2024-02-16 04:37:19,894:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-02-16 04:37:19,895:DEBUG:certbot._internal.main:Arguments: [] 2024-02-16 04:37:19,895:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-02-16 04:37:20,738:DEBUG:certbot._internal.log:Root logging level set at 20 2024-02-16 04:37:20,739:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-02-16 04:37:20,774:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-02-16 04:37:20,813:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-16 04:37:21,091:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-16 04:37:21,093:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is signed by the certificate's issuer. 2024-02-16 04:37:21,098:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is: OCSPCertStatus.GOOD 2024-02-16 04:37:21,107:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:15 UTC. 2024-02-16 04:37:21,107:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-16 04:37:21,108:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-16 04:37:21,112:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-16 04:37:21,113:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-16 04:37:21,113:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-16 04:37:21,118:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-16 04:37:21,119:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-16 04:37:21,121:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-16 04:37:21,594:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-16 04:37:21,595:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:37:21 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "mU6JH0kPmt8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-16 04:37:21,595:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-16 04:37:26,196:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7636_key-certbot.pem 2024-02-16 04:37:30,359:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7634_csr-certbot.pem 2024-02-16 04:37:30,360:DEBUG:acme.client:Requesting fresh nonce 2024-02-16 04:37:30,360:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-16 04:37:30,510:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-16 04:37:30,510:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:37:29 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2wyerpqJRIgderrD5Y2dwguN1ZV9_StDq7DKC8viyYHLOg5caBE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-16 04:37:30,510:DEBUG:acme.client:Storing nonce: 2wyerpqJRIgderrD5Y2dwguN1ZV9_StDq7DKC8viyYHLOg5caBE 2024-02-16 04:37:30,510:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-02-16 04:37:30,515:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMnd5ZXJwcUpSSWdkZXJyRDVZMmR3Z3VOMVpWOV9TdERxN0RLQzh2aXlZSExPZzVjYUJFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "DTKiEmzbbJEax4TqLfo9wRLp_PgWNLW_TUjIsdI1n0s-nugyb4sERiDwzSmtB02oxtAEMWZLbG3K52Wk-fJTixra-o9ibwkZZ_3P6Z2HzMTMBzNm0VHaZt7wxSeyFy1oz53getik1pdzcWxRKglsbmkDjhm1KjwfiVzJc_7X23ZUwADNNCHy8xrHN4VR7vPV4YEFBHP7pG1lt30M9LBJqqFtKXn4hyMqTe2WuXid1_9zb8sYbloGK3Gzdqzeoo989noEHfYSfZrgowCrD1FQQgjNlMKmmfkqTcrwxvCgvx9raQ--LQEvY4nMZiz1kqjdTsNd_RdMCq8m1Ckiua2f6g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-16 04:37:30,764:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-02-16 04:37:30,765:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 16 Feb 2024 03:37:30 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256281307 Replay-Nonce: 1pTQTQeXjd3iSovOtWj4mGMt5iTHmxYKAbauh1OWJwLXHrnyvUA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:26:39Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540442217" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256281307" } 2024-02-16 04:37:30,765:DEBUG:acme.client:Storing nonce: 1pTQTQeXjd3iSovOtWj4mGMt5iTHmxYKAbauh1OWJwLXHrnyvUA 2024-02-16 04:37:30,766:DEBUG:acme.client:JWS payload: b'' 2024-02-16 04:37:30,770:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540442217: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMXBUUVRRZVhqZDNpU292T3RXajRtR010NWlUSG14WUtBYmF1aDFPV0p3TFhIcm55dlVBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA0NDIyMTcifQ", "signature": "mUGkRcSlf_vnidksDrWBwNkvrnZeX7eCmfnvqVRBmUFF_rmeL1PFUXZr9m9t1Nk-lEpqtM7ESXAs29433xr9PpQqYMyg7Fi7fVcIQ3UvuDrnE2AmX8eFlaM4VNl15qQAOMaSBse62wVwmCM2Il7Hyaf44ZioWpimWw1P_pJUx1zj6MreBxeAM11epfrPaYx4TmTHkkt1qEYlwXGzAEPeHHNVg7wAqPSFpS8F763_P8it_gxf_SAU1E-uFj8o2YD1IvpPt_g84fxNN3f8grso21r-h6lFweRWq_2VtROqfeFJu-38Rqg5i6ORS1v2UEPHGeHx3vIavnMwtl4lkfHxhw", "payload": "" } 2024-02-16 04:37:30,936:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540442217 HTTP/1.1" 200 810 2024-02-16 04:37:30,936:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:37:30 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1pTQTQeXQfbsWrsWOTFaJFmW0Et3zsq4Uuvi5nVT8-gn80lOHUg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:26:39Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540442217/D1FeaA", "token": "ArP8a0cUi_G3Nbfrk3cNkTx86Kt5iLXDEYthGSw4EUs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540442217/-mx8SQ", "token": "ArP8a0cUi_G3Nbfrk3cNkTx86Kt5iLXDEYthGSw4EUs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540442217/azK9Sg", "token": "ArP8a0cUi_G3Nbfrk3cNkTx86Kt5iLXDEYthGSw4EUs" } ] } 2024-02-16 04:37:30,937:DEBUG:acme.client:Storing nonce: 1pTQTQeXQfbsWrsWOTFaJFmW0Et3zsq4Uuvi5nVT8-gn80lOHUg 2024-02-16 04:37:30,937:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-16 04:37:30,937:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-02-16 04:37:30,938:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-16 04:37:30,938:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-16 04:37:30,941:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-16 04:37:30,942:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-16 04:37:30,942:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-16 04:37:30,942:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-16 04:37:30,947:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-16 04:37:30,985:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-16 04:37:31,214:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-16 04:37:31,215:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-16 04:37:31,216:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-16 04:37:31,220:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:32 UTC. 2024-02-16 04:37:31,221:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-16 04:37:31,221:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-16 04:37:31,226:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-16 04:37:31,226:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-16 04:37:31,226:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-16 04:37:31,230:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-16 04:37:31,231:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-16 04:37:31,233:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-16 04:37:31,775:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-16 04:37:31,776:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:37:31 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "GTECzG6Cbgs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-16 04:37:31,776:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-16 04:37:35,691:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7637_key-certbot.pem 2024-02-16 04:37:39,402:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7635_csr-certbot.pem 2024-02-16 04:37:39,402:DEBUG:acme.client:Requesting fresh nonce 2024-02-16 04:37:39,402:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-16 04:37:39,584:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-16 04:37:39,584:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:37:39 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 91XKQUlTo3FGl4O04EieZjKqDFwRILAphJGnvaySA9oSvzi_Gfw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-16 04:37:39,584:DEBUG:acme.client:Storing nonce: 91XKQUlTo3FGl4O04EieZjKqDFwRILAphJGnvaySA9oSvzi_Gfw 2024-02-16 04:37:39,585:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-02-16 04:37:39,589:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOTFYS1FVbFRvM0ZHbDRPMDRFaWVaaktxREZ3UklMQXBoSkdudmF5U0E5b1N2emlfR2Z3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "SrS5UbrPtEPhVe1CtpGZzYOHSBfcjMGd2hLZfaWUwysYkHgEv5FU1T_Ki7jsUiLbBhWTrOUZg3i8Ji-K3JvyL-8HAxjoLXNgmj0RTiS0ZHb-4hGz4UoO_jF7hWxe0jwHfcHrAlL9M4lcgblRGMjnsQxajKMbPqQYQxFQ433jkjCg3y9zI9Q6tDusUgar66rbRT6gVAeO7XVFo5XClAh6fpSL9NQ53C3jBRXEm1Gc422MRCfNen-VSjMxix8vs4hy0oN0Qw3q96jl2coDE7UZJQGN2JFD9WgUjW0sQUSKBjilE0J4vhXZRoHmIjrkapC7L40TxJcyoW9Z6Rm3YgfgkA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-16 04:37:39,793:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-02-16 04:37:39,793:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 16 Feb 2024 03:37:39 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256306347 Replay-Nonce: uxcsyfQjfwcn905I88jos9cEjL2MsbRGvdXgqkg7NKNBsa3_Zus X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:26:49Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540477517" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256306347" } 2024-02-16 04:37:39,793:DEBUG:acme.client:Storing nonce: uxcsyfQjfwcn905I88jos9cEjL2MsbRGvdXgqkg7NKNBsa3_Zus 2024-02-16 04:37:39,794:DEBUG:acme.client:JWS payload: b'' 2024-02-16 04:37:39,799:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540477517: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXhjc3lmUWpmd2NuOTA1STg4am9zOWNFakwyTXNiUkd2ZFhncWtnN05LTkJzYTNfWnVzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA0Nzc1MTcifQ", "signature": "kSb1h7uaLh6aTjLsuvuN32aSN0yuwAyQY_wkIKsgMu_m-78EPHlDFEmZrzIG89NX3z6XBwTbCQknr5GK-YQNX-xpkqbx3riugqzG6dap3YShgLftOCYrOFicnUHquQAaACiYxe1K5zRS3avGjsizY-N_9-jayG5t-EwlQafEfd2fSdeors1GefY20vxMI20tCHwc6cgL_MNBCmORR4PKGqg12yfk9ioTpXJuQa2xFfW83Z0bs-BuZY_il3NaLQutvWy1GOECIC8aR6ZL4OmSdZq5HeUulW8MxViOwV7jXwa12OT8VgvH1E1ouVs6fXdERB-oWLTd6aui6etsCq6R7A", "payload": "" } 2024-02-16 04:37:39,984:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540477517 HTTP/1.1" 200 804 2024-02-16 04:37:39,984:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:37:39 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 91XKQUlTtJiBosbMu9dA0PZ4mRP-zQGv1aQlYphj94MmtC1V4ik X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:26:49Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540477517/zBe4Yw", "token": "8iGzASnL30f6Zg4WsWG91mNySkbT6obzDH-O1WlTCYU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540477517/jvutYw", "token": "8iGzASnL30f6Zg4WsWG91mNySkbT6obzDH-O1WlTCYU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540477517/9Dli9w", "token": "8iGzASnL30f6Zg4WsWG91mNySkbT6obzDH-O1WlTCYU" } ] } 2024-02-16 04:37:39,985:DEBUG:acme.client:Storing nonce: 91XKQUlTtJiBosbMu9dA0PZ4mRP-zQGv1aQlYphj94MmtC1V4ik 2024-02-16 04:37:39,985:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-16 04:37:39,985:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-02-16 04:37:39,986:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-16 04:37:39,986:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-16 04:37:39,987:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-16 04:37:39,987:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-16 04:37:39,987:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-16 04:37:39,987:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-16 04:37:39,988:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-16 04:37:40,040:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-16 04:37:40,253:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-16 04:37:40,256:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-16 04:37:40,257:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-16 04:37:40,262:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:49 UTC. 2024-02-16 04:37:40,262:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-16 04:37:40,262:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-16 04:37:40,267:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-16 04:37:40,267:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-16 04:37:40,268:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-16 04:37:40,271:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-16 04:37:40,272:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-16 04:37:40,274:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-16 04:37:40,731:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-16 04:37:40,731:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:37:40 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "pNu3HCzGwNk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-16 04:37:40,732:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-16 04:37:44,586:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7638_key-certbot.pem 2024-02-16 04:37:48,330:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7636_csr-certbot.pem 2024-02-16 04:37:48,330:DEBUG:acme.client:Requesting fresh nonce 2024-02-16 04:37:48,330:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-16 04:37:48,497:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-16 04:37:48,497:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:37:47 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2wyerpqJ4eWXjmYZ8goclrtYNOzFPMjyz44iKDlRxDpu_jsiJ4Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-16 04:37:48,497:DEBUG:acme.client:Storing nonce: 2wyerpqJ4eWXjmYZ8goclrtYNOzFPMjyz44iKDlRxDpu_jsiJ4Q 2024-02-16 04:37:48,498:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-02-16 04:37:48,503:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMnd5ZXJwcUo0ZVdYam1ZWjhnb2NscnRZTk96RlBNanl6NDRpS0RsUnhEcHVfanNpSjRRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "xggOivqERgwCMIvij07BGiavT26d34D76Zb4ykeHrXNL3ftFRqNgffNE3p7H6_vXczX7THnlQOno_vHwDDd1weD-SPMD5I0iEBsUO07rhRla4GMjpVFMEjbxG_z4-mj85nI2xlQbEjUR89LMDGf5qpin4Xix2WV5M4d8b88XxpeImhb6C26U1OETivutusLga_dtnu59hEj7KF1PPJEkJP36jpCi4wSCkgJZQfdPfVdnkl1e5lfLPVdr3BOg6n9F6mc42O3PZqi_3FeChVIFChSYWkyf-YdURErBgBN6X9fccyGtJ1srBM9gbwaTtpBe5M8NIvRNq2ffS2_lNGdhZw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-16 04:37:48,667:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-02-16 04:37:48,668:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 16 Feb 2024 03:37:48 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256330697 Replay-Nonce: 2wyerpqJS6oueLeFqTYGSFpFCfL6XDxfl7eMjJ7UY5WmjQbk3-E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:26:58Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540514237" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256330697" } 2024-02-16 04:37:48,668:DEBUG:acme.client:Storing nonce: 2wyerpqJS6oueLeFqTYGSFpFCfL6XDxfl7eMjJ7UY5WmjQbk3-E 2024-02-16 04:37:48,669:DEBUG:acme.client:JWS payload: b'' 2024-02-16 04:37:48,681:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540514237: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMnd5ZXJwcUpTNm91ZUxlRnFUWUdTRnBGQ2ZMNlhEeGZsN2VNako3VVk1V21qUWJrMy1FIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA1MTQyMzcifQ", "signature": "WPTTaQlsXnFoGwwiZXAx-f78_C0WuacEGmG0dezD59DrW_9OJmS7ojS9ehut7LHHV2HJxEjHJkgnsj-Zeol-DjLH5687wzV0ybxIQGRNunTbmj9U1BVJG1Zl_Mps3GTrYkV0J7eV0pLPx5dy1sslTbf3BwuCtRtLm6Xi-5Cq32y3p76sMIct7es-i0HbOSeXhophA8sR09JlC56lf9srIGhr2mXNQhix5_PWBSHKCyTH8aJvkdMjfXZnpHDgZYiVg8o8SA60e4GSEciP6wABJdOY_Dd-4d9ldHCa0MXHgF_EdfO_q7PN6O1IEu0TgtW6umAaN2sqdRTICuwd50smzw", "payload": "" } 2024-02-16 04:37:48,844:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540514237 HTTP/1.1" 200 807 2024-02-16 04:37:48,845:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:37:48 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2wyerpqJpRXxviCRx_hgY-kVhb_-e_ZWsTBBvZoAWDqC1Vd6CmU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:26:58Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540514237/y7Fh6A", "token": "mx-KJuR3SKsTvFopAHExnS3CQMuuST_PdD5t2ueC7DE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540514237/tfTCJQ", "token": "mx-KJuR3SKsTvFopAHExnS3CQMuuST_PdD5t2ueC7DE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540514237/pbKBOA", "token": "mx-KJuR3SKsTvFopAHExnS3CQMuuST_PdD5t2ueC7DE" } ] } 2024-02-16 04:37:48,845:DEBUG:acme.client:Storing nonce: 2wyerpqJpRXxviCRx_hgY-kVhb_-e_ZWsTBBvZoAWDqC1Vd6CmU 2024-02-16 04:37:48,846:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-16 04:37:48,846:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-02-16 04:37:48,846:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-16 04:37:48,847:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-16 04:37:48,847:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-16 04:37:48,847:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-16 04:37:48,848:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-16 04:37:48,848:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-16 04:37:48,849:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-16 04:37:48,899:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-16 04:37:49,199:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-16 04:37:49,200:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-16 04:37:49,201:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-16 04:37:49,205:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:03 UTC. 2024-02-16 04:37:49,205:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-16 04:37:49,205:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-16 04:37:49,209:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-16 04:37:49,210:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-16 04:37:49,210:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-16 04:37:49,214:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-16 04:37:49,215:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-16 04:37:49,216:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-16 04:37:49,776:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-16 04:37:49,776:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:37:49 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "3bYxv9G6l24": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-16 04:37:49,777:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-16 04:37:53,545:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7639_key-certbot.pem 2024-02-16 04:37:57,278:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7637_csr-certbot.pem 2024-02-16 04:37:57,279:DEBUG:acme.client:Requesting fresh nonce 2024-02-16 04:37:57,279:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-16 04:37:57,456:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-16 04:37:57,457:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:37:56 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: uxcsyfQj-MAGl2Wl4lR16ohZ57YA-r4vdBcVpxr_6mHzyO_N5Ac X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-16 04:37:57,457:DEBUG:acme.client:Storing nonce: uxcsyfQj-MAGl2Wl4lR16ohZ57YA-r4vdBcVpxr_6mHzyO_N5Ac 2024-02-16 04:37:57,457:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-02-16 04:37:57,464:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXhjc3lmUWotTUFHbDJXbDRsUjE2b2haNTdZQS1yNHZkQmNWcHhyXzZtSHp5T19ONUFjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "oqI9IYtvjO_f5WFOPqE8dsPJqwORPeP4Xk8u95yNSc7ISawI-Cj7z_7pG8vnYo2ctMWpfdmQnC8dqUa3V7NvTnnBbQHLncn_90mq7cIc7eM9tAWaTV54wXW6_WnTD7Nerw3Mc7uA0A0eFqvUbWXgGip12WdBMu6rLE1pQbNVzLawHomOKmbIogH1Ip1Uh4NKm_9KCTyeSTcr9XMcgEmcES-kcOZPbDcETl1bL_n42E66TmrjmtUNdmbsgThx2u3dT2r-Jgbay9Pm7BVyjPT0aVgkI1nhTzeCY0sS5ckZARi_yORLjbduw-wFFYM-yreFMI8x56qt-eDo5-2adufdjQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-16 04:37:57,651:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-02-16 04:37:57,651:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 16 Feb 2024 03:37:57 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256364097 Replay-Nonce: uxcsyfQjC-0JQyTEsWZHtRzt3UNgv7f6TU0J2hB7IIm9wM1BHfU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:07Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540559067" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256364097" } 2024-02-16 04:37:57,651:DEBUG:acme.client:Storing nonce: uxcsyfQjC-0JQyTEsWZHtRzt3UNgv7f6TU0J2hB7IIm9wM1BHfU 2024-02-16 04:37:57,652:DEBUG:acme.client:JWS payload: b'' 2024-02-16 04:37:57,657:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540559067: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXhjc3lmUWpDLTBKUXlURXNXWkh0Unp0M1VOZ3Y3ZjZUVTBKMmhCN0lJbTl3TTFCSGZVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA1NTkwNjcifQ", "signature": "sBK5UVGwqvwm-BVvkrk3iWxw-SUjAqH4XNYtq25ygWT4W9MYN8NUfNg0VFJwUWM_l0SUT2k0r1BvFjzoNVQPN2uLXY8t2Mv4nIbNSuUvjQc6Zdwv4EuB-bYj--RiMAgNWx4tmkbJo9U61jDgg3kqjnLO_U9Tib9xjM5TiLXjfAvGWJ4OHqT7eUdCKeMYkLl_7ceZ0M9mXlE3Ojy20b5RYqePdCOx1b83PxH6GKhz5DyzW62_wWqmSppAB0_aKrdcwPZfjs2eVFJgsXx_KIf_SXfahR017TIOjpOIGA7m_oNLC6K6AUT9l66FWF8CjMiOSCKWIzxysZw7V3oWcxCUWQ", "payload": "" } 2024-02-16 04:37:57,863:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540559067 HTTP/1.1" 200 801 2024-02-16 04:37:57,864:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:37:57 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 91XKQUlTqEYcpM7cj_lRBYfqJExWJtlY_mc_DvaE_QQdGBBQ_7Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:07Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540559067/MBQGZA", "token": "Kw5f1Ld0UlE2yvC6ntUu8B8EKWMoB_0Y2UyMCfhmWLw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540559067/Aot2bg", "token": "Kw5f1Ld0UlE2yvC6ntUu8B8EKWMoB_0Y2UyMCfhmWLw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540559067/YelLvw", "token": "Kw5f1Ld0UlE2yvC6ntUu8B8EKWMoB_0Y2UyMCfhmWLw" } ] } 2024-02-16 04:37:57,864:DEBUG:acme.client:Storing nonce: 91XKQUlTqEYcpM7cj_lRBYfqJExWJtlY_mc_DvaE_QQdGBBQ_7Y 2024-02-16 04:37:57,865:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-16 04:37:57,865:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-02-16 04:37:57,866:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-16 04:37:57,866:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-16 04:37:57,867:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-16 04:37:57,867:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-16 04:37:57,867:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-16 04:37:57,867:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-16 04:37:57,869:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-16 04:37:57,906:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-16 04:37:58,165:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-16 04:37:58,167:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-16 04:37:58,167:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-16 04:37:58,172:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:20 UTC. 2024-02-16 04:37:58,172:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-16 04:37:58,172:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-16 04:37:58,177:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-16 04:37:58,177:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-16 04:37:58,177:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-16 04:37:58,181:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-16 04:37:58,181:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-16 04:37:58,183:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-16 04:37:58,726:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-16 04:37:58,727:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:37:58 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "rvbNtizhj9A": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-02-16 04:37:58,727:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-16 04:38:02,831:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7640_key-certbot.pem 2024-02-16 04:38:06,625:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7638_csr-certbot.pem 2024-02-16 04:38:06,625:DEBUG:acme.client:Requesting fresh nonce 2024-02-16 04:38:06,625:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-16 04:38:06,807:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-16 04:38:06,807:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:38:06 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: uxcsyfQjyQhMwHHPnRKJvGQ6owJibu69X7Iy_9p4Un_wK77qdcw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-16 04:38:06,807:DEBUG:acme.client:Storing nonce: uxcsyfQjyQhMwHHPnRKJvGQ6owJibu69X7Iy_9p4Un_wK77qdcw 2024-02-16 04:38:06,808:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-02-16 04:38:06,813:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXhjc3lmUWp5UWhNd0hIUG5SS0p2R1E2b3dKaWJ1NjlYN0l5XzlwNFVuX3dLNzdxZGN3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "iq2wt1t7NJszxKi6VhJIflf4SGLekTpAtRm8ZxpXjr3gs-GMexXKNVZSMwaqTngSPauLJUiHGeoYApIaRfwvbAcJ6ALi7V-zQL7dspJkzR3uEzRSxoWfnd118OpVGXQbW0v6AYKZ9a5gE278U67PE5yW-F2fYbHj2n6pTTpboZu2QkGZc4uuS_hnhWLpkr8Mspy-axsaGQUclrba21zsTKbrRyhH0GGt0qrobT3OAwbz3_yaiTjtUBQV8v2IEUlrVPLVofu_c_j97Zz7En9MzRpfFtiI6l93EmiPjNJYudWTYzjIkaKGNtQ3ioYHz8vdzYmCJTjZC9iedELrtcmMBA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-16 04:38:07,077:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-16 04:38:07,078:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 16 Feb 2024 03:38:06 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256394317 Replay-Nonce: uxcsyfQj8N8EjdoqRnmm_6JogVqELcpoPDyOw61YAD1_AgZ4Lzk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:17Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540602497" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256394317" } 2024-02-16 04:38:07,078:DEBUG:acme.client:Storing nonce: uxcsyfQj8N8EjdoqRnmm_6JogVqELcpoPDyOw61YAD1_AgZ4Lzk 2024-02-16 04:38:07,078:DEBUG:acme.client:JWS payload: b'' 2024-02-16 04:38:07,084:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540602497: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXhjc3lmUWo4TjhFamRvcVJubW1fNkpvZ1ZxRUxjcG9QRHlPdzYxWUFEMV9BZ1o0THprIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA2MDI0OTcifQ", "signature": "bIsiX1ZLScnq-BdeiXNOjEj2hV89yHa_svackHHhZRNVcU3emLJJXQHKkIZ7_q5-tsL6hswJDkIUkyyASHeFbeijyp_bGZ_8LWAAZ9Pq1y184MCyG8PGGFOfMAoyVwCCGYo0YIjuycjgSnn7PsdRghY9rkLzx6ssaQBgt8dhdGd95bGPClESHG1SUgdi9VzZvUzZjrxm2lr3WjpiCyHjky9JHTBHjbuP7j7JxerCHSu2_9Ey-1iSyblcJ5cMAmnBTi6Jd2QKxNk5gguJpQ3qtqDccVzzFh-p5FZnnsGQET6BlI0uqphVwVuza4pnKSAv_zUUbtzTld-lNp-BxYzgzA", "payload": "" } 2024-02-16 04:38:07,271:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540602497 HTTP/1.1" 200 805 2024-02-16 04:38:07,272:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:38:06 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 91XKQUlT7nVwS3PPKMHPisVfxgsQFs5bJx28QKy5hVnrUAnFI5I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:17Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540602497/miLWNg", "token": "pNE-ffvpsYrp3EBdQk_eowX33MtP5Ibt0VZFfM0Eaxg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540602497/oFvs1Q", "token": "pNE-ffvpsYrp3EBdQk_eowX33MtP5Ibt0VZFfM0Eaxg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540602497/iyA7eA", "token": "pNE-ffvpsYrp3EBdQk_eowX33MtP5Ibt0VZFfM0Eaxg" } ] } 2024-02-16 04:38:07,272:DEBUG:acme.client:Storing nonce: 91XKQUlT7nVwS3PPKMHPisVfxgsQFs5bJx28QKy5hVnrUAnFI5I 2024-02-16 04:38:07,273:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-16 04:38:07,273:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-02-16 04:38:07,274:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-16 04:38:07,274:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-16 04:38:07,275:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-16 04:38:07,275:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-16 04:38:07,275:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-16 04:38:07,275:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-16 04:38:07,276:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-16 04:38:07,323:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-16 04:38:07,545:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-16 04:38:07,546:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-16 04:38:07,547:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-16 04:38:07,551:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:36 UTC. 2024-02-16 04:38:07,551:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-16 04:38:07,552:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-16 04:38:07,556:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-16 04:38:07,557:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-16 04:38:07,557:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-16 04:38:07,561:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-16 04:38:07,562:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-16 04:38:07,564:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-16 04:38:08,095:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-16 04:38:08,095:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:38:07 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "-SOOML3H8_w": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-16 04:38:08,096:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-16 04:38:11,928:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7641_key-certbot.pem 2024-02-16 04:38:15,666:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7639_csr-certbot.pem 2024-02-16 04:38:15,667:DEBUG:acme.client:Requesting fresh nonce 2024-02-16 04:38:15,667:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-16 04:38:15,844:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-16 04:38:15,845:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:38:15 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: uxcsyfQjSnZD05bYHQs_vtK_Bl6rX6KG26IYY9_CCyyJnh66ODc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-16 04:38:15,845:DEBUG:acme.client:Storing nonce: uxcsyfQjSnZD05bYHQs_vtK_Bl6rX6KG26IYY9_CCyyJnh66ODc 2024-02-16 04:38:15,845:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-02-16 04:38:15,851:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXhjc3lmUWpTblpEMDViWUhRc192dEtfQmw2clg2S0cyNklZWTlfQ0N5eUpuaDY2T0RjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "X5YGfpHZbb0lOA_CRKadNI0-e6g9DwZmmIBWKviBsBj4-G7XvqoV0xYPwxpLaRqJJ5qZI0oLLliiwgS61HNHQ1zL-tWnLMBy1H65C0F-2v-4VEe8_G2niHF5EBUOagfaOVdW_2MVWt40tYRFcv8Zwh_AW-ygIhv9FD_3h0Q0nzHq6BKGqr8AmtaTpyqZtV4vNaQET3qwGwADrzBMJ1KX5X30evQvqQzL60fnaYMSZkZEOo-QwzyST3cC9Z1SBt6S4TCo_hR1fEvg23xW6u1gpzk-ddpftnx1vbKO2SXZIBL6eOo_nhSm9rq1bd10Rg4Cq1TlbwpXO5GbWNXKjJHbrg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-16 04:38:16,037:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-02-16 04:38:16,038:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 16 Feb 2024 03:38:15 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256417567 Replay-Nonce: uxcsyfQj2iERrykCgN-Xyv7x53dxViPD1BXgVZ2IWkRjD2W4uFI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:26Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540637387" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256417567" } 2024-02-16 04:38:16,038:DEBUG:acme.client:Storing nonce: uxcsyfQj2iERrykCgN-Xyv7x53dxViPD1BXgVZ2IWkRjD2W4uFI 2024-02-16 04:38:16,038:DEBUG:acme.client:JWS payload: b'' 2024-02-16 04:38:16,044:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540637387: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXhjc3lmUWoyaUVScnlrQ2dOLVh5djd4NTNkeFZpUEQxQlhnVloySVdrUmpEMlc0dUZJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA2MzczODcifQ", "signature": "pufyG0Mhru6iAHFoME4YZd6QN_hCzF8BuvUD8hL542xB8hiLc0j9wjXu1dTC95FdSeHnqSyjZTtBuzzUF1xOVCrTQvX_Cu0mGSqr24YBy7ztOLuTWnGJ2q_jJY9WTujyBXtAsng3GvzJjdBfg5YUyh-osQM23GYC6Yh_EsnpDWtnNV1ETCgFy_gPKQGypWlt5fNdoxN4m1uzHzuDVlczp2BmII566zKZOb81YQ90hpwobEUuwWvtyYGRfxgw-KuUtMHwauG8FrFHUw_YChR4v9BMatnvb6DC20d94gRAkbns5r7e9G7UcgyK1ywHhva9MmIrgS-ZTh_azpN0EYPADQ", "payload": "" } 2024-02-16 04:38:16,231:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540637387 HTTP/1.1" 200 809 2024-02-16 04:38:16,232:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:38:15 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: uxcsyfQjKEwiYSVyyG6T2JqaBQQmKoIAfSEE3qluVgHVFf4R3Ng X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:26Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540637387/K5ceNg", "token": "rQDo_fbJZ77G_xMXzDNJ8BgUZelHjyXDE6-SuLThQZ0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540637387/h5pTLw", "token": "rQDo_fbJZ77G_xMXzDNJ8BgUZelHjyXDE6-SuLThQZ0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540637387/S75ZSA", "token": "rQDo_fbJZ77G_xMXzDNJ8BgUZelHjyXDE6-SuLThQZ0" } ] } 2024-02-16 04:38:16,232:DEBUG:acme.client:Storing nonce: uxcsyfQjKEwiYSVyyG6T2JqaBQQmKoIAfSEE3qluVgHVFf4R3Ng 2024-02-16 04:38:16,233:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-16 04:38:16,233:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-02-16 04:38:16,234:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-16 04:38:16,234:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-16 04:38:16,235:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-16 04:38:16,235:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-16 04:38:16,235:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-16 04:38:16,235:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-16 04:38:16,237:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-16 04:38:16,285:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-16 04:38:16,492:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-16 04:38:16,493:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-16 04:38:16,494:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-16 04:38:16,499:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:50 UTC. 2024-02-16 04:38:16,499:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-16 04:38:16,499:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-16 04:38:16,504:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-16 04:38:16,505:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-16 04:38:16,505:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-16 04:38:16,508:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-16 04:38:16,509:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-16 04:38:16,511:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-16 04:38:17,041:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-16 04:38:17,042:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:38:16 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "w0PDShto1Jo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-02-16 04:38:17,042:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-16 04:38:21,241:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7642_key-certbot.pem 2024-02-16 04:38:24,970:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7640_csr-certbot.pem 2024-02-16 04:38:24,971:DEBUG:acme.client:Requesting fresh nonce 2024-02-16 04:38:24,971:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-16 04:38:25,148:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-16 04:38:25,148:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:38:24 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 91XKQUlTfB787W9GzCEsdKQBCNtHl_4FBMzSQY0wP0D6UP9sh2g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-16 04:38:25,149:DEBUG:acme.client:Storing nonce: 91XKQUlTfB787W9GzCEsdKQBCNtHl_4FBMzSQY0wP0D6UP9sh2g 2024-02-16 04:38:25,149:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-02-16 04:38:25,154:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOTFYS1FVbFRmQjc4N1c5R3pDRXNkS1FCQ050SGxfNEZCTXpTUVkwd1AwRDZVUDlzaDJnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "aQxJBD1osmAL-z_PyNzdSwN81T9vTweKjmV87UiTfAWJehIBMUAhX6dh5e-Cx_eaF5bxQdPqxXz9W87deKDe4y8N7drTRpabVlLOKI0BE3fFwmlArIDXNr3-F8Twv2PCJtQ0uWiV9_wy1mz0iqusHdji17Z8AXn_e8x4TD9L9uz7PSpd3KfUoVrAkZ97S5POJxa4JWbOr_5189r-04wfQT2c_W0Yo6c9984qVYxN4-s86rlCVMCi98n5N_9cPyJs5p9Hz9X-JSCostKR2yoD7GdjJoRIcYoZYdfML8Qm2T_49MzBGVLzP7xKZB1R406Ps4G3Yp1xupGTiCoo0exNaQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-16 04:38:25,340:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-02-16 04:38:25,341:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 16 Feb 2024 03:38:24 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256441417 Replay-Nonce: 91XKQUlTCQQHM562WQKSqWhsNcai9MBBH-aLH29xhCOufBmHRtg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:36Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540672207" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256441417" } 2024-02-16 04:38:25,341:DEBUG:acme.client:Storing nonce: 91XKQUlTCQQHM562WQKSqWhsNcai9MBBH-aLH29xhCOufBmHRtg 2024-02-16 04:38:25,342:DEBUG:acme.client:JWS payload: b'' 2024-02-16 04:38:25,347:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540672207: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOTFYS1FVbFRDUVFITTU2MldRS1NxV2hzTmNhaTlNQkJILWFMSDI5eGhDT3VmQm1IUnRnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA2NzIyMDcifQ", "signature": "T5gjaH_laBlRsD25TT9ADTtq7mAT48hEfqJr1BpKX4uExU47ZewzprFZJqant6a2YBYWsb9-k-qSQsti_d7q_M7po1Zo_ZXR9zRNj6Vj6pKIG5o8SNZN8FI0XfOEfHGxHeeTIaFxk0fVj6qGOdmuC_EmWTmznA8GZeN-DuvYRNUafCU1JmDXZUzJjelcKU4TuNEsyG_e7YNfq0zpjt2C3BpwhlnORhZGdwj-k2MLlvT7wmVakrA4ACUk61kKUVBgxUuezC7c1AYfQkefv2-6V6I1A-B3rTFRHOvTziuoSRx9Xiy4cUS_rUH3M0hBGs7uryDRGbrE1BqksMvxiyI9Tg", "payload": "" } 2024-02-16 04:38:25,552:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540672207 HTTP/1.1" 200 806 2024-02-16 04:38:25,552:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:38:24 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: uxcsyfQjoWblZvQAp7IbV-kLOl23D2ApsM5Eu_pyDhweLpxMxm4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:36Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540672207/cHbPmQ", "token": "qjTrRwnMu8erDJdXc4snHnVEqSIvVb96brAl4wm-Ifo" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540672207/w9R_yw", "token": "qjTrRwnMu8erDJdXc4snHnVEqSIvVb96brAl4wm-Ifo" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540672207/Hm4ubg", "token": "qjTrRwnMu8erDJdXc4snHnVEqSIvVb96brAl4wm-Ifo" } ] } 2024-02-16 04:38:25,552:DEBUG:acme.client:Storing nonce: uxcsyfQjoWblZvQAp7IbV-kLOl23D2ApsM5Eu_pyDhweLpxMxm4 2024-02-16 04:38:25,553:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-16 04:38:25,553:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-02-16 04:38:25,554:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-16 04:38:25,554:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-16 04:38:25,555:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-16 04:38:25,555:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-16 04:38:25,555:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-16 04:38:25,556:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-16 04:38:25,557:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-16 04:38:25,602:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-02-16 04:38:25,602:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-16 04:38:25,603:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-02-16 04:38:25,610:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-02-16 04:38:25,612:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-02-16 04:38:25,612:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-02-16 04:38:25,612:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-02-16 04:38:25,613:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-02-16 04:38:25,615:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-02-16 04:38:25,653:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-16 04:38:25,900:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-16 04:38:25,901:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-16 04:38:25,902:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-16 04:38:25,906:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:07 UTC. 2024-02-16 04:38:25,906:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-16 04:38:25,907:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-16 04:38:25,915:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-16 04:38:25,916:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-16 04:38:25,916:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-16 04:38:25,920:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-16 04:38:25,921:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-16 04:38:25,923:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-16 04:38:26,450:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-16 04:38:26,451:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:38:25 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "aMIfse4rhks": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-16 04:38:26,451:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-16 04:38:30,635:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7643_key-certbot.pem 2024-02-16 04:38:34,383:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7641_csr-certbot.pem 2024-02-16 04:38:34,384:DEBUG:acme.client:Requesting fresh nonce 2024-02-16 04:38:34,384:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-16 04:38:34,561:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-16 04:38:34,561:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:38:34 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: uxcsyfQjn8GYm-Sm2TQUX_x4WhLF6gpun8qs0Zrtv0mcxNx-hSc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-16 04:38:34,562:DEBUG:acme.client:Storing nonce: uxcsyfQjn8GYm-Sm2TQUX_x4WhLF6gpun8qs0Zrtv0mcxNx-hSc 2024-02-16 04:38:34,563:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-02-16 04:38:34,567:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXhjc3lmUWpuOEdZbS1TbTJUUVVYX3g0V2hMRjZncHVuOHFzMFpydHYwbWN4TngtaFNjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "EaSl0TuZnofIjfAN_D_TWjz-N09-7YGQZXjkwXCJ-1wb_GIb9i-f6chOQ26Schlhji52JVek3j-NxpkMrOpGT5wNmAoIbTAuKj5R8B46QzgUQm91H6dk9rwKySclreQFumj4LMib_S_DqbMEYuNla2gm5YUC5BYhtIT3REyz8hTYpdRyHxCpPuSCsf3Tm5jsQw1tTVQjFasfgKdV-pA0qWtEK61kzMh3A6WobzZDytulQWJl8uo6R1VqzDAwi4LF7mrpCOD4M-K8oJPhYa6HOn32Cuht3iQvg8_LDMnie3tD0gKKNek3mMxamKlrFKNZ9o74CV_35aKGc1zvzDWaRA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-16 04:38:35,081:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-02-16 04:38:35,082:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 16 Feb 2024 03:38:34 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256462697 Replay-Nonce: uxcsyfQj21sQ-HacLdg5CUwxfVSroQ-fO2gnlkckvUGbSMYL-Ko X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:45Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540704157" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256462697" } 2024-02-16 04:38:35,082:DEBUG:acme.client:Storing nonce: uxcsyfQj21sQ-HacLdg5CUwxfVSroQ-fO2gnlkckvUGbSMYL-Ko 2024-02-16 04:38:35,083:DEBUG:acme.client:JWS payload: b'' 2024-02-16 04:38:35,088:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540704157: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXhjc3lmUWoyMXNRLUhhY0xkZzVDVXd4ZlZTcm9RLWZPMmdubGtja3ZVR2JTTVlMLUtvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA3MDQxNTcifQ", "signature": "QVYp4L3nkFZ6gcz9Ft2OTghnYWqDhG_YFEZ1HJ331fPzzDLc1eUw6AwHaMhYv7rJRBIT_POVzqrj3eCIv6m0thEo39JohKmydLBqT06VBVS7MZ5BzVNZrHYfK45Q42rCfqdcG-mZqMfa1GivonhOzfiFRcX_W2QGTLX_RMpsqZGZZisn3ioAVMCI8UsCYuiJ7Hyn1-m-wGCcrgdJj8PiLsAe9X0gsW8n-gW5UlyUIRf7YNC7hb1kLxoxCYxAmPTQhVvDNf2QKj1s-McmQCRd0KxTP85mFDWepwQZQ-oxy9_5ewW1SqPvY1vLquAt9EnkW96zgqejCzzddOjPe0OjjA", "payload": "" } 2024-02-16 04:38:35,292:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540704157 HTTP/1.1" 200 811 2024-02-16 04:38:35,293:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:38:34 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: uxcsyfQjecANRGCsGHqMLVj2KBxsyxJDW3caC2uN_SpK0DQDeFc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:45Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540704157/62ck5w", "token": "N5OAGNuMlPq5wVogNdMQl67gxh-DN3DOXmuMLJugFCo" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540704157/BJFdnw", "token": "N5OAGNuMlPq5wVogNdMQl67gxh-DN3DOXmuMLJugFCo" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540704157/eTpKlQ", "token": "N5OAGNuMlPq5wVogNdMQl67gxh-DN3DOXmuMLJugFCo" } ] } 2024-02-16 04:38:35,293:DEBUG:acme.client:Storing nonce: uxcsyfQjecANRGCsGHqMLVj2KBxsyxJDW3caC2uN_SpK0DQDeFc 2024-02-16 04:38:35,293:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-16 04:38:35,294:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-02-16 04:38:35,295:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-16 04:38:35,296:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-16 04:38:35,297:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-16 04:38:35,298:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-16 04:38:35,298:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-16 04:38:35,299:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-16 04:38:35,301:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-16 04:38:35,347:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-16 04:38:35,593:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-16 04:38:35,594:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-16 04:38:35,595:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-16 04:38:35,599:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:31 UTC. 2024-02-16 04:38:35,599:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-16 04:38:35,600:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-16 04:38:35,605:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-16 04:38:35,605:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-16 04:38:35,605:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-16 04:38:35,609:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-16 04:38:35,610:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-16 04:38:35,612:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-16 04:38:36,055:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-16 04:38:36,055:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:38:35 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "HovHAMrj43Q": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-16 04:38:36,056:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-16 04:38:40,110:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7644_key-certbot.pem 2024-02-16 04:38:43,846:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7642_csr-certbot.pem 2024-02-16 04:38:43,847:DEBUG:acme.client:Requesting fresh nonce 2024-02-16 04:38:43,847:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-16 04:38:43,995:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-16 04:38:43,996:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:38:43 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2wyerpqJbuHmHIQCEBZREduUIFmb-rOM8PPlNO-DZNdH7KJ1OUk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-16 04:38:43,996:DEBUG:acme.client:Storing nonce: 2wyerpqJbuHmHIQCEBZREduUIFmb-rOM8PPlNO-DZNdH7KJ1OUk 2024-02-16 04:38:43,996:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-02-16 04:38:44,002:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMnd5ZXJwcUpidUhtSElRQ0VCWlJFZHVVSUZtYi1yT004UFBsTk8tRFpOZEg3S0oxT1VrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "FfgbNKAqLrWu0RuP1blSWADZnlE0-_lfg5CZGUsldJXBEz3hbYmqyVyApsDon5VUxZxAdxdfaRw-srFzSZiTuHr05hnCKUzzySF_JJ863t6zuvFIgTrVOX3Sm0H4pyLIQDzyDaRdM7Ab3LGT7fxN8PXye04rt--gQ-nQPsw0TcMzr24bGMNEaxLnpHLn0lFcRy77DCEvzBGPnX2vcJ8y6rmE291xASHPB_3K-_JAKHVpl-L1pJmYxSiztaUASc1oGQVyHO0HXYhnFWGHFHOTdK7E5I7ljIAD9GTpTf9jxfXiZQ6smB6nZMETAp11MOGYJ1GVdU6GnkCYhFcviH6Jyg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-16 04:38:44,173:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-02-16 04:38:44,174:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 16 Feb 2024 03:38:43 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256484587 Replay-Nonce: 2wyerpqJ_vt9tKUfoMjxfR70USgXvIlqiK5PP5nP_NtIi4W0puQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:54Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540734247" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256484587" } 2024-02-16 04:38:44,174:DEBUG:acme.client:Storing nonce: 2wyerpqJ_vt9tKUfoMjxfR70USgXvIlqiK5PP5nP_NtIi4W0puQ 2024-02-16 04:38:44,174:DEBUG:acme.client:JWS payload: b'' 2024-02-16 04:38:44,180:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540734247: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMnd5ZXJwcUpfdnQ5dEtVZm9NanhmUjcwVVNnWHZJbHFpSzVQUDVuUF9OdElpNFcwcHVRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA3MzQyNDcifQ", "signature": "mii8DRdgn44wf35N_T63pqbOm4k88t_IcnduPljWwQQSTc1k7yXue2NLbotOvkc4fad8WcdzShDUzv9KTzlsGuTW-HYFHW-PFTTgiN3RbvDxPVYv1ceMnLe3yL4c4wmcld2sxxrb1l8Wwl3qkcCFusjDqLTQHFmMd8VHJBiGhY71PnfgnZBGQEzQzr9m_Ii02HT8-JV43JGh3GoE-4XFEko-DL0oCrcjiIgx3pM6akPeMByCgKjB9mHczaCe-6iJBsQYGraTR0jG8iRePz5Q8d6X0EwavGdaTVqG8UuZJ33FUZQg1p8PxsCTg8piJVEuKUaNXJx0INjodhWPUsJT7w", "payload": "" } 2024-02-16 04:38:44,353:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540734247 HTTP/1.1" 200 810 2024-02-16 04:38:44,354:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:38:43 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2wyerpqJ1rZ8m13LvCexVYcV7KneUXlYbsbgmnlM3dJQMeUtZvU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:54Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540734247/QhhIwA", "token": "fIJN8ZHL3VyhngYKMiarHrjh5Gae2nH2_mbQusoasGg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540734247/zrc52g", "token": "fIJN8ZHL3VyhngYKMiarHrjh5Gae2nH2_mbQusoasGg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540734247/3Cf07Q", "token": "fIJN8ZHL3VyhngYKMiarHrjh5Gae2nH2_mbQusoasGg" } ] } 2024-02-16 04:38:44,354:DEBUG:acme.client:Storing nonce: 2wyerpqJ1rZ8m13LvCexVYcV7KneUXlYbsbgmnlM3dJQMeUtZvU 2024-02-16 04:38:44,354:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-16 04:38:44,355:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-02-16 04:38:44,356:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-16 04:38:44,356:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-16 04:38:44,358:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-16 04:38:44,359:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-16 04:38:44,359:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-16 04:38:44,360:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-16 04:38:44,361:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-16 04:38:44,408:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-16 04:38:44,601:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-16 04:38:44,602:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-02-16 04:38:44,603:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-02-16 04:38:44,607:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:09 UTC. 2024-02-16 04:38:44,607:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-16 04:38:44,608:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-16 04:38:44,616:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-16 04:38:44,616:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-16 04:38:44,617:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-16 04:38:44,621:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-16 04:38:44,622:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-16 04:38:44,624:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-16 04:38:45,077:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-16 04:38:45,078:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:38:44 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "QbIHXXQsRkc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-16 04:38:45,078:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-16 04:38:49,215:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7645_key-certbot.pem 2024-02-16 04:38:52,943:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7643_csr-certbot.pem 2024-02-16 04:38:52,943:DEBUG:acme.client:Requesting fresh nonce 2024-02-16 04:38:52,943:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-16 04:38:53,093:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-16 04:38:53,093:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:38:52 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1pTQTQeXTVAm6u3NhWjp70WwwPshBioFzrSwrLL2GMHV9Hu58fY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-16 04:38:53,094:DEBUG:acme.client:Storing nonce: 1pTQTQeXTVAm6u3NhWjp70WwwPshBioFzrSwrLL2GMHV9Hu58fY 2024-02-16 04:38:53,094:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-02-16 04:38:53,102:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMXBUUVRRZVhUVkFtNnUzTmhXanA3MFd3d1BzaEJpb0Z6clN3ckxMMkdNSFY5SHU1OGZZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "PR89RQAQmUYO31ceQd_I_ReLcSAa5y0j0-nFqRUsafGQXLCKkQ3HMTjKU4DIwkb07HfN2yUDkAr5wu8QJQsyBsEP2immCKZy8tpQMcMx7cFLdEIzOrf1b4XQVJa4Q4iAgywI4u1yk93KaFExbNkAst7i6jz6C_EugGFM6GzIfN5dH2X4Qco2229yZpja0sY9CLFv7Rg2JLf_DmflWniDYooAGM_l6bYsw2DRWUnxlwTtXnzWZMDlPl0dJL_GsRi5Q8Zx5Gne5ZEPAa-TipIKcVV2Z2sbckxT5MzAS0t37dV3T9QwRvoJvbTuSBj_JR99ZjpLHMsm0CqtpIY_YbgHow", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-16 04:38:53,260:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-02-16 04:38:53,261:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 16 Feb 2024 03:38:52 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256513597 Replay-Nonce: 1pTQTQeXBntwk9Axw43ap692ZeVw7--KKhenwIMN7rhcAGu1s0A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:28:03Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540772027" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256513597" } 2024-02-16 04:38:53,261:DEBUG:acme.client:Storing nonce: 1pTQTQeXBntwk9Axw43ap692ZeVw7--KKhenwIMN7rhcAGu1s0A 2024-02-16 04:38:53,262:DEBUG:acme.client:JWS payload: b'' 2024-02-16 04:38:53,268:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540772027: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMXBUUVRRZVhCbnR3azlBeHc0M2FwNjkyWmVWdzctLUtLaGVud0lNTjdyaGNBR3UxczBBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA3NzIwMjcifQ", "signature": "iaqFVYPmb1AbuY3gKXQ36W_oWHxnuF7qA81cILnoHE9L_e9dm6w1YBgDM3AUfcI6pNqRLsvVN1w5hgOsL7Vpgjtyoq6DkjIdkFhXUHxVM_XwN_SIHjoPwtHAkTJhgDLKcJGR1e3bSv1HRhAJzUs5M3kAyRGSMKAbKgnEVG6tKP0G516QJ_szZ0bNPTd1xuJCktmmK1WPnur3xHqdGJxwihONB3qhyyt-1SafHIJ4-9aAz7XqiI1eVClFeYRae3cEr0fVBqUj5oakpNgbqxqnBBYWnSJJ_QBug0x3dr9we66W9gr2Mmt1ozN3E5nbKkI9ajoYPXUGYlchtA36s9tG7Q", "payload": "" } 2024-02-16 04:38:53,421:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540772027 HTTP/1.1" 200 809 2024-02-16 04:38:53,421:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:38:52 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2wyerpqJ-XLmoPIh5TLtQ4sLdmIYECMOEa9qk0QuMo-vrL1qVME X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:28:03Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540772027/6vejxw", "token": "dx8dAtRrvWZPG_3QR_npx78MSNAxtOyiO70IZr2x6Iw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540772027/m1WT-w", "token": "dx8dAtRrvWZPG_3QR_npx78MSNAxtOyiO70IZr2x6Iw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540772027/53Jzvw", "token": "dx8dAtRrvWZPG_3QR_npx78MSNAxtOyiO70IZr2x6Iw" } ] } 2024-02-16 04:38:53,421:DEBUG:acme.client:Storing nonce: 2wyerpqJ-XLmoPIh5TLtQ4sLdmIYECMOEa9qk0QuMo-vrL1qVME 2024-02-16 04:38:53,422:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-16 04:38:53,422:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-02-16 04:38:53,423:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-16 04:38:53,424:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-16 04:38:53,424:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-16 04:38:53,425:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-16 04:38:53,425:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-16 04:38:53,425:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-16 04:38:53,426:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-16 04:38:53,475:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-16 04:38:53,728:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-16 04:38:53,729:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is signed by the certificate's issuer. 2024-02-16 04:38:53,729:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD 2024-02-16 04:38:53,734:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:26 UTC. 2024-02-16 04:38:53,734:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-16 04:38:53,734:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-16 04:38:53,739:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-16 04:38:53,739:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-16 04:38:53,739:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-16 04:38:53,744:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-16 04:38:53,745:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-16 04:38:53,747:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-16 04:38:54,275:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-16 04:38:54,275:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:38:53 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "kfcU3bDmau4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-16 04:38:54,276:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-16 04:38:58,254:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7646_key-certbot.pem 2024-02-16 04:39:02,001:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7644_csr-certbot.pem 2024-02-16 04:39:02,001:DEBUG:acme.client:Requesting fresh nonce 2024-02-16 04:39:02,002:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-16 04:39:02,179:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-16 04:39:02,179:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:39:01 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 91XKQUlT3pZbmauwt8-yNP8HQuOfBOzZ1GlsETOUYhyHa3sedYI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-16 04:39:02,179:DEBUG:acme.client:Storing nonce: 91XKQUlT3pZbmauwt8-yNP8HQuOfBOzZ1GlsETOUYhyHa3sedYI 2024-02-16 04:39:02,180:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-02-16 04:39:02,185:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiOTFYS1FVbFQzcFpibWF1d3Q4LXlOUDhIUXVPZkJPeloxR2xzRVRPVVloeUhhM3NlZFlJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "udGL2TQM6OHShf1ZBKwbX5OZ20R8JZgMoLwm18TyzBBUwVYVZQURNqXqTbUiefNUAugsxp5gytaGMG3bq06zPOPmH36EjUBQTRakvlRF0ebOKmldjqgTZ5jnkNMqAch7jnt0K2H_nTcrytrOmg3xKMQjaGmE4fDmJ6nwljJWkHGRcUdAFezIdjlt0NScRy0QzYD9TKLZctRa0fFe5vLW84SKxtCeP2tfYTyDxqoExz-9iSfB7DXYPOm3B2eyr_IqpQRnF7A9DX9IFbPT9FWA9PORNcO2ulIlSqs1B3COo8leca6wtTrLzX9FMEQUGpMHVfJKb2kD61gdS6H4f_fBZQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-16 04:39:02,372:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-16 04:39:02,373:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 16 Feb 2024 03:39:01 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256544587 Replay-Nonce: uxcsyfQjGBJbWVVi8jXw4qnf_gfWV99guvWdmgFpQtrCG-81sfg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:28:13Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540813967" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256544587" } 2024-02-16 04:39:02,373:DEBUG:acme.client:Storing nonce: uxcsyfQjGBJbWVVi8jXw4qnf_gfWV99guvWdmgFpQtrCG-81sfg 2024-02-16 04:39:02,373:DEBUG:acme.client:JWS payload: b'' 2024-02-16 04:39:02,379:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540813967: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXhjc3lmUWpHQkpiV1ZWaThqWHc0cW5mX2dmV1Y5OWd1dldkbWdGcFF0ckNHLTgxc2ZnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA4MTM5NjcifQ", "signature": "pOTgJoBtJFDnOO3UillTKxQXPhKWqstt0IDZ9JqxaBNNSgA-Ri7aQaB2PNkWA6KfghtsDUnHDgHiG7YfnN0wROQCdI7pQXYUXEsMX0ZZQyLTuY7sFKlERiFzOxYH-oDmV0loy4kBCEuxtxldSNXOGA94lFhNiq371Bctzf6CwWKG5op_uKTZy6yQ0f_ZRYmumvTEsLfIDaPPbShTK7FeONocwo3Dk7xdDAWfB1L14Hvrs5BfQN_zAWSVLi3yDfrP-tn0RQ9oNFmsM7ssRK1sQG3qiSEQA1s2bSOektYc6CfU-lp9kR9e_3f02Q0Kk-wXTmj6GFZuyFwpgVRPUiAE_g", "payload": "" } 2024-02-16 04:39:02,559:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540813967 HTTP/1.1" 200 805 2024-02-16 04:39:02,560:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:39:02 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: uxcsyfQjjsXZIzC9TEMo145y0mrolnkRukAQRh0ov28RT7-job0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:28:13Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540813967/QS3xjQ", "token": "Giw2SKEZArhw1cAd0QrBh2IQ4Gldqfhc9_Txzga0eYM" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540813967/GcxOwg", "token": "Giw2SKEZArhw1cAd0QrBh2IQ4Gldqfhc9_Txzga0eYM" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540813967/pdWHtQ", "token": "Giw2SKEZArhw1cAd0QrBh2IQ4Gldqfhc9_Txzga0eYM" } ] } 2024-02-16 04:39:02,560:DEBUG:acme.client:Storing nonce: uxcsyfQjjsXZIzC9TEMo145y0mrolnkRukAQRh0ov28RT7-job0 2024-02-16 04:39:02,560:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-16 04:39:02,561:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-02-16 04:39:02,562:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-16 04:39:02,563:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-16 04:39:02,563:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-16 04:39:02,564:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-16 04:39:02,564:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-16 04:39:02,564:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-16 04:39:02,567:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-16 04:39:02,612:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-16 04:39:02,859:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-16 04:39:02,860:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-16 04:39:02,860:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-16 04:39:02,864:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:43 UTC. 2024-02-16 04:39:02,865:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-16 04:39:02,865:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-16 04:39:02,869:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-16 04:39:02,869:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-16 04:39:02,870:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-16 04:39:02,874:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-16 04:39:02,875:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-16 04:39:02,877:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-16 04:39:03,323:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-16 04:39:03,324:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:39:02 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "rx2ort6hn5U": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-02-16 04:39:03,324:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-16 04:39:07,264:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7647_key-certbot.pem 2024-02-16 04:39:10,992:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7645_csr-certbot.pem 2024-02-16 04:39:10,993:DEBUG:acme.client:Requesting fresh nonce 2024-02-16 04:39:10,993:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-16 04:39:11,147:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-16 04:39:11,148:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:39:10 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 1pTQTQeXRDzak_dM4R7OLIobGiLViXgfuvgHitYOrDr8BHQ3st4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-16 04:39:11,148:DEBUG:acme.client:Storing nonce: 1pTQTQeXRDzak_dM4R7OLIobGiLViXgfuvgHitYOrDr8BHQ3st4 2024-02-16 04:39:11,148:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-02-16 04:39:11,155:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMXBUUVRRZVhSRHpha19kTTRSN09MSW9iR2lMVmlYZ2Z1dmdIaXRZT3JEcjhCSFEzc3Q0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "trzoHKhi83IZKyhCucLme_HteXNmxksTCva5sQyCcaeVpjNLpdMWTQhuoSPqaAwzY6rkLdmTyNqtVs2K8nnZWdFSvb3u7VyP00VsbMCpC14ptceEIOXwbHsOLMEuayywe-BIsOV-PzpRJExM10PNQEIPSZ5Y5zc7Rx4EyRy5cCe1GDnMvVj5s_UNxQllxCLfCZD_7REa570hqJLOk_j7bJqEJ7cWyUbG4sGIl7o7tkD-VJVF-L9kEAHL3OgpeYqES5K1RK-UsYZze6FeWOT9ERmBy8qrtACC2_f8eLGsWxqKezOZZyVv4q-zFmUOMYJhJ-0cjcltvR8RwHBE8_cXyQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-16 04:39:11,328:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-16 04:39:11,329:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 16 Feb 2024 03:39:10 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256570667 Replay-Nonce: 2wyerpqJ_iayRPSuyBElEvW_s0Fi_jOd57mbJ5Yj7JcG36t4cnI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:28:22Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540850567" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256570667" } 2024-02-16 04:39:11,329:DEBUG:acme.client:Storing nonce: 2wyerpqJ_iayRPSuyBElEvW_s0Fi_jOd57mbJ5Yj7JcG36t4cnI 2024-02-16 04:39:11,329:DEBUG:acme.client:JWS payload: b'' 2024-02-16 04:39:11,337:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540850567: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMnd5ZXJwcUpfaWF5UlBTdXlCRWxFdldfczBGaV9qT2Q1N21iSjVZajdKY0czNnQ0Y25JIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA4NTA1NjcifQ", "signature": "wOrVD_m8b3-Gj6ZxS1aXhgusqDMdl3HEOTsbIjKJSwaKDpaSzN7J3s5dK9g_iBtPl_v6ckEKOPWUfWX4CGsPBoL8sgi40RJuxUj_S896fxqhj8rIaUhJBRdyxOo8Ico4lTdSIDxW-xLNZk9vsmflM-Wr7Z-ggOsRf2Nb_wFXKtzUt9IZUk_b-n3j90vlYdlzqYkutJNRSmrT04-oSYJh-lPzvzcyUAWnm2CzpFWZQzB0Q-8c3ntdE5_nVIADfM_mi61Ne4-GDNQNApWdGG7IeFw6wURcyRzCAIfw2zBfa0DFfY5w7Pf76h6CpAWTG8LBquiFOmCqJRwg4sXGluOLaw", "payload": "" } 2024-02-16 04:39:11,509:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540850567 HTTP/1.1" 200 805 2024-02-16 04:39:11,510:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:39:10 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2wyerpqJk_-DeA9eXJXmh9PwYDYSblrVZFJcRZce0gaHS5TA50I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:28:22Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540850567/9KsoFg", "token": "F_vhJNcuPiQNg87Bt2dXah4EyIxvrvDquKYXpvMqAbQ" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540850567/qRG9hA", "token": "F_vhJNcuPiQNg87Bt2dXah4EyIxvrvDquKYXpvMqAbQ" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540850567/TwBIlQ", "token": "F_vhJNcuPiQNg87Bt2dXah4EyIxvrvDquKYXpvMqAbQ" } ] } 2024-02-16 04:39:11,510:DEBUG:acme.client:Storing nonce: 2wyerpqJk_-DeA9eXJXmh9PwYDYSblrVZFJcRZce0gaHS5TA50I 2024-02-16 04:39:11,510:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-16 04:39:11,511:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-02-16 04:39:11,511:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-16 04:39:11,511:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-16 04:39:11,512:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-16 04:39:11,512:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-16 04:39:11,512:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-16 04:39:11,513:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-16 04:39:11,514:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-16 04:39:11,549:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-16 04:39:11,788:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-16 04:39:11,791:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-16 04:39:11,792:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-16 04:39:11,798:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:40:02 UTC. 2024-02-16 04:39:11,798:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-16 04:39:11,799:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-16 04:39:11,803:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-16 04:39:11,803:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-16 04:39:11,804:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-16 04:39:11,808:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-16 04:39:11,809:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-16 04:39:11,811:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-16 04:39:12,353:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-16 04:39:12,354:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:39:11 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "4QT_E_NQ9qY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-16 04:39:12,354:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-16 04:39:16,554:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7648_key-certbot.pem 2024-02-16 04:39:20,316:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7646_csr-certbot.pem 2024-02-16 04:39:20,317:DEBUG:acme.client:Requesting fresh nonce 2024-02-16 04:39:20,317:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-16 04:39:20,499:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-16 04:39:20,500:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:39:19 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: uxcsyfQjVmPYQ_ay_wISQKg10FalZcSPPwECbBU7b3BG0IzocCs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-16 04:39:20,500:DEBUG:acme.client:Storing nonce: uxcsyfQjVmPYQ_ay_wISQKg10FalZcSPPwECbBU7b3BG0IzocCs 2024-02-16 04:39:20,500:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-02-16 04:39:20,506:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXhjc3lmUWpWbVBZUV9heV93SVNRS2cxMEZhbFpjU1BQd0VDYkJVN2IzQkcwSXpvY0NzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ZGhqdMcj-RbbZV7vxytaBhEf7GZKK7eASSbr8s_kmx2bLwY1_j2d0IGq2y9d8gOCkxJQ7SF7I_3hInvG8KMT6NuqM5j-Ycphk-nhiJytVQ2f4FQ8Oi3nJSmJ_ej2Zee5LtBH50588u9TOSJ2Po6DKSiOB5upITox5REfw_YQt_dfJJjC_34-dpRMbjY-3t0kHbcchzxLJ2C4O_2Tok3aBV__-TEs_A1IP228eXSCV6dCbthrUNgyzHq7zqHxWEol7GoIZ2dt8IxytJmhpoaTk9DfyGNcVamWu0Xti644jn3Bn536QTjba6cUDyBBp7B4yts_WeoaeD7LeyGzCSY1NA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-16 04:39:20,698:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-16 04:39:20,698:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 16 Feb 2024 03:39:20 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256595137 Replay-Nonce: uxcsyfQjIxU9LEzSVejvKLE8nx3Zs7xKOZE66PJlo5FmgixxzSY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:28:31Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540885967" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256595137" } 2024-02-16 04:39:20,699:DEBUG:acme.client:Storing nonce: uxcsyfQjIxU9LEzSVejvKLE8nx3Zs7xKOZE66PJlo5FmgixxzSY 2024-02-16 04:39:20,699:DEBUG:acme.client:JWS payload: b'' 2024-02-16 04:39:20,704:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540885967: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidXhjc3lmUWpJeFU5TEV6U1ZlanZLTEU4bngzWnM3eEtPWkU2NlBKbG81Rm1naXh4elNZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA4ODU5NjcifQ", "signature": "DV9a4ZTGhrHArPuKnJBXOILcM_zrtAlM8LLa8MSuJ3ymudx8ALSwm64pg3x_KHsOnVUEBlwCdD8HpwR7IvULCJRQhMHRg1pkZmj8OvmGFKVewCwUvqiHD5kvLYA24gjXPgrZ3zQCO28H-SIvTABuRb83iIpSEsCDLNsAkSwoSY7jWhu4jdq67u_FbokYSZt9QU4FzYyIeQGHn6Nz9LT1YcV5_BFT9SlcqcOJeG3cYuUQZut--cib-h0hSy1ClZP-mHZ8w9ZqeH9xgKPG_gcE5o6kuwFwV7P4GG2FTWU4QJDILmnaoSwm7Ai50Z7_n-QF_D957yhUiCfa91dtKyduiQ", "payload": "" } 2024-02-16 04:39:20,892:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540885967 HTTP/1.1" 200 805 2024-02-16 04:39:20,893:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 16 Feb 2024 03:39:20 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: uxcsyfQjB363nhn8UM5cSKsNu72fVE4rAXJ-YUmkYIxwrq5ySIs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:28:31Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540885967/OUXDhQ", "token": "M6pE59XecoDIFeZmQ2fOLVruWYIn_qwzTAv5ez_ACcw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540885967/gxpKtA", "token": "M6pE59XecoDIFeZmQ2fOLVruWYIn_qwzTAv5ez_ACcw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540885967/ovBk4w", "token": "M6pE59XecoDIFeZmQ2fOLVruWYIn_qwzTAv5ez_ACcw" } ] } 2024-02-16 04:39:20,894:DEBUG:acme.client:Storing nonce: uxcsyfQjB363nhn8UM5cSKsNu72fVE4rAXJ-YUmkYIxwrq5ySIs 2024-02-16 04:39:20,895:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-16 04:39:20,895:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-02-16 04:39:20,896:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-16 04:39:20,896:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-16 04:39:20,897:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-16 04:39:20,897:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-16 04:39:20,897:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-16 04:39:20,897:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-16 04:39:20,898:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-16 04:39:20,899:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-02-16 04:39:20,899:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-02-16 04:39:20,910:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-02-16 04:39:20,911:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)