM 2024-04-17 05:15:13,929:DEBUG:acme.client:JWS payload: b'' 2024-04-17 05:15:13,934:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432133867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNDFYbjdFamNPMkNLNDFsVG9EVzlZMkRnelBvSFJpS2VlbEJZRHMyUkRlaUNQOEdZRXhNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIxMzM4NjcifQ", "signature": "rmc8P65YtXPFqWw2M6TLpfPOqxLHVPcyK-QKlkFFWLV1alj29Qcth8WDrf1bTJgKHRIpYI_XFiDGEAWzDGUYUYZxCC4aDPm2utSsJwyXw6InjnOdrdmp7XNYmluapF-U4D-3mK0EwMwkDWuOpVpFzcQySZgBW3nPJkMGdTLRxp86D9LASXCJW594aMeFnNketSohhzE3te2QRO62tBQJ1mK4X_SJj9rvNKNyUlzUae0FHXa45QvZeV0kzZ5TH_5ggfTBJgbuDT8X5V1RS6jznGAY7Woz-9jOrNi0882Ye37QgB31AbNxG5kJKqS8M3vYSvn5fzIYa-Olzqgmx8UUKw", "payload": "" } 2024-04-17 05:15:14,100:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432133867 HTTP/1.1" 200 810 2024-04-17 05:15:14,101:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:15:02 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: 41Xn7EjcNe21tFTX72MOHQ3MNRqP9bJbiK9fa3Z1zdxedj8yRPI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:01Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432133867/bALmag", "token": "K5BL7NCUQz-VErlSqOmjI6HLe61h0mHLoAf5V7HRxcQ" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432133867/gKZ-RA", "token": "K5BL7NCUQz-VErlSqOmjI6HLe61h0mHLoAf5V7HRxcQ" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432133867/BZrX6Q", "token": "K5BL7NCUQz-VErlSqOmjI6HLe61h0mHLoAf5V7HRxcQ" } ] } 2024-04-17 05:15:14,101:DEBUG:acme.client:Storing nonce: 41Xn7EjcNe21tFTX72MOHQ3MNRqP9bJbiK9fa3Z1zdxedj8yRPI 2024-04-17 05:15:14,101:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-17 05:15:14,101:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-04-17 05:15:14,102:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-17 05:15:14,102:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-17 05:15:14,116:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-17 05:15:14,116:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-17 05:15:14,117:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-17 05:15:14,117:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-17 05:15:14,123:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-17 05:15:14,164:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-17 05:15:14,501:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-17 05:15:14,502:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-17 05:15:14,503:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-17 05:15:14,508:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:42 UTC. 2024-04-17 05:15:14,509:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-17 05:15:14,509:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-17 05:15:14,514:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x040C8FF0> Prep: True 2024-04-17 05:15:14,514:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x040C8FF0> and installer None 2024-04-17 05:15:14,514:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-17 05:15:14,518:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-04-17 05:15:14,519:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-17 05:15:14,521:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-17 05:15:14,983:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-17 05:15:14,984:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:15:03 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "RlzaX01uBQA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-17 05:15:14,985:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-17 05:15:18,962:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7676_key-certbot.pem 2024-04-17 05:15:22,835:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7674_csr-certbot.pem 2024-04-17 05:15:22,835:DEBUG:acme.client:Requesting fresh nonce 2024-04-17 05:15:22,835:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-17 05:15:22,989:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-17 05:15:22,990:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:15:11 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: 41Xn7Ejca3Fya_boBsjEdRXDB37pF7JBybZ0f8gGPlsrrJig5oo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-17 05:15:22,990:DEBUG:acme.client:Storing nonce: 41Xn7Ejca3Fya_boBsjEdRXDB37pF7JBybZ0f8gGPlsrrJig5oo 2024-04-17 05:15:22,991:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-04-17 05:15:22,996:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNDFYbjdFamNhM0Z5YV9ib0JzakVkUlhEQjM3cEY3SkJ5YlowZjhnR1Bsc3JySmlnNW9vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "APtIvh0C5CIfzvOy6wFNizs2aYj4osNFPdwYSfv507c-vzjVIw8oUKS7rhoLxlLPSnrGzo7mOQCo2AIVnyLz0mQCFkzQfiJVW8oMzMzSVWGGwcxBRYPYSgB6RBZ2tfx8tTmUvqnvBMISv1Hg17Bq2sRAeYyDb5i0LmahgQH63f636ljc3aU9vqydpxrnOWDsiVasMxu0T8iXBJjv8Hv_6zaaBSFm6POX0AmNCQUuAVhizgThlLUyhJzheKGHoT8BF03uvrVC-fCc_04cJbj_FLrjmYBjwd-P3EXzImQsLoxOaBqe3wX-U6cynnCefiHgs9_YCK0LMMdfIT7FAa15Xg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-17 05:15:23,196:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-04-17 05:15:23,197:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 17 Apr 2024 03:15:11 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602436727 Replay-Nonce: 41Xn7Ejc8NbxalrVadEgy45J_6hxmnUiPxVd9B1XpLeqUyGKlxE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:11Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432206077" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602436727" } 2024-04-17 05:15:23,197:DEBUG:acme.client:Storing nonce: 41Xn7Ejc8NbxalrVadEgy45J_6hxmnUiPxVd9B1XpLeqUyGKlxE 2024-04-17 05:15:23,198:DEBUG:acme.client:JWS payload: b'' 2024-04-17 05:15:23,203:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432206077: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNDFYbjdFamM4TmJ4YWxyVmFkRWd5NDVKXzZoeG1uVWlQeFZkOUIxWHBMZXFVeUdLbHhFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIyMDYwNzcifQ", "signature": "A2W0QrbhquPsCCtGelgg0KjJ_RqDUuL4f8gMB1dnGJB4s5N4sX_wZ34P0ajYfjXWZnjrphpnUMt1YRmaS4VskmDtfYXbvXmrAxfs__m6W3FJmUUkJeS_D5tG61aAfgZJLvMo5MeNQVcu4XpsFpam-9FHE4xZeaggxZTj7F6oJorEKlNErZYC5xD7wDeWxGx-RY1RpdillZKhrdQmgOPafl2SHsfuH4ffOSqgSvXUYbGBxlobYnccQY8VaribsA4xr1zSKyyrPpt1nCm3innA0Em-tfCH4bNaUu11y7BiubjnYjxLd1_LSWFRe-UahYoPw2OIUDjFX3myJvYJUtA3Dw", "payload": "" } 2024-04-17 05:15:23,363:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432206077 HTTP/1.1" 200 804 2024-04-17 05:15:23,364:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:15:11 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: 41Xn7EjcZ6Wu2kY1wJ95NNv589889ebvSx_NJ39fClrhpn-bSNc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:11Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432206077/OpeY4Q", "token": "X4bQwYTZ4W5JqVqboZqq5o8SNpfHBgyfHNBkYg8eWNo" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432206077/WcE4Tg", "token": "X4bQwYTZ4W5JqVqboZqq5o8SNpfHBgyfHNBkYg8eWNo" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432206077/Seqm7Q", "token": "X4bQwYTZ4W5JqVqboZqq5o8SNpfHBgyfHNBkYg8eWNo" } ] } 2024-04-17 05:15:23,364:DEBUG:acme.client:Storing nonce: 41Xn7EjcZ6Wu2kY1wJ95NNv589889ebvSx_NJ39fClrhpn-bSNc 2024-04-17 05:15:23,365:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-17 05:15:23,365:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-04-17 05:15:23,365:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-17 05:15:23,365:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-17 05:15:23,366:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-17 05:15:23,366:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-17 05:15:23,366:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-17 05:15:23,366:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-17 05:15:23,367:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-17 05:15:23,420:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-17 05:15:23,651:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-17 05:15:23,652:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-04-17 05:15:23,653:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-04-17 05:15:23,657:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:26:56 UTC. 2024-04-17 05:15:23,657:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-17 05:15:23,658:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-17 05:15:23,662:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x040AA650> Prep: True 2024-04-17 05:15:23,663:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x040AA650> and installer None 2024-04-17 05:15:23,663:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-17 05:15:23,667:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-04-17 05:15:23,668:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-17 05:15:23,670:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-17 05:15:24,146:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-17 05:15:24,147:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:15:12 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "DDlGzDOs84A": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-17 05:15:24,147:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-17 05:15:28,137:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7677_key-certbot.pem 2024-04-17 05:15:31,948:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7675_csr-certbot.pem 2024-04-17 05:15:31,949:DEBUG:acme.client:Requesting fresh nonce 2024-04-17 05:15:31,949:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-17 05:15:32,108:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-17 05:15:32,108:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:15:20 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: fYM0lmBi0pN_RBcIv7nwmoWoEHmA1Dyn9oMvwTOmny5tdTZrygE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-17 05:15:32,108:DEBUG:acme.client:Storing nonce: fYM0lmBi0pN_RBcIv7nwmoWoEHmA1Dyn9oMvwTOmny5tdTZrygE 2024-04-17 05:15:32,109:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-04-17 05:15:32,115:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZllNMGxtQmkwcE5fUkJjSXY3bndtb1dvRUhtQTFEeW45b012d1RPbW55NXRkVFpyeWdFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "du988V53o86Dlkg0EQ7I2h0snO_ndGvt6nEcwmdzGyXM7fvWCWXgGJflQbr6EB_cXI9JOjwZClXcKQTBknZAjIFmwrzTog6YQ2YVnuhbZnZUzmxeT2GJZL2X04r2rnF3j3PZyCq0V1H6nNeT6qYqm-guW_NB-Kb-FjqOYfnlM7Non5HbQgJRRR0EjiNhpI_7B5LiBUPl8O27AoUHF_vkgH47sl-nJBUSKdoaR7P4ZSMdDbZEfqLgjRmjbAf2isj-tzu9QEqeLlfrcwpSzQ5l0azwf1o_9NYOAhHoxC_HmAZMsLr6Yg0s8yG0b5agA8pcvEZh38FDk7S7xyMmanr8hA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-17 05:15:32,329:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-04-17 05:15:32,330:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 17 Apr 2024 03:15:20 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602470407 Replay-Nonce: fYM0lmBiVJksb7Ej7e3srC8fzYhUjQHxTFDRGrezpQRFK3B3Cyo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:20Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432255557" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602470407" } 2024-04-17 05:15:32,331:DEBUG:acme.client:Storing nonce: fYM0lmBiVJksb7Ej7e3srC8fzYhUjQHxTFDRGrezpQRFK3B3Cyo 2024-04-17 05:15:32,331:DEBUG:acme.client:JWS payload: b'' 2024-04-17 05:15:32,338:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432255557: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZllNMGxtQmlWSmtzYjdFajdlM3NyQzhmelloVWpRSHhURkRSR3JlenBRUkZLM0IzQ3lvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIyNTU1NTcifQ", "signature": "BULLl4y25qQXSTBi-3zZXYLYCezRwkewEg4vBYbdCMZVt7suB1WhK6i6Yqub3cvAQVM97qQ8JIiQBoKP0cLyJq6sewF_nJHJ2EOZ08IxkfSuoSEzvF44beCHTOWHmUUKRprwpjaLWWSsQmdPybuJHxeYAHoFKT16ahBsUI435FsAgXZFt6ptWCIhcOZ50cLzm9KY_1C8GN7ZH7UIRDdSA6Mnihh1VcvziRcPX3-7ee3fm56CfPffOeAuIyPEjBcAt9ExfETcgDaa7iCtz67mF_AjLC02JvCKe5lk5aJIxoBPFGHast3ni_kT8lV-9rr9ogzM6puAPn_PEbBSpP92kA", "payload": "" } 2024-04-17 05:15:32,501:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432255557 HTTP/1.1" 200 807 2024-04-17 05:15:32,501:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:15:20 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: 41Xn7EjcFLv7RMKwfqjWH32HgFZltj5ngvhft_B7iNzNqxPjCJA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:20Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432255557/ipHR3w", "token": "4ALo7VXKOBw9xqOcrY3miutsXnJQ4sVo7evhXW1kyPg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432255557/pey6Vw", "token": "4ALo7VXKOBw9xqOcrY3miutsXnJQ4sVo7evhXW1kyPg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432255557/af6Vwg", "token": "4ALo7VXKOBw9xqOcrY3miutsXnJQ4sVo7evhXW1kyPg" } ] } 2024-04-17 05:15:32,501:DEBUG:acme.client:Storing nonce: 41Xn7EjcFLv7RMKwfqjWH32HgFZltj5ngvhft_B7iNzNqxPjCJA 2024-04-17 05:15:32,502:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-17 05:15:32,502:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-04-17 05:15:32,503:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-17 05:15:32,503:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-17 05:15:32,504:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-17 05:15:32,504:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-17 05:15:32,504:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-17 05:15:32,504:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-17 05:15:32,505:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-17 05:15:32,547:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-17 05:15:32,982:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-17 05:15:32,983:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-17 05:15:32,984:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-17 05:15:32,991:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:14 UTC. 2024-04-17 05:15:32,991:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-17 05:15:32,991:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-17 05:15:32,996:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0462FB50> Prep: True 2024-04-17 05:15:32,996:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0462FB50> and installer None 2024-04-17 05:15:32,997:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-17 05:15:33,000:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-04-17 05:15:33,001:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-17 05:15:33,003:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-17 05:15:33,454:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-17 05:15:33,454:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:15:21 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "gVKBHEx5wy8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-17 05:15:33,454:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-17 05:15:37,719:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7678_key-certbot.pem 2024-04-17 05:15:41,550:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7676_csr-certbot.pem 2024-04-17 05:15:41,550:DEBUG:acme.client:Requesting fresh nonce 2024-04-17 05:15:41,550:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-17 05:15:41,699:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-17 05:15:41,700:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:15:29 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: 6qYJqZtwrdO6YGvQkJs059kpfFQ2L8XfkNutWPanRvwhfiKrHU0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-17 05:15:41,700:DEBUG:acme.client:Storing nonce: 6qYJqZtwrdO6YGvQkJs059kpfFQ2L8XfkNutWPanRvwhfiKrHU0 2024-04-17 05:15:41,700:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-04-17 05:15:41,705:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNnFZSnFadHdyZE82WUd2UWtKczA1OWtwZkZRMkw4WGZrTnV0V1BhblJ2d2hmaUtySFUwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "dtaT9JGrhhz6iV_v5AGLyExhJR9meKwSmNACIFh4QoBOU-Mkw6Z0W2kRS1iyjJTvGphPV87SpbzWWOx7_kAUsXEdp-BXAeN9Y4cN7--5jYKxMCYm92oHEFU1G52FDzCBGxB_sd7wXdPZ7PM0mc7BqlD9_XcIocaheBWtimlvKcNYtyXP53c_tsytnkRMeCkCJsGoXV0_vHrPXjmWktlKhf6BtJTzXTVf0af_RDk76V-qwIo7cwpgJXAzj69-9927HWACm7lHbBvdMRLttWCLB_aziajdHDiCqfsRw_fPYD-0LzN1OXRGQS23tMQNOO6G7-MnR0E_K-B5cilYRvDOyw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-17 05:15:42,003:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-04-17 05:15:42,004:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 17 Apr 2024 03:15:30 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602501577 Replay-Nonce: 6qYJqZtwDh4xTNa5qDjUuDYh8uxGk7DvY6f69xQ9XeZFCvxdOl4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:29Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432301817" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602501577" } 2024-04-17 05:15:42,004:DEBUG:acme.client:Storing nonce: 6qYJqZtwDh4xTNa5qDjUuDYh8uxGk7DvY6f69xQ9XeZFCvxdOl4 2024-04-17 05:15:42,004:DEBUG:acme.client:JWS payload: b'' 2024-04-17 05:15:42,009:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432301817: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNnFZSnFadHdEaDR4VE5hNXFEalV1RFloOHV4R2s3RHZZNmY2OXhROVhlWkZDdnhkT2w0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIzMDE4MTcifQ", "signature": "ANPsiu5ADEeJW3IkGOEZpX5_nHRP5Q0tm-YFfBdG8_aOh-DAyqMQsbYpMBozCdeQr2lscsuiW7L9rr39DO_OMLvN8sogZADI7PAmG6RMJMksQ830IlxTaX0Av1Q2mhY8s08dDOAPreGgfkeK3oB039yOZy7PngaSMEnJ-Ns26tWTDuRW09wsbssDPL-QWZGFChONQIDj2jN6eGMbqmGWuBcR7xt58Trmd4FKbF2tvII--zCLWndJxcpYigLQucE_bhqWsphqAtYUzJ87pUiGm1iU7v5pE1qqWtOZEVNqUozcSM3t6faPkDpxRnxBaKCpKKK9ykxXORi2BDY7MYgzmg", "payload": "" } 2024-04-17 05:15:42,178:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432301817 HTTP/1.1" 200 801 2024-04-17 05:15:42,179:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:15:30 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: V_63_Dn5Y0IRI95TKPTTc68COXmRam5JrkevwlzNdt9uzWX4aKk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:29Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432301817/KUsjpA", "token": "aJoctLqucZb2n7qPJSTGLKpqSvnhh5SD51cTgx2saDg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432301817/GSkFsw", "token": "aJoctLqucZb2n7qPJSTGLKpqSvnhh5SD51cTgx2saDg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432301817/hKNbdQ", "token": "aJoctLqucZb2n7qPJSTGLKpqSvnhh5SD51cTgx2saDg" } ] } 2024-04-17 05:15:42,179:DEBUG:acme.client:Storing nonce: V_63_Dn5Y0IRI95TKPTTc68COXmRam5JrkevwlzNdt9uzWX4aKk 2024-04-17 05:15:42,179:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-17 05:15:42,180:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-04-17 05:15:42,180:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-17 05:15:42,180:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-17 05:15:42,181:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-17 05:15:42,181:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-17 05:15:42,181:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-17 05:15:42,182:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-17 05:15:42,183:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-17 05:15:42,232:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-17 05:15:42,568:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-17 05:15:42,569:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-17 05:15:42,570:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-17 05:15:42,575:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:32 UTC. 2024-04-17 05:15:42,575:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-17 05:15:42,575:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-17 05:15:42,581:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0400C3D0> Prep: True 2024-04-17 05:15:42,582:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0400C3D0> and installer None 2024-04-17 05:15:42,582:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-17 05:15:42,587:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-04-17 05:15:42,588:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-17 05:15:42,590:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-17 05:15:43,103:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-17 05:15:43,104:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:15:31 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "BNmHnbVrFZs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-17 05:15:43,104:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-17 05:15:47,240:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7679_key-certbot.pem 2024-04-17 05:15:51,081:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7677_csr-certbot.pem 2024-04-17 05:15:51,082:DEBUG:acme.client:Requesting fresh nonce 2024-04-17 05:15:51,082:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-17 05:15:51,238:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-17 05:15:51,238:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:15:39 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: 41Xn7EjclAZegQCUeynxdvZqIIkHTtM0z-4bAjAAvDAoI7jt-WU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-17 05:15:51,238:DEBUG:acme.client:Storing nonce: 41Xn7EjclAZegQCUeynxdvZqIIkHTtM0z-4bAjAAvDAoI7jt-WU 2024-04-17 05:15:51,239:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-04-17 05:15:51,244:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNDFYbjdFamNsQVplZ1FDVWV5bnhkdlpxSUlrSFR0TTB6LTRiQWpBQXZEQW9JN2p0LVdVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "dKbZoLPw7bfrKG3RApbxtem6nmLqwMJToMxYdF8ODfFsC2CrfgzEaK_mOAdv68TzWlwXx4bvZF-uuYeAndzvU7qXhC8UK7NOCFLbGYVi6_qGG8zX0DcyHnrcz9_BocnQIZnRTQOKUHvXQbVfzO8MjqmdQ13mjxxUDj_yM6HF5z3bRd0enofHNRWU2hRR6BFgAWmbBhwhLyUr_XPEUEGIB2qEgq9tO4OXzsYjh2Pt7jw-AYx0Jb5HMg6FsOMKiy-3bgzcMRFHVrvBx6wNlcVGfw2g343zPTRGJtTeqPU_JU3Qf-4dFOYjV3TEjbvlqBg1vEVAdyp3PUtI5Khwbjmw-w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-17 05:15:51,478:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-17 05:15:51,479:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 17 Apr 2024 03:15:39 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602530997 Replay-Nonce: fYM0lmBidZCKhwR43hQDpqNL6vsZKwOf4dUhsqvKu5lf8jgHMe0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:39Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432345127" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602530997" } 2024-04-17 05:15:51,479:DEBUG:acme.client:Storing nonce: fYM0lmBidZCKhwR43hQDpqNL6vsZKwOf4dUhsqvKu5lf8jgHMe0 2024-04-17 05:15:51,479:DEBUG:acme.client:JWS payload: b'' 2024-04-17 05:15:51,485:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432345127: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZllNMGxtQmlkWkNLaHdSNDNoUURwcU5MNnZzWkt3T2Y0ZFVoc3F2S3U1bGY4amdITWUwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIzNDUxMjcifQ", "signature": "Dt7WFRqpK_OT2_zLJ0tlTbKLP2ERdzAkc0BzKmzM8ORhBY1VtWso5lj-sEd046rygh5Uk54CYG4BGAW5ayGe3BbcJYj0PRlFcS1-Cn3998zxbcX4NcjHCSTdvnwBtJ2t1UUhAzWRKNK_YWA-SbpKjZVUr-4O3PSNvx9xQSDrVW2upiNT3eKajiHbVSlQReLAqfU9PSeBbuylc_8emwX7jSh7dqVUvpwLPdcujzkvsB0lKxplNTh7nk6acZ4ScEdPJQH0GKFCWyvODGjcEK25PSlXL6VPvI6vux_zAD3bio74eInXxMyLlnchlRiqzecACOGGNyH60L_wn0Y5CwwEGw", "payload": "" } 2024-04-17 05:15:51,647:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432345127 HTTP/1.1" 200 805 2024-04-17 05:15:51,648:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:15:39 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: fYM0lmBiVTTdr3l5uGJ_MUNdwmbCrXZMjjdyhmqOqccvp403JTw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:39Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432345127/eBWc1Q", "token": "5UyKevrNT1gWHZXzXEnwqj5-0dF5Nn0eSvRut9pDKLs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432345127/m8stTw", "token": "5UyKevrNT1gWHZXzXEnwqj5-0dF5Nn0eSvRut9pDKLs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432345127/bNUYKA", "token": "5UyKevrNT1gWHZXzXEnwqj5-0dF5Nn0eSvRut9pDKLs" } ] } 2024-04-17 05:15:51,648:DEBUG:acme.client:Storing nonce: fYM0lmBiVTTdr3l5uGJ_MUNdwmbCrXZMjjdyhmqOqccvp403JTw 2024-04-17 05:15:51,648:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-17 05:15:51,649:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-04-17 05:15:51,649:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-17 05:15:51,650:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-17 05:15:51,651:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-17 05:15:51,651:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-17 05:15:51,651:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-17 05:15:51,651:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-17 05:15:51,653:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-17 05:15:51,701:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-17 05:15:51,968:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-17 05:15:51,969:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-04-17 05:15:51,970:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-04-17 05:15:51,975:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:27:48 UTC. 2024-04-17 05:15:51,975:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-17 05:15:51,975:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-17 05:15:51,980:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0451AAF0> Prep: True 2024-04-17 05:15:51,980:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0451AAF0> and installer None 2024-04-17 05:15:51,980:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-17 05:15:51,986:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-04-17 05:15:51,987:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-17 05:15:51,989:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-17 05:15:52,491:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-17 05:15:52,492:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:15:40 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "AzvUgP5rscY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-17 05:15:52,492:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-17 05:15:56,522:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7680_key-certbot.pem 2024-04-17 05:16:00,375:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7678_csr-certbot.pem 2024-04-17 05:16:00,376:DEBUG:acme.client:Requesting fresh nonce 2024-04-17 05:16:00,376:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-17 05:16:00,535:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-17 05:16:00,535:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:15:48 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: fYM0lmBibDYSuk5nLBspeuIlrJjfBdWFZB5b7CHBii5yR9jYga0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-17 05:16:00,535:DEBUG:acme.client:Storing nonce: fYM0lmBibDYSuk5nLBspeuIlrJjfBdWFZB5b7CHBii5yR9jYga0 2024-04-17 05:16:00,536:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-04-17 05:16:00,541:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZllNMGxtQmliRFlTdWs1bkxCc3BldUlsckpqZkJkV0ZaQjViN0NIQmlpNXlSOWpZZ2EwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "fVpw4sbqXs8xPAC8lXXZ_9Aofz8Mcx8NHmO07mlrI3bmDMFSCRY3A5qhFt0NdBo555zBFW9VjJ27YLv4rp_Z8qjHv6EmaoOgAT9nvvxObYiC-a6Pjr8JuhVQPSEijv2qPavHSfFBoJJmUSPXSS7DO4s3Z2CBnGfBWtqdnfax4GLtbU6u4LVbRyL_c7w2cS7sWPHc0uEQht59DUxq4psxTEh_d-If1ZCHJOtJZR46pkpiOoap7uCMAqkNnuARjVKHRqB4Abi7yC5RkpdC_rBIoJXg5uZKYc0YZJtmhY74D-acCr88kvIcVt7SFOnnb-NQgjMfSVMWuI0aeuIGSJ_RJw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-04-17 05:16:00,831:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-04-17 05:16:00,831:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 17 Apr 2024 03:15:48 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602558537 Replay-Nonce: fYM0lmBiUuE22x_HyWTsW2UmmzQXCfGFzhm9cTdVx-eTSMAfbiY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:48Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432384097" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602558537" } 2024-04-17 05:16:00,831:DEBUG:acme.client:Storing nonce: fYM0lmBiUuE22x_HyWTsW2UmmzQXCfGFzhm9cTdVx-eTSMAfbiY 2024-04-17 05:16:00,831:DEBUG:acme.client:JWS payload: b'' 2024-04-17 05:16:00,837:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432384097: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZllNMGxtQmlVdUUyMnhfSHlXVHNXMlVtbXpRWENmR0Z6aG05Y1RkVngtZVRTTUFmYmlZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzIzODQwOTcifQ", "signature": "Qh7ubvMOp_OsqTLuC521CcjBddlBMZJUt7HDb8ikJFLjm20eEQF1keoAvHR6riqE-lf2i2ZaC5jHz5AN8L2jjSvONneHkNKFEaCZhGmLj_M-cgBdASari3qkw_leqKn-FH8NsxCjmYhFYnyvvgATf9Pz_LWgBiYBx1peNHxVFeroCQu5BRq37fl-ZY6wTML1k_eEgqKBZEs0Oem6sP0dbVsIJXz71iNURAL7lSn3WpBrKsge2gk9ebiIGeja8KYbMoumZRURUX0JGxqqXRhNmNvyvl0_2IXQxSAr3Ywk-g1yaJ0FrcrTavnRf4gHyzhJFJN-T6ksAdfu6k4Xj0BJTA", "payload": "" } 2024-04-17 05:16:00,994:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432384097 HTTP/1.1" 200 809 2024-04-17 05:16:00,995:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:15:49 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: 41Xn7EjczTKLceCvsyA454GRYXgJC0xNwjGYARndLVFVrxbJ2t4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:48Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432384097/oy60bw", "token": "KdhtE0Xta-NlGc-BLHiR0CXHzhbLLW5SC-IuRAbvcm8" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432384097/_4L04g", "token": "KdhtE0Xta-NlGc-BLHiR0CXHzhbLLW5SC-IuRAbvcm8" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432384097/r2alHg", "token": "KdhtE0Xta-NlGc-BLHiR0CXHzhbLLW5SC-IuRAbvcm8" } ] } 2024-04-17 05:16:00,995:DEBUG:acme.client:Storing nonce: 41Xn7EjczTKLceCvsyA454GRYXgJC0xNwjGYARndLVFVrxbJ2t4 2024-04-17 05:16:00,996:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-17 05:16:00,996:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-04-17 05:16:00,997:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-17 05:16:00,997:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-17 05:16:00,998:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-17 05:16:00,998:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-17 05:16:00,998:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-17 05:16:00,998:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-17 05:16:00,999:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-17 05:16:01,048:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-17 05:16:01,345:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-17 05:16:01,346:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-17 05:16:01,347:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-17 05:16:01,353:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:06 UTC. 2024-04-17 05:16:01,353:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-17 05:16:01,353:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-17 05:16:01,358:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04646710> Prep: True 2024-04-17 05:16:01,358:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04646710> and installer None 2024-04-17 05:16:01,359:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-17 05:16:01,363:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-04-17 05:16:01,364:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-17 05:16:01,366:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-17 05:16:01,801:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-17 05:16:01,801:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:15:49 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "YNkUlq0D65c": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-17 05:16:01,802:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-17 05:16:05,999:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7681_key-certbot.pem 2024-04-17 05:16:09,853:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7679_csr-certbot.pem 2024-04-17 05:16:09,853:DEBUG:acme.client:Requesting fresh nonce 2024-04-17 05:16:09,854:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-17 05:16:09,997:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-17 05:16:09,997:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:15:58 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: 6qYJqZtw2yyvTULGl0nmejjvHa6VL7-a8yx_QlZ8PJrjPtShHIo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-17 05:16:09,998:DEBUG:acme.client:Storing nonce: 6qYJqZtw2yyvTULGl0nmejjvHa6VL7-a8yx_QlZ8PJrjPtShHIo 2024-04-17 05:16:09,998:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-04-17 05:16:10,003:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNnFZSnFadHcyeXl2VFVMR2wwbm1lamp2SGE2Vkw3LWE4eXhfUWxaOFBKcmpQdFNoSElvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "vXH83novC0uOarKt1n_ihmdOp94QL0I0k52DQwM9MTzq428-P0UgV8MsEgONuyZqdj-7XM2E1arumgzJHbR-a3M3e5iPgDtWLNbUBjZizuDsXXmUgzF1wyijrKpGJ5Hdz518ALsnt9kXBNsung9LDFNvKm43fFfyE4gBCVQZGl5VvLCPqYauBlAgTpJ4cQ5O2S46xonljcMOJkZUxTt3j5WnOEEFEAcjYJsG3TopvEBa-dczFaNLvHNc88Fz0zaEuJfQ_rKZDNa5FLVSkPSEhT2BdpImXUgzX2cnTT0JeHAm63qnmHmMd4LZWaQlMFfZ5x5FznwTHSxsUA-HI9Yy6Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-04-17 05:16:10,344:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-04-17 05:16:10,345:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 17 Apr 2024 03:15:58 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602586927 Replay-Nonce: V_63_Dn5JjLORoXEaVO8wVl6I59Sncl62Sx2bodVlvVPuwk4ZrM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:15:58Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432423627" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602586927" } 2024-04-17 05:16:10,345:DEBUG:acme.client:Storing nonce: V_63_Dn5JjLORoXEaVO8wVl6I59Sncl62Sx2bodVlvVPuwk4ZrM 2024-04-17 05:16:10,345:DEBUG:acme.client:JWS payload: b'' 2024-04-17 05:16:10,351:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432423627: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVl82M19EbjVKakxPUm9YRWFWTzh3Vmw2STU5U25jbDYyU3gyYm9kVmx2VlB1d2s0WnJNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI0MjM2MjcifQ", "signature": "tiiH2bOExFOPWp4m2XPsxSEHpaF8my24sKPeyqOJIJxEI9kfT9dL_yNLDLTwHiegQ8rIvcSpTEraruewp8JgUwK9JHA9agn2KugQ5sYPnVttSCOFxscsQ6NDHNL_34YSCOevojKkH7IU0gxHWcr_iOWAAHhoBFuZdQX0rI1JwLaCbaG6unM2UsjCkQiTEnGdKHxeRubyuoKVSZZ8s06DfKSVTCpXKTQkGc2718n3q3Hwwf5qDDTvdrSK7TbxpHcjMCFeigg67q__ZmZIw6f4lP2HghR7YuyV4iED9eAPQTuW-W1W-neU4k1pBoqKLfrmTxkHWUkCecj-NB-EK90GGA", "payload": "" } 2024-04-17 05:16:10,550:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432423627 HTTP/1.1" 200 806 2024-04-17 05:16:10,551:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:15:58 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: V_63_Dn5od3VAW1PLqNjMEjM19OnLom81epe7-L29p2Dvn25hik X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:15:58Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432423627/-JWQ0A", "token": "FtGkmJLV6hVEahLLQUvN4xbgvT0vMtoyMkbghQ-HtEA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432423627/YJ2jiA", "token": "FtGkmJLV6hVEahLLQUvN4xbgvT0vMtoyMkbghQ-HtEA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432423627/r6TG8Q", "token": "FtGkmJLV6hVEahLLQUvN4xbgvT0vMtoyMkbghQ-HtEA" } ] } 2024-04-17 05:16:10,551:DEBUG:acme.client:Storing nonce: V_63_Dn5od3VAW1PLqNjMEjM19OnLom81epe7-L29p2Dvn25hik 2024-04-17 05:16:10,551:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-17 05:16:10,552:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-04-17 05:16:10,552:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-17 05:16:10,552:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-17 05:16:10,553:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-17 05:16:10,553:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-17 05:16:10,553:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-17 05:16:10,554:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-17 05:16:10,555:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-17 05:16:10,602:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-04-17 05:16:10,602:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-17 05:16:10,603:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-04-17 05:16:10,610:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-04-17 05:16:10,613:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-04-17 05:16:10,613:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-04-17 05:16:10,613:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-04-17 05:16:10,614:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-04-17 05:16:10,616:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-04-17 05:16:10,655:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-17 05:16:10,928:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-17 05:16:10,930:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-17 05:16:10,930:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-17 05:16:10,935:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:23 UTC. 2024-04-17 05:16:10,935:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-17 05:16:10,936:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-17 05:16:10,943:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04653530> Prep: True 2024-04-17 05:16:10,943:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04653530> and installer None 2024-04-17 05:16:10,943:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-17 05:16:10,948:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-04-17 05:16:10,948:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-17 05:16:10,950:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-17 05:16:11,413:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-17 05:16:11,414:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:15:59 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "XVwvX8IhMlg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-17 05:16:11,414:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-17 05:16:15,617:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7682_key-certbot.pem 2024-04-17 05:16:19,454:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7680_csr-certbot.pem 2024-04-17 05:16:19,454:DEBUG:acme.client:Requesting fresh nonce 2024-04-17 05:16:19,454:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-17 05:16:19,609:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-17 05:16:19,609:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:16:07 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: 41Xn7EjcVsHr75cUgstFOlX9min50xy0FrfnXuwDBbOo-klzMGQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-17 05:16:19,609:DEBUG:acme.client:Storing nonce: 41Xn7EjcVsHr75cUgstFOlX9min50xy0FrfnXuwDBbOo-klzMGQ 2024-04-17 05:16:19,610:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-04-17 05:16:19,615:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNDFYbjdFamNWc0hyNzVjVWdzdEZPbFg5bWluNTB4eTBGcmZuWHV3REJiT28ta2x6TUdRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "kj6D64c0tZDBgU6Upea71rG08PEwq16qUvrWeiGmZpPW2LbucQ3cbk0JMoAj8FI-BJ9eCZVnE0WYKcO0_QogDwEgszeyCOWvfHdiIPu-ra5qg8dpLFmSUlGO4iE4NHalLhhdokXHaJjmgXKQURvy4vDyttXkqmVFmpeQjB5DjYLd9_rmt9iZySHNCctkcTVOClvhcdCXdpsXcI5LhOilrm471sFhg9ti-Vj1GH7H4QP3VIKwGVyh2eL3vR2bFF31vgQcteBbTnPH5wjk5RZvMkjyDnuJ7VJj3lfZqCrxrSBKdn-Ml4LxT5nbcQvXegn16t9anuFJtB2ubRz_XmFNjw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-17 05:16:19,832:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-04-17 05:16:19,832:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 17 Apr 2024 03:16:07 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602629937 Replay-Nonce: 41Xn7EjcgZwnqeTQsRwGo_IuD_1dfb8mG18VGYaxCtMp0y1sK5w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:16:07Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432480227" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602629937" } 2024-04-17 05:16:19,832:DEBUG:acme.client:Storing nonce: 41Xn7EjcgZwnqeTQsRwGo_IuD_1dfb8mG18VGYaxCtMp0y1sK5w 2024-04-17 05:16:19,833:DEBUG:acme.client:JWS payload: b'' 2024-04-17 05:16:19,838:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432480227: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNDFYbjdFamNnWnducWVUUXNSd0dvX0l1RF8xZGZiOG1HMThWR1lheEN0TXAweTFzSzV3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI0ODAyMjcifQ", "signature": "wDdS6ukZae-L-BBvJejKzcohywk4VgItKeL2mjFaqAKj01K2tqdyDGo15SbRXM73b7zJ8f2AXFC-sNOURNFCBih_N-aYgouJPh9molakPyOzgMxvPuNwmHUC8hMaT4z8Nw2cn-Ld9h6UgBm5JO_-bO59Q3KTV60rlyJXiohpuBW8u9QFzGcct_Cl5O9mWvy0u3yf8pBCmFSzIYMB_Sf_nSbiHIFyDMvoGu6xQfj8oTtmIVfo_T5opluoo1U7oYuJWaSDibnkY13kYUUPcQ_uf0rUFDkip9S_QZNYWn5hVlqg6fc4r7zRhzafQPSSnLap6WnMVlyCDS__qe-wDAyEpw", "payload": "" } 2024-04-17 05:16:19,997:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432480227 HTTP/1.1" 200 811 2024-04-17 05:16:19,998:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:16:08 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: fYM0lmBiHxlIxq4TN_0ENig1-8GvVbIVhJ3w3q7DIx1plcPzrRc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:16:07Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432480227/1ONL0g", "token": "ITCDO08nCvNE1DIOCRls7iq_D7UJHrIPtfdyCmW-Hto" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432480227/E9W28w", "token": "ITCDO08nCvNE1DIOCRls7iq_D7UJHrIPtfdyCmW-Hto" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432480227/K6R9wQ", "token": "ITCDO08nCvNE1DIOCRls7iq_D7UJHrIPtfdyCmW-Hto" } ] } 2024-04-17 05:16:19,998:DEBUG:acme.client:Storing nonce: fYM0lmBiHxlIxq4TN_0ENig1-8GvVbIVhJ3w3q7DIx1plcPzrRc 2024-04-17 05:16:19,998:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-17 05:16:19,999:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-04-17 05:16:20,000:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-17 05:16:20,001:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-17 05:16:20,002:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-17 05:16:20,003:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-17 05:16:20,003:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-17 05:16:20,004:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-17 05:16:20,006:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-17 05:16:20,056:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-17 05:16:20,321:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-17 05:16:20,322:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-17 05:16:20,323:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-17 05:16:20,327:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:41 UTC. 2024-04-17 05:16:20,328:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-17 05:16:20,328:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-17 05:16:20,333:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0494B6B0> Prep: True 2024-04-17 05:16:20,333:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0494B6B0> and installer None 2024-04-17 05:16:20,333:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-17 05:16:20,338:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-04-17 05:16:20,339:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-17 05:16:20,341:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-17 05:16:20,808:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-17 05:16:20,808:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:16:08 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Bm4b1iN866c": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-17 05:16:20,809:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-17 05:16:24,743:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7683_key-certbot.pem 2024-04-17 05:16:28,492:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7681_csr-certbot.pem 2024-04-17 05:16:28,493:DEBUG:acme.client:Requesting fresh nonce 2024-04-17 05:16:28,493:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-17 05:16:28,649:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-17 05:16:28,650:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:16:16 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: fYM0lmBiI1XvdEQzoQNNNHPDet_G4Ncq72xT7WFWYX1RHex7RJc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-17 05:16:28,650:DEBUG:acme.client:Storing nonce: fYM0lmBiI1XvdEQzoQNNNHPDet_G4Ncq72xT7WFWYX1RHex7RJc 2024-04-17 05:16:28,650:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-04-17 05:16:28,656:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZllNMGxtQmlJMVh2ZEVRem9RTk5OSFBEZXRfRzROY3E3MnhUN1dGV1lYMVJIZXg3UkpjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ZLoKAZVT_3WTgjKceYtloBJaJkv4sq_tY35xP28jPeL7QoA-_94c2qisljnV2HPo-wPIqJcfP8BrGsC0IcVJmofZemYJm8VXPnbJRU2m5PHv1SwGAg3ZihXtRr6rm7HHi841cnLziuA_jO-H2Q7u27luqJyQV4RmcitHAIcguHqpfvaN-S9pQieEt4Bfzd0v6JjtTXh_bH3LVZhnOI0JvyOwuW6hPEbY3AJ4M1FCRUYbQh9i2H9iymNzW2YLfudYWOnh9IDEeCHN2MbJ-719NzN-n42gsexBIeEScQecPqURtY9cxW99u2iB_vpy3WQKkYQiQydVG7XZmBOn2mj6xg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-04-17 05:16:28,855:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-04-17 05:16:28,856:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 17 Apr 2024 03:16:16 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602663067 Replay-Nonce: fYM0lmBiDkWITYF-llInrC1TRRXqkvjFDJSHvDlnnTOHqcy3p9k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:16:16Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432528027" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602663067" } 2024-04-17 05:16:28,856:DEBUG:acme.client:Storing nonce: fYM0lmBiDkWITYF-llInrC1TRRXqkvjFDJSHvDlnnTOHqcy3p9k 2024-04-17 05:16:28,856:DEBUG:acme.client:JWS payload: b'' 2024-04-17 05:16:28,861:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432528027: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZllNMGxtQmlEa1dJVFlGLWxsSW5yQzFUUlJYcWt2akZESlNIdkRsbm5UT0hxY3kzcDlrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI1MjgwMjcifQ", "signature": "e-NXL5TPq_M3Z5WLoMahLHFUVH7fqlHY9JeirvFQKVGp-L2atiQgKZd83hFCx6gr8ibBTCFs0zxpQKVJf7uCMBuGFspNCa4IVUx-1em1hwoRLmwv4qKKp1JtfbM-xnv705L8x9ht1FnnSaDQj9b3cdQjgr1Ei3i2tTqOK9hpWSm3qDaqeR1raM_pvVGTbvc0vrWUm2ngUQ1sGbzBN973ZJgLQmKe-sNaGR9c3FpZ9SK8cQxnLLD2EeOsuQaKoBb6moRIXpALRKTl9gXiePvAZHzM-8qJtjf1Dm3izcLedhKWdNpRsBunVkA9_wk64zgohpfYhx8q5nL9FQkVFk22zw", "payload": "" } 2024-04-17 05:16:29,020:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432528027 HTTP/1.1" 200 810 2024-04-17 05:16:29,021:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:16:17 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: 41Xn7EjcQkE9-7a-dyN2siI6NrJCaa7goSIAqJhboCieVxfLYw8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:16:16Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432528027/fZogaQ", "token": "h0h-k3kZQGgl45o3tvwNVxLq541oGGp1Pw1lsGcDtWA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432528027/ApLG9Q", "token": "h0h-k3kZQGgl45o3tvwNVxLq541oGGp1Pw1lsGcDtWA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432528027/eOLRKQ", "token": "h0h-k3kZQGgl45o3tvwNVxLq541oGGp1Pw1lsGcDtWA" } ] } 2024-04-17 05:16:29,021:DEBUG:acme.client:Storing nonce: 41Xn7EjcQkE9-7a-dyN2siI6NrJCaa7goSIAqJhboCieVxfLYw8 2024-04-17 05:16:29,021:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-17 05:16:29,022:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-04-17 05:16:29,022:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-17 05:16:29,023:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-17 05:16:29,023:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-17 05:16:29,024:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-17 05:16:29,024:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-17 05:16:29,024:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-17 05:16:29,025:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-17 05:16:29,066:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-17 05:16:29,378:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-17 05:16:29,380:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-04-17 05:16:29,380:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-04-17 05:16:29,384:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:28:58 UTC. 2024-04-17 05:16:29,385:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-17 05:16:29,385:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-17 05:16:29,391:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x040B56D0> Prep: True 2024-04-17 05:16:29,391:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x040B56D0> and installer None 2024-04-17 05:16:29,391:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-17 05:16:29,395:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-04-17 05:16:29,396:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-17 05:16:29,398:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-17 05:16:29,843:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-17 05:16:29,843:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:16:17 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "OatgO91TKDo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-17 05:16:29,844:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-17 05:16:33,631:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7684_key-certbot.pem 2024-04-17 05:16:37,403:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7682_csr-certbot.pem 2024-04-17 05:16:37,404:DEBUG:acme.client:Requesting fresh nonce 2024-04-17 05:16:37,404:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-17 05:16:37,552:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-17 05:16:37,552:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:16:25 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: 6qYJqZtwx9xGqL-0vOud0C2oZLO_Zu5FxN-OtPLMticBorqoLW0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-17 05:16:37,552:DEBUG:acme.client:Storing nonce: 6qYJqZtwx9xGqL-0vOud0C2oZLO_Zu5FxN-OtPLMticBorqoLW0 2024-04-17 05:16:37,553:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-04-17 05:16:37,558:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNnFZSnFadHd4OXhHcUwtMHZPdWQwQzJvWkxPX1p1NUZ4Ti1PdFBMTXRpY0JvcnFvTFcwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "nzog65IvMVePVQ3bojCURk-lRrSWyaUvI4K9QWbefmJGnufxxjdEKqyJlamX0eM1omFY4EJbk1sCBIgGsYYlzn7_h0dEgKSFtfifheuezvN6cq4X7eWUhdWfdYjbG5mOnQYK4ytzyD1NkNiWbC99EECKnvQMMxTXgw8y9aU_QwXH5BUFTlHQ_qF0Jq4L0spoI7IVLCMKdkb4rfexSDfTWFg356M5HG2DSEVVBrcVJpeGBwVfnCASPne14UGvk8Hb20ckYHdIBPV3GbdWzpSWnHcnmBocltsSrzjuXs-4ylXRbtBY3p3V2D4CNM2KIZriexF01D7KKEonqOwjgisdYg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-04-17 05:16:37,948:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-04-17 05:16:37,948:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 17 Apr 2024 03:16:25 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602692837 Replay-Nonce: 6qYJqZtwufXFxc5exCx2nI_yla4pTHsTl63iO1c0lrdOkJsGqJU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:16:25Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432570877" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602692837" } 2024-04-17 05:16:37,948:DEBUG:acme.client:Storing nonce: 6qYJqZtwufXFxc5exCx2nI_yla4pTHsTl63iO1c0lrdOkJsGqJU 2024-04-17 05:16:37,949:DEBUG:acme.client:JWS payload: b'' 2024-04-17 05:16:37,953:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432570877: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNnFZSnFadHd1ZlhGeGM1ZXhDeDJuSV95bGE0cFRIc1RsNjNpTzFjMGxyZE9rSnNHcUpVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI1NzA4NzcifQ", "signature": "cxAayfwKSZysVwOA3Q6_AlZF_dq5YWJCuhakOP7Dx_Ue5hYsmOjQCMICkt15R0xWnG3eIj_sbN-jn74qpnAt6StTq8GZgG4-tsSTTePdOUNhirB5PyQRN6rJzuxLuV0t9vxrez_x_lS00H6KShFr5aPSQs85s_5YAbrRxwu-pCprjQ4j7AqYpzRGtXSCsUhO8phSmbsol_ZvE5hiJP6CcuPaGSb2ad2iI6NMFnM_kk8kFdizTdStJAJ_-llAFpIvYRxCzGgbhtMRTvhGyhU9U_CVS-tf-CS19JiggijPufF4owU62o_2fr6AkX4GVPBV0sIkW0VbdsxaEsxezn2d8w", "payload": "" } 2024-04-17 05:16:38,189:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432570877 HTTP/1.1" 200 809 2024-04-17 05:16:38,190:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:16:26 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: V_63_Dn5qcITfqpDcpxJ2bsytkfC9DrKk7MFz-ezWEHUklVKUnI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:16:25Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432570877/IP7Jnw", "token": "6wDg_FeOhbW91soX0twO-HqBmGz9rn_f6CKB-7YK190" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432570877/jfJGPg", "token": "6wDg_FeOhbW91soX0twO-HqBmGz9rn_f6CKB-7YK190" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432570877/AYFk4w", "token": "6wDg_FeOhbW91soX0twO-HqBmGz9rn_f6CKB-7YK190" } ] } 2024-04-17 05:16:38,190:DEBUG:acme.client:Storing nonce: V_63_Dn5qcITfqpDcpxJ2bsytkfC9DrKk7MFz-ezWEHUklVKUnI 2024-04-17 05:16:38,190:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-17 05:16:38,191:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-04-17 05:16:38,191:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-17 05:16:38,192:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-17 05:16:38,192:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-17 05:16:38,193:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-17 05:16:38,193:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-17 05:16:38,193:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-17 05:16:38,194:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-17 05:16:38,235:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-17 05:16:38,523:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-17 05:16:38,525:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2024-04-17 05:16:38,526:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2024-04-17 05:16:38,530:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:17 UTC. 2024-04-17 05:16:38,530:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-17 05:16:38,531:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-17 05:16:38,536:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0451A370> Prep: True 2024-04-17 05:16:38,536:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0451A370> and installer None 2024-04-17 05:16:38,536:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-17 05:16:38,541:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-04-17 05:16:38,542:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-17 05:16:38,544:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-17 05:16:39,008:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-17 05:16:39,008:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:16:27 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "0uwsw_bzT2w": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-17 05:16:39,009:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-17 05:16:43,423:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7685_key-certbot.pem 2024-04-17 05:16:47,182:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7683_csr-certbot.pem 2024-04-17 05:16:47,183:DEBUG:acme.client:Requesting fresh nonce 2024-04-17 05:16:47,183:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-17 05:16:47,338:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-17 05:16:47,339:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:16:35 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: fYM0lmBiS-MuXVaw38UTBKdTDlEUFZS_CcfnAzGo139ELgAcFCE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-17 05:16:47,339:DEBUG:acme.client:Storing nonce: fYM0lmBiS-MuXVaw38UTBKdTDlEUFZS_CcfnAzGo139ELgAcFCE 2024-04-17 05:16:47,339:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-04-17 05:16:47,344:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZllNMGxtQmlTLU11WFZhdzM4VVRCS2RURGxFVUZaU19DY2ZuQXpHbzEzOUVMZ0FjRkNFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "iRDKBcnNdoEgDxFe0K1-kkERkJN1SB4bQl-Y_E77DMuwgDwx9IiBfFBJE6lJIjzFdqSr8diGBGwcj3yUCsAjSpdqJv_J2G6xeYEQHmhis1rPUc-Dfbz7P3F1a_orNQC6_UU6APPd5_oh7LQ4i4Yza0YBHvFb7963JzZCUndE900zbUd4U0FCEio3f7XSStZ9lUgtSgtAd2KZ5HttEHl38ESwXig6_hXysypqU53XeriENz_n1mNZ07hzYcu1qe5JCHrRBKFuSKbrSH77x2Td1_RgYOqmX8OMvA5hqPLMcOHfJKHdbeqAuZHoXIdfiabt_mLUFgJFsQSeT2c4zyM5hw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-17 05:16:47,530:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-17 05:16:47,531:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 17 Apr 2024 03:16:35 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602722417 Replay-Nonce: fYM0lmBiZcwb7zmouG5l-N4MhAPv-kaU3Tw7-Bggiu_DSTjMjLo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:16:35Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432614317" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602722417" } 2024-04-17 05:16:47,531:DEBUG:acme.client:Storing nonce: fYM0lmBiZcwb7zmouG5l-N4MhAPv-kaU3Tw7-Bggiu_DSTjMjLo 2024-04-17 05:16:47,532:DEBUG:acme.client:JWS payload: b'' 2024-04-17 05:16:47,537:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432614317: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZllNMGxtQmlaY3diN3ptb3VHNWwtTjRNaEFQdi1rYVUzVHc3LUJnZ2l1X0RTVGpNakxvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI2MTQzMTcifQ", "signature": "qPZ2Plj8_rX-gMCbkcZrkZmnesned1zJzEnYwPKkjl2I44z9sRqx_8nZYCZcFODLhjHvaIBX_tyJFbepA8aPEJQ4mnhK0q0ovZl08TEr6B-iTpSu3OBc6u2FMzAgaqM_mbFMqN5W-kW3Dws2Sik-W7TptQIeG8aiAvXKh0kWj997IKD5QJkhaLtRNFDgaxOls0WDvL4pSvSVAr3PzIzDQPVyVCaK288ZdxDzaSwfnNIBPy5JKDF4AFUzmkp_xsGxHoD4d19Cx3_FcHu7m2RpsUnJG5AOu01PtGLGMsHFNmhvkTBA2imNB2VYnXHDz3pM4m91YlVeoMmbym62aV31Tg", "payload": "" } 2024-04-17 05:16:47,696:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432614317 HTTP/1.1" 200 805 2024-04-17 05:16:47,697:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:16:35 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: 41Xn7Ejcp6hw97UVGvGVtFSL-2IzZf4QXjAX3ZZZkL22ZHbOCtU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:16:35Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432614317/xAjnBA", "token": "RG1vFP3wsSY4J9gUkurgcdKS0Hmm4ra8cQyi1u1JM6U" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432614317/eaCuPQ", "token": "RG1vFP3wsSY4J9gUkurgcdKS0Hmm4ra8cQyi1u1JM6U" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432614317/2jUEjw", "token": "RG1vFP3wsSY4J9gUkurgcdKS0Hmm4ra8cQyi1u1JM6U" } ] } 2024-04-17 05:16:47,697:DEBUG:acme.client:Storing nonce: 41Xn7Ejcp6hw97UVGvGVtFSL-2IzZf4QXjAX3ZZZkL22ZHbOCtU 2024-04-17 05:16:47,697:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-17 05:16:47,698:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-04-17 05:16:47,698:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-17 05:16:47,699:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-17 05:16:47,699:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-17 05:16:47,699:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-17 05:16:47,699:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-17 05:16:47,700:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-17 05:16:47,701:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-17 05:16:47,753:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-17 05:16:48,025:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-17 05:16:48,026:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert17.pem is signed by the certificate's issuer. 2024-04-17 05:16:48,027:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert17.pem is: OCSPCertStatus.GOOD 2024-04-17 05:16:48,031:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:34 UTC. 2024-04-17 05:16:48,031:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-17 05:16:48,032:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-17 05:16:48,038:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0494BF50> Prep: True 2024-04-17 05:16:48,038:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0494BF50> and installer None 2024-04-17 05:16:48,038:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-17 05:16:48,044:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-04-17 05:16:48,045:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-17 05:16:48,047:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-17 05:16:48,521:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-17 05:16:48,522:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:16:36 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "YjxuCqye2E4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-17 05:16:48,522:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-17 05:16:52,338:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7686_key-certbot.pem 2024-04-17 05:16:56,090:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7684_csr-certbot.pem 2024-04-17 05:16:56,091:DEBUG:acme.client:Requesting fresh nonce 2024-04-17 05:16:56,091:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-17 05:16:56,249:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-17 05:16:56,249:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:16:44 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: fYM0lmBi-sN6dbF0bzGjaPSyaVclOHvPRf2v7NvXUFHVLCi-EDs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-17 05:16:56,250:DEBUG:acme.client:Storing nonce: fYM0lmBi-sN6dbF0bzGjaPSyaVclOHvPRf2v7NvXUFHVLCi-EDs 2024-04-17 05:16:56,250:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-04-17 05:16:56,256:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZllNMGxtQmktc042ZGJGMGJ6R2phUFN5YVZjbE9IdlBSZjJ2N052WFVGSFZMQ2ktRURzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "uzIbMCRL7xQgWNPzvB4BUrMjbYIJoOrs7HBQEGkQZxPqRI3K0V43y-5Hf2yTsdu1AcdY2b-cQUiqnFNDEzAnX053dWHiZK0dCXvMzrge_rqDlzCLVN3BlWk9io5mjup8uRs91nUKtF5-yFIw-4XaqGAfcjjUMfCdRsq6CGVrzJjpgAf1JYzFaLhI5Qt5OILjHSCaPAEs8hSL33oMpj5BSBb5r61KiZ6YAe-mcUQzJQJWFzi4rG42Z_Eg1NrGTxhnGl5r1alAvlVnTbX3lBBBNaIo7w-ysi2GszoiYwfBNqncpnSoY3i7Y5bwwIk03MCps-Mnmf_Jdzry6CFnN9k_CQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-17 05:16:56,590:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-17 05:16:56,590:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 17 Apr 2024 03:16:44 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602748407 Replay-Nonce: 41Xn7Ejcy_uROpS_grfqV-efNxEd2Kpd3S732CNx6CWMN9Q-kys X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:16:44Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432651637" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602748407" } 2024-04-17 05:16:56,591:DEBUG:acme.client:Storing nonce: 41Xn7Ejcy_uROpS_grfqV-efNxEd2Kpd3S732CNx6CWMN9Q-kys 2024-04-17 05:16:56,591:DEBUG:acme.client:JWS payload: b'' 2024-04-17 05:16:56,596:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432651637: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNDFYbjdFamN5X3VST3BTX2dyZnFWLWVmTnhFZDJLcGQzUzczMkNOeDZDV01OOVEta3lzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI2NTE2MzcifQ", "signature": "TA4dhsEoRWE6a4-QgcpHeRNmF3AuWv4gETp78oZ0oR-vBiVHHaRi2GsOvC4TYSOseO2hPDpa_BM8j4deXth9R-dqpOj26s_fP6-fQUwahM7AaDEMqKYYdnJ9kFtdPwp7WugfYutiAEDWrLUefZszNWwSjYGQe6DYYe4FQ-vFLz1XRK1Nxv7gxBCLopx01cpp2U6w_Qf_MgIyaRrFmeve9XLSQUD2ooU4dAecRcZLDmJDl2pCZZa_osVR5CY7HaDHf9zs4oQ2GNNlNpuZb2_wDrXsgr_Q11L3FUnhe2-tc9LJbNmR2kpMCHzrwYrVlAkha4k4k0WzNAYAP7JwCeGSgA", "payload": "" } 2024-04-17 05:16:56,757:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432651637 HTTP/1.1" 200 805 2024-04-17 05:16:56,758:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:16:44 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: fYM0lmBizfr2EYIynHfVx-DHtW8K0BnSsUEVdYj2FZ3-PmxJGNE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:16:44Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432651637/MmDBAg", "token": "tp6ABUDDbWbczEBv42KG5z6hEJeiI6L08Lc5HKW8gjA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432651637/zq-rkw", "token": "tp6ABUDDbWbczEBv42KG5z6hEJeiI6L08Lc5HKW8gjA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432651637/n89D0Q", "token": "tp6ABUDDbWbczEBv42KG5z6hEJeiI6L08Lc5HKW8gjA" } ] } 2024-04-17 05:16:56,758:DEBUG:acme.client:Storing nonce: fYM0lmBizfr2EYIynHfVx-DHtW8K0BnSsUEVdYj2FZ3-PmxJGNE 2024-04-17 05:16:56,759:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-17 05:16:56,759:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-04-17 05:16:56,760:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-17 05:16:56,760:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-17 05:16:56,761:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-17 05:16:56,761:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-17 05:16:56,761:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-17 05:16:56,762:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-17 05:16:56,764:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-17 05:16:56,812:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-04-17 05:16:56,957:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-04-17 05:16:56,958:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-04-17 05:16:56,959:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-04-17 05:16:56,963:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-05-16 19:29:48 UTC. 2024-04-17 05:16:56,963:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-04-17 05:16:56,964:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-04-17 05:16:56,969:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x008EAF10> Prep: True 2024-04-17 05:16:56,969:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x008EAF10> and installer None 2024-04-17 05:16:56,969:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-04-17 05:16:56,974:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-04-17 05:16:56,975:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-04-17 05:16:56,977:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-04-17 05:16:57,416:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 747 2024-04-17 05:16:57,416:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:16:45 GMT Content-Type: application/json Content-Length: 747 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "P4wmqmiPDNg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-04-17 05:16:57,417:INFO:certbot._internal.main:Renewing an existing certificate 2024-04-17 05:17:01,394:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7687_key-certbot.pem 2024-04-17 05:17:05,127:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7685_csr-certbot.pem 2024-04-17 05:17:05,127:DEBUG:acme.client:Requesting fresh nonce 2024-04-17 05:17:05,127:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-04-17 05:17:05,282:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-04-17 05:17:05,282:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:16:53 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: V_63_Dn5A-uD_WOqIQMiSMv93dquSCv0GIzdGHSXbi18MJe0D6U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-04-17 05:17:05,282:DEBUG:acme.client:Storing nonce: V_63_Dn5A-uD_WOqIQMiSMv93dquSCv0GIzdGHSXbi18MJe0D6U 2024-04-17 05:17:05,283:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-04-17 05:17:05,288:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVl82M19EbjVBLXVEX1dPcUlRTWlTTXY5M2RxdVNDdjBHSXpkR0hTWGJpMThNSmUwRDZVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "qfohHjon8VwrUKsgvVow8gdVkC2UatyGPVO1shXXyurao6Liwqumfm0tHc8coi7D56fjxPOm-5BpLeSkJVW6td4TkToLlXKB-u-g0qvr3R2lncXQW4mzlAAqkJWLE3kdl8_zH77hPwWuprabTpNRj8PCRHt8uNOJPyqQmBYIzIUeKQ5h6HlqQIjWUVnNbtfDTOliuOOMVGQGY231MvqVed-ETIVXzeS_7uGcg_Vxa6TnqFj_EEPPscqQmjhErpPuM77eZJYXc1jgS6TV_cSRBwg7rJJH_yN0gM3F_EEaMqr-HWpLVUrMF2n5eIe2Z_LMyBCt_kuV5IxpteTkoIhH5Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-04-17 05:17:05,626:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-04-17 05:17:05,626:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 17 Apr 2024 03:16:53 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/261602776607 Replay-Nonce: 6qYJqZtwyFQki1OxOSdh7OSrNZkkBp1-flz1dSn9nCAMWz44BA0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-04-24T03:16:53Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432691097" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/261602776607" } 2024-04-17 05:17:05,626:DEBUG:acme.client:Storing nonce: 6qYJqZtwyFQki1OxOSdh7OSrNZkkBp1-flz1dSn9nCAMWz44BA0 2024-04-17 05:17:05,627:DEBUG:acme.client:JWS payload: b'' 2024-04-17 05:17:05,632:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/339432691097: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNnFZSnFadHd5RlFraTFPeE9TZGg3T1NyTlpra0JwMS1mbHoxZFNuOW5DQU1XejQ0QkEwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMzk0MzI2OTEwOTcifQ", "signature": "fnopJiqiCX_sqkW-s6oOPYMNCCxLrbGat6AtuyvJZThEl9mVyp2_A8yzYocaimwuSauQOXshaLGvleIakx-c5qjXbCbIgr838ScMQP9jEu_oLSiP7JUFF0a6oV1Gx66W-oLOgujC1upolPEg_8au1STvW43Yk9PLkqe1qOAeRcyGVPGk1u9VH12S6fNE0rE-aR38dDk-Giuy1Leo61SHgEk-NArSvFVQcEZJEi_QPtdC0QctuQIjq4PZ_Otl6e-LixYVdbxc5jugQ9WTeFtihaqN1cyutQ6Od7e5yA9qIGiOfRjAB-vQkdsd6dmUXS4I2zyx8eZ2PbJE2UzxHns_qQ", "payload": "" } 2024-04-17 05:17:05,784:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/339432691097 HTTP/1.1" 200 805 2024-04-17 05:17:05,784:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 17 Apr 2024 03:16:53 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: 6qYJqZtwrcdJsiOpWJxixGnIKMM64jCdQiBfb0iv9L77awZ66rY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-04-24T03:16:53Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432691097/PSRvrQ", "token": "RlxqSNpNGDiYI8pHcb4-btU3K4CtHRMPAT7ZeQIyKUU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432691097/SZF9hg", "token": "RlxqSNpNGDiYI8pHcb4-btU3K4CtHRMPAT7ZeQIyKUU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/339432691097/9pqO_A", "token": "RlxqSNpNGDiYI8pHcb4-btU3K4CtHRMPAT7ZeQIyKUU" } ] } 2024-04-17 05:17:05,784:DEBUG:acme.client:Storing nonce: 6qYJqZtwrcdJsiOpWJxixGnIKMM64jCdQiBfb0iv9L77awZ66rY 2024-04-17 05:17:05,785:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-04-17 05:17:05,786:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-04-17 05:17:05,786:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-04-17 05:17:05,786:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-04-17 05:17:05,787:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-17 05:17:05,788:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-04-17 05:17:05,788:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-04-17 05:17:05,788:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-04-17 05:17:05,789:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-04-17 05:17:05,790:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-04-17 05:17:05,790:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-04-17 05:17:05,791:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module> sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-04-17 05:17:05,792:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)