2024-02-15 03:11:03,015:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-02-15 03:11:03,015:DEBUG:certbot._internal.main:Arguments: [] 2024-02-15 03:11:03,015:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-02-15 03:11:03,853:DEBUG:certbot._internal.log:Root logging level set at 20 2024-02-15 03:11:03,854:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-02-15 03:11:03,893:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-02-15 03:11:03,932:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-15 03:11:04,105:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-15 03:11:04,107:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is signed by the certificate's issuer. 2024-02-15 03:11:04,111:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is: OCSPCertStatus.GOOD 2024-02-15 03:11:04,119:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:15 UTC. 2024-02-15 03:11:04,119:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-15 03:11:04,119:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-15 03:11:04,124:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-15 03:11:04,124:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-15 03:11:04,124:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-15 03:11:04,130:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-15 03:11:04,131:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-15 03:11:04,134:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-15 03:11:04,608:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-15 03:11:04,608:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:11:03 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "LhF4Esc8bI4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-15 03:11:04,609:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-15 03:11:09,514:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7610_key-certbot.pem 2024-02-15 03:11:14,161:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7608_csr-certbot.pem 2024-02-15 03:11:14,161:DEBUG:acme.client:Requesting fresh nonce 2024-02-15 03:11:14,161:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-15 03:11:14,327:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-15 03:11:14,328:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:11:13 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ulU_LlIuuCPMfq0-vKhxKsPGKUnNbgJIaLznPlX135DB4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-15 03:11:14,328:DEBUG:acme.client:Storing nonce: HWHXB1ulU_LlIuuCPMfq0-vKhxKsPGKUnNbgJIaLznPlX135DB4 2024-02-15 03:11:14,328:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-02-15 03:11:14,335:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWxVX0xsSXV1Q1BNZnEwLXZLaHhLc1BHS1VuTmJnSklhTHpuUGxYMTM1REI0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "btN4badk0jzLQ-QKbp87Amwb5GC8NoUXYImcyqRpN-QWtPW0LkCeYFDVCFlPxiV9-ah677pcGLJSGMcbPL92jdwbt58DrDUJA0qURlBqAxyQ2IYADzSYr59lXqNta7J0Wb5Ba-_EkeUd5oAbKEHI1JjOxrmvqXXnAOjbIYsEbtrUfsFQSKQ6S_546t_Ypg_YE6wd4fCl4DlArENdGyLjga0Tlx7r06pXAA5KKB4acCb-e9Oc93TRysgT_0pW8Hweewleb8_5ly_1nBlp0nd0ke9nU6Q5gfwG-0bLY7wYm5Jy_ESuOFfoKjKf40mObFvPRlHOaYqNs_nJRRy1fA8GjA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-15 03:11:14,497:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-02-15 03:11:14,497:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 15 Feb 2024 02:11:13 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256281307 Replay-Nonce: 6HUcA-o5a4At6CwKkE963yB7FBcf3VrLPa5_v-_Iw4XpOKYLA04 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:26:39Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540442217" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256281307" } 2024-02-15 03:11:14,497:DEBUG:acme.client:Storing nonce: 6HUcA-o5a4At6CwKkE963yB7FBcf3VrLPa5_v-_Iw4XpOKYLA04 2024-02-15 03:11:14,498:DEBUG:acme.client:JWS payload: b'' 2024-02-15 03:11:14,504:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540442217: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVhNEF0NkN3S2tFOTYzeUI3RkJjZjNWckxQYTVfdi1fSXc0WHBPS1lMQTA0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA0NDIyMTcifQ", "signature": "OdWidtORClGLHmkKkGRwY9rRJ_Ooptpc0-MnYAYiPrdwnqyx3pirzVBH5_ckAEJrk4fJL64UOcK9fIWRPzovsRalwXzgnBv4oVhFfpkRSerP7JUfJpIOJLjiNUN5NkpHT3PYHGZhlFNbmabOyH1s2SLph4RA_cIxP0glWzU14GiMOYcftthZ5qQhlQCYbIY41zQomLO_nghLKj4BUcW-k-lueWqsb8BWy7G-o5ByUgQPV4rYahY_sEzv9g9CiVWaks76YbFWs2dxzHb_2U4ltz9DC7UO7-TAKlMnWiGsMYqxGM9JAwkOyEVzoL8_qmEPoTaPwS-HGmU2kcx8HGpW-A", "payload": "" } 2024-02-15 03:11:14,664:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540442217 HTTP/1.1" 200 810 2024-02-15 03:11:14,664:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:11:13 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ulWKTTOQVTRgQOtaH14U8xWDdNVCbg9fYZMUwIe9gcbJs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:26:39Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540442217/D1FeaA", "token": "ArP8a0cUi_G3Nbfrk3cNkTx86Kt5iLXDEYthGSw4EUs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540442217/-mx8SQ", "token": "ArP8a0cUi_G3Nbfrk3cNkTx86Kt5iLXDEYthGSw4EUs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540442217/azK9Sg", "token": "ArP8a0cUi_G3Nbfrk3cNkTx86Kt5iLXDEYthGSw4EUs" } ] } 2024-02-15 03:11:14,665:DEBUG:acme.client:Storing nonce: HWHXB1ulWKTTOQVTRgQOtaH14U8xWDdNVCbg9fYZMUwIe9gcbJs 2024-02-15 03:11:14,665:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-15 03:11:14,665:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-02-15 03:11:14,666:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-15 03:11:14,666:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-15 03:11:14,679:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-15 03:11:14,679:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-15 03:11:14,680:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-15 03:11:14,680:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-15 03:11:14,685:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-15 03:11:14,724:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-15 03:11:14,962:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-15 03:11:14,963:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-15 03:11:14,964:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-15 03:11:14,969:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:32 UTC. 2024-02-15 03:11:14,969:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-15 03:11:14,969:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-15 03:11:14,973:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-15 03:11:14,977:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-15 03:11:14,977:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-15 03:11:14,993:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-15 03:11:14,994:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-15 03:11:14,996:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-15 03:11:15,446:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-15 03:11:15,446:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:11:14 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "D7R_bBFzf7U": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-15 03:11:15,447:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-15 03:11:19,804:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7611_key-certbot.pem 2024-02-15 03:11:23,900:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7609_csr-certbot.pem 2024-02-15 03:11:23,900:DEBUG:acme.client:Requesting fresh nonce 2024-02-15 03:11:23,901:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-15 03:11:24,056:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-15 03:11:24,056:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:11:22 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ulY5YQRQitm6A7HX-IzhFBYyCiUwQM4xg1Ebi8me8y6LM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-15 03:11:24,056:DEBUG:acme.client:Storing nonce: HWHXB1ulY5YQRQitm6A7HX-IzhFBYyCiUwQM4xg1Ebi8me8y6LM 2024-02-15 03:11:24,057:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-02-15 03:11:24,062:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWxZNVlRUlFpdG02QTdIWC1JemhGQll5Q2lVd1FNNHhnMUViaThtZTh5NkxNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "yk5B3ptUmTukzg1pFn9ruDh-_2TpWM5gbI0qWOtacL3A0ZRO1cy-1R9myaHKrM0E1kHSPcpfyyvMajgpR694KH8OUQMIOAnOQGkz5Kl9Gc5nKSq_S02Zn0lLwP-eUvK2SBGhe2BZkFhGiaQO3sOyDSrMGU5Br8oVdqszGUz-_94IbCM-We5EIl7MUMtPe-qc3KcR7ADDxiN0v4GNBmutTs5kg5pNxiZJZque3o17KlawZvzEQymv7fVUtJeYJx8-yW-59BXdhs04GmAUATPemQhk0lfYHv5rFZDylVYmMU0C19T265YcSI0OmlgEOfJAylDXjiMdqXBTTZHxjsDF1A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-15 03:11:24,236:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-02-15 03:11:24,236:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 15 Feb 2024 02:11:22 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256306347 Replay-Nonce: 6HUcA-o5dSLb7jq8uWIaD1k25BeRB2D1zUwSZQhJXU48B7dQ-UM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:26:49Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540477517" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256306347" } 2024-02-15 03:11:24,237:DEBUG:acme.client:Storing nonce: 6HUcA-o5dSLb7jq8uWIaD1k25BeRB2D1zUwSZQhJXU48B7dQ-UM 2024-02-15 03:11:24,237:DEBUG:acme.client:JWS payload: b'' 2024-02-15 03:11:24,242:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540477517: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVkU0xiN2pxOHVXSWFEMWsyNUJlUkIyRDF6VXdTWlFoSlhVNDhCN2RRLVVNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA0Nzc1MTcifQ", "signature": "Av-YzWrgAiqy7WZJou93Ur4K_EQPF-dPxpPm6l5jeEuYHOfirg_Kf1oJ_qMIbz8jOLKTrkUR6Ga4wKPTRG3lgqO8OiYm1QPE6NV520ht3L1E2ITVsE9WJxHgtt3siCWwXQfV48PSI5cNBx-g6zGLYIst_gfXUph_8cjQ1PXZW5W_ONBlYAccfYkz317SMkoPgcoQDyRqMaXJNnUc02HDIPaIK2Yf5TOaPHBlQryim7uSZYOAPfAh7nQf3xw6vY34w7Al9AiJf2-MrXHDA86GGdTWQp5tLFUVfz2Z5AHwmOMfvPyAQsJj5n6P2-crkgANWNmfQxNLtTNz1U2BHYxg9g", "payload": "" } 2024-02-15 03:11:24,405:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540477517 HTTP/1.1" 200 804 2024-02-15 03:11:24,406:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:11:23 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ulpI2YZm-2rgpVva1PYGBvKYEgWnOG7IbMqjDMJekWe2o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:26:49Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540477517/zBe4Yw", "token": "8iGzASnL30f6Zg4WsWG91mNySkbT6obzDH-O1WlTCYU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540477517/jvutYw", "token": "8iGzASnL30f6Zg4WsWG91mNySkbT6obzDH-O1WlTCYU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540477517/9Dli9w", "token": "8iGzASnL30f6Zg4WsWG91mNySkbT6obzDH-O1WlTCYU" } ] } 2024-02-15 03:11:24,406:DEBUG:acme.client:Storing nonce: HWHXB1ulpI2YZm-2rgpVva1PYGBvKYEgWnOG7IbMqjDMJekWe2o 2024-02-15 03:11:24,407:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-15 03:11:24,407:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-02-15 03:11:24,407:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-15 03:11:24,408:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-15 03:11:24,408:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-15 03:11:24,408:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-15 03:11:24,409:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-15 03:11:24,409:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-15 03:11:24,410:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-15 03:11:24,461:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-15 03:11:24,709:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-15 03:11:24,710:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-15 03:11:24,711:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-15 03:11:24,716:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:49 UTC. 2024-02-15 03:11:24,716:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-15 03:11:24,716:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-15 03:11:24,722:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-15 03:11:24,722:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-15 03:11:24,722:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-15 03:11:24,738:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-15 03:11:24,739:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-15 03:11:24,740:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-15 03:11:25,338:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-15 03:11:25,338:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:11:24 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "ZLTlBON3dqE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-15 03:11:25,339:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-15 03:11:29,529:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7612_key-certbot.pem 2024-02-15 03:11:33,605:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7610_csr-certbot.pem 2024-02-15 03:11:33,605:DEBUG:acme.client:Requesting fresh nonce 2024-02-15 03:11:33,605:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-15 03:11:33,787:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-15 03:11:33,788:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:11:32 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 63lPIS7zqJPfXh9dekpwiMbFnO4vkScpDjOyps20eL0YozC2knQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-15 03:11:33,788:DEBUG:acme.client:Storing nonce: 63lPIS7zqJPfXh9dekpwiMbFnO4vkScpDjOyps20eL0YozC2knQ 2024-02-15 03:11:33,789:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-02-15 03:11:33,797:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3pxSlBmWGg5ZGVrcHdpTWJGbk80dmtTY3BEak95cHMyMGVMMFlvekMya25RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "dVxTqGjB6-htEOEJQ9pxCbbHKCaEDOsW2jU59-rhQtnQKdVPnVVOHEUFJRC3r3Wm3S4IVq8TouwVda-6QvYl-IwHzLWFL_kqVLtOCRm_bEqS5WPyvONgn7No3yNu2UgoOXQAPPBLPieGFB7svhU-No2OsZoEUmQLINXa6g_Kg3S0bgnZqE5AKoMfOa7k7Tfosti1IyesEMFWce5S7XlbBWC9Ecpbgc9t1vXt7RHzNIbzQAy-eqFsW7a8aEW5gpPZgijyrhlgThD8pO-a49Cn9jABTlyI4r8QURiJrjkpM6VnMehYnu3h78zJi46BZ3PJVWLvRAl9bvjQvOxMGcH1WQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-15 03:11:33,991:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-02-15 03:11:33,991:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 15 Feb 2024 02:11:32 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256330697 Replay-Nonce: HpY91-GpGlCeqZQrChwTqgrQ46kLFUcBDX4FUKO8VxmF_RArv_Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:26:58Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540514237" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256330697" } 2024-02-15 03:11:33,992:DEBUG:acme.client:Storing nonce: HpY91-GpGlCeqZQrChwTqgrQ46kLFUcBDX4FUKO8VxmF_RArv_Y 2024-02-15 03:11:33,992:DEBUG:acme.client:JWS payload: b'' 2024-02-15 03:11:33,999:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540514237: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BHbENlcVpRckNod1RxZ3JRNDZrTEZVY0JEWDRGVUtPOFZ4bUZfUkFydl9ZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA1MTQyMzcifQ", "signature": "dNI1EqD1OzwoSzfH-414yQFeGrdO24Cb1aZHC71P6XGrTXLgGtvxvkmucf8WH9oy8xOFeDiAGxBCYx-8s-n2M42mZYjoVyG8ucfb3IVOeQulP5l0tqaJlbJq5BIiKxQgzV1evX6WGl-AqNjIvGFdkXkr3xPYFnQKJx9PqLJr5ppRtxeJYpjfLPVbrnuDdRjhuRQsQjUyMfElhxhBpvRZYFkJvk3DBhoOMZUX3Jk_Y9v77FAarffAzQ1U0ceg5JuK85WhIVQUvGnfZPemvTDZXZZUv7oMzZNYsjYod1Ev8TVlevMrSV5-l-HpQ8_qoSHMJFhwvCLICGyKhjDCTg2N8A", "payload": "" } 2024-02-15 03:11:34,197:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540514237 HTTP/1.1" 200 807 2024-02-15 03:11:34,198:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:11:32 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 63lPIS7zw0mUddsj7DiW3Uhq5-XSLW9bkIz-rO1I4cN11pjc35o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:26:58Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540514237/y7Fh6A", "token": "mx-KJuR3SKsTvFopAHExnS3CQMuuST_PdD5t2ueC7DE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540514237/tfTCJQ", "token": "mx-KJuR3SKsTvFopAHExnS3CQMuuST_PdD5t2ueC7DE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540514237/pbKBOA", "token": "mx-KJuR3SKsTvFopAHExnS3CQMuuST_PdD5t2ueC7DE" } ] } 2024-02-15 03:11:34,198:DEBUG:acme.client:Storing nonce: 63lPIS7zw0mUddsj7DiW3Uhq5-XSLW9bkIz-rO1I4cN11pjc35o 2024-02-15 03:11:34,199:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-15 03:11:34,199:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-02-15 03:11:34,199:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-15 03:11:34,200:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-15 03:11:34,200:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-15 03:11:34,201:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-15 03:11:34,201:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-15 03:11:34,201:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-15 03:11:34,202:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-15 03:11:34,253:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-15 03:11:34,650:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-15 03:11:34,651:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-15 03:11:34,652:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-15 03:11:34,657:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:03 UTC. 2024-02-15 03:11:34,657:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-15 03:11:34,657:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-15 03:11:34,663:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-15 03:11:34,663:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-15 03:11:34,663:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-15 03:11:34,668:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-15 03:11:34,670:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-15 03:11:34,672:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-15 03:11:35,201:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-15 03:11:35,202:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:11:33 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "M4weggvkb7w": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-15 03:11:35,203:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-15 03:11:39,588:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7613_key-certbot.pem 2024-02-15 03:11:43,725:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7611_csr-certbot.pem 2024-02-15 03:11:43,726:DEBUG:acme.client:Requesting fresh nonce 2024-02-15 03:11:43,726:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-15 03:11:43,903:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-15 03:11:43,903:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:11:42 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 63lPIS7z8hheDtJYBLp7buqVkTGo8GOtNhwgiwG35aDVVYNfnEM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-15 03:11:43,904:DEBUG:acme.client:Storing nonce: 63lPIS7z8hheDtJYBLp7buqVkTGo8GOtNhwgiwG35aDVVYNfnEM 2024-02-15 03:11:43,904:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-02-15 03:11:43,909:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3o4aGhlRHRKWUJMcDdidXFWa1RHbzhHT3ROaHdnaXdHMzVhRFZWWU5mbkVNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "K9vtx3jKlyTYG7FbfCUDugfVtkvs9fUT_TrSeNr0v8t-J4pR81UUVMNzIIZUHyYGESBAGs2vdwI4MuDZzRkOzEbiZB1qu2qKTZgcMBvXtaAdbHagPmfioJSKGZleAtkin7rT9ijcvDOueCbwF1Vya4hxqeeXsLCrEXytvBkTKDkYOF4ISf-7iD0h6yO0Ij4g8i8XUwqP3k1n2Gu98M1IydJr3WsR2_-WihQQxSGOliAb86XcoV2nuuVNmDL0xpALKQmLxi2PbA3IKXT1SU11otRNgUxgDv2lpRhuy7u3-IAKoNfRW3tLVrfna9RZQy3NOSZ95uZrZRjGNNEYR5K9Eg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-15 03:11:44,096:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-02-15 03:11:44,098:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 15 Feb 2024 02:11:42 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256364097 Replay-Nonce: 63lPIS7zYsi-MYbyLmpeR2WLpo07I09wwzO_Rz7uK3iFPnNOeJI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:07Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540559067" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256364097" } 2024-02-15 03:11:44,098:DEBUG:acme.client:Storing nonce: 63lPIS7zYsi-MYbyLmpeR2WLpo07I09wwzO_Rz7uK3iFPnNOeJI 2024-02-15 03:11:44,099:DEBUG:acme.client:JWS payload: b'' 2024-02-15 03:11:44,110:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540559067: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3pZc2ktTVlieUxtcGVSMldMcG8wN0kwOXd3ek9fUno3dUszaUZQbk5PZUpJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA1NTkwNjcifQ", "signature": "GaZLPzeRrzM-McuUdgYcQh3fxUfTaXRdZ-QC8tFBVmL9Q5dAFw3IPs-ly258jfHpqcaoEbwxRIcWobpQ_DQtl8O5uHhNmULGzGKH1i_Pfy5BTh-D4uCi7JtGaZfXetmHhLa-o58ZcrDK6a-K4JquRMA5t-7948zzwpdEdAUKEZilkTTVbo2IWz1HCHbtn-o36bgY9GgtrwQ3-S8xXepCKaiRXwKEoAZEhJiOixFfq1V_bBC7cjO0t2KUi1T1yyJmVjqdXDtA6NClvp7s1paeFt5PXOfri4RlNi7HBzE7XtdVDD82XIONCDV8OsFyqOiRHLbW5ZcPFRTtsHYLNBX3Cg", "payload": "" } 2024-02-15 03:11:44,293:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540559067 HTTP/1.1" 200 801 2024-02-15 03:11:44,294:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:11:43 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GpJFYYjUVgsHvahXBtjLiqGvCn9ChL5VndQoDR6phMKAU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:07Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540559067/MBQGZA", "token": "Kw5f1Ld0UlE2yvC6ntUu8B8EKWMoB_0Y2UyMCfhmWLw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540559067/Aot2bg", "token": "Kw5f1Ld0UlE2yvC6ntUu8B8EKWMoB_0Y2UyMCfhmWLw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540559067/YelLvw", "token": "Kw5f1Ld0UlE2yvC6ntUu8B8EKWMoB_0Y2UyMCfhmWLw" } ] } 2024-02-15 03:11:44,294:DEBUG:acme.client:Storing nonce: HpY91-GpJFYYjUVgsHvahXBtjLiqGvCn9ChL5VndQoDR6phMKAU 2024-02-15 03:11:44,294:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-15 03:11:44,295:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-02-15 03:11:44,295:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-15 03:11:44,295:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-15 03:11:44,296:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-15 03:11:44,296:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-15 03:11:44,296:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-15 03:11:44,297:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-15 03:11:44,298:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-15 03:11:44,349:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-15 03:11:44,542:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-15 03:11:44,543:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-15 03:11:44,544:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-15 03:11:44,548:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:20 UTC. 2024-02-15 03:11:44,549:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-15 03:11:44,549:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-15 03:11:44,554:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-15 03:11:44,555:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-15 03:11:44,555:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-15 03:11:44,570:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-15 03:11:44,571:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-15 03:11:44,573:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-15 03:11:45,114:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-15 03:11:45,115:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:11:43 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "XPUr8rI6QuU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-15 03:11:45,115:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-15 03:11:49,278:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7614_key-certbot.pem 2024-02-15 03:11:53,304:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7612_csr-certbot.pem 2024-02-15 03:11:53,305:DEBUG:acme.client:Requesting fresh nonce 2024-02-15 03:11:53,305:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-15 03:11:53,487:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-15 03:11:53,488:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:11:52 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GpdnS8pdgSp23FPsR2gQP59sRNPEDtbKWFS-Gu9V7Ud4E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-15 03:11:53,488:DEBUG:acme.client:Storing nonce: HpY91-GpdnS8pdgSp23FPsR2gQP59sRNPEDtbKWFS-Gu9V7Ud4E 2024-02-15 03:11:53,488:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-02-15 03:11:53,494:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BkblM4cGRnU3AyM0ZQc1IyZ1FQNTlzUk5QRUR0YktXRlMtR3U5VjdVZDRFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "uKTEOzUu3HlJSRpcpeqKcH-G6l87n41rDbKvYC8kZ2CwjZpucEVZ5FuZzyJwBca5IKbSEDRiZVU-1MtyMC0S_OmeDBheAxoRqn5JPLjEVq7VyqEEm51qIBfGLO2RvS87vwnA28iRMo8RHRrv7doq3updQ3FsEAONMB5AQPyw8zbdBSAJr4Pnho0jobFSy7SL7HTFHLUjjeMW3ShW7fHJT03HnTwNDFNBOpHjThp4AWdgupTFFBQP3IlEVZx2oCyuZOVSOjw2S0AF7Nb7YYzhfPxTlU3-s_wtPNrEvtFXsdS41LuvstH2xYzXnEjdmsVVYOvewVyOASaKpNs5fOhZEw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-15 03:11:53,691:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-15 03:11:53,692:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 15 Feb 2024 02:11:52 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256394317 Replay-Nonce: 63lPIS7zYsyKwldeEKBh2uDreOB7c2UHKpSCDwI1jGwqEV4wJWw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:17Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540602497" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256394317" } 2024-02-15 03:11:53,692:DEBUG:acme.client:Storing nonce: 63lPIS7zYsyKwldeEKBh2uDreOB7c2UHKpSCDwI1jGwqEV4wJWw 2024-02-15 03:11:53,692:DEBUG:acme.client:JWS payload: b'' 2024-02-15 03:11:53,698:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540602497: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3pZc3lLd2xkZUVLQmgydURyZU9CN2MyVUhLcFNDRHdJMWpHd3FFVjR3Sld3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA2MDI0OTcifQ", "signature": "WVAIoFanRhu_DPZ39V1gTbLvprVYmLaKwreSH_PpSgm0B_CpOjKu95p8cx3h6PNzHCclUSy_Y5VihBYPTbxw_APKwXw7SJY--4zUvi63033qxeO6vU_QTc6I6u7fHWU2AiqPTRJBF3_L91IzQ2dmbMf3eQ8PWIlMhUALmTfNctI8tY2sTstgTw0WbBdilsotOnMZMhlYStiuLkLPz9HuVhWO3VYOdbwtwPET9rgSBUM3lkqIyp2hV9PdT7iec3NekLhAxMKTjSW05-KxApPlZ_nmmLM0Y3usbutfEs32oWuwNHi04jwPUzKyT0xC1jR70JKH6O_mQ587idBHiKW-8g", "payload": "" } 2024-02-15 03:11:53,885:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540602497 HTTP/1.1" 200 805 2024-02-15 03:11:53,885:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:11:52 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 63lPIS7zpjnimqkS-HR-yDhX_c2stmJRb5GkKFDHpZprzx0QMdA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:17Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540602497/miLWNg", "token": "pNE-ffvpsYrp3EBdQk_eowX33MtP5Ibt0VZFfM0Eaxg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540602497/oFvs1Q", "token": "pNE-ffvpsYrp3EBdQk_eowX33MtP5Ibt0VZFfM0Eaxg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540602497/iyA7eA", "token": "pNE-ffvpsYrp3EBdQk_eowX33MtP5Ibt0VZFfM0Eaxg" } ] } 2024-02-15 03:11:53,885:DEBUG:acme.client:Storing nonce: 63lPIS7zpjnimqkS-HR-yDhX_c2stmJRb5GkKFDHpZprzx0QMdA 2024-02-15 03:11:53,886:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-15 03:11:53,886:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-02-15 03:11:53,887:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-15 03:11:53,887:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-15 03:11:53,888:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-15 03:11:53,888:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-15 03:11:53,888:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-15 03:11:53,889:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-15 03:11:53,890:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-15 03:11:53,929:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-15 03:11:54,106:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-15 03:11:54,107:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-15 03:11:54,108:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-15 03:11:54,111:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:36 UTC. 2024-02-15 03:11:54,111:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-15 03:11:54,112:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-15 03:11:54,117:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-15 03:11:54,117:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-15 03:11:54,117:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-15 03:11:54,122:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-15 03:11:54,122:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-15 03:11:54,124:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-15 03:11:54,659:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-15 03:11:54,659:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:11:53 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "nWzRjTLNobQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-15 03:11:54,660:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-15 03:11:58,679:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7615_key-certbot.pem 2024-02-15 03:12:02,649:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7613_csr-certbot.pem 2024-02-15 03:12:02,650:DEBUG:acme.client:Requesting fresh nonce 2024-02-15 03:12:02,650:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-15 03:12:02,826:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-15 03:12:02,827:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:12:01 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GpBAw11wOF-g-2_eUSrmrYrTxO4ojD3ZJVHBT35xv_8r4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-15 03:12:02,827:DEBUG:acme.client:Storing nonce: HpY91-GpBAw11wOF-g-2_eUSrmrYrTxO4ojD3ZJVHBT35xv_8r4 2024-02-15 03:12:02,827:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-02-15 03:12:02,833:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BCQXcxMXdPRi1nLTJfZVVTcm1yWXJUeE80b2pEM1pKVkhCVDM1eHZfOHI0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "XIyDxlOLf0GwCZVwjq3qqRL9FeHTvEz44tsT9C9X5aN4MwiRXqLK-Qrj2t3gHn7TgeM6ieIzRs-zF_ZNjJ8URFgcju0it_Y5qgbg5dxXONiK7iHW2wadIhXQ2G1hzzqqqHqZtrof6rOgteon-ZZaH-qwuZkdLAz0-c3sCRUiWVqALdp1dk1J68MXqd0c49fgG3MgamIaSRAi_mxVgw90k7AaFVbJ-3B2I1yMnPMZVu6p2evFhORrGP2eeER8XSAUnpO1njUxRRKo0gcCyRbcs5pKgX7nUuDeX7snui2qAV2mb4vrQ6bY_CGjh3qBo2EjMNIzFf81HdGW_Btiv7rIcA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-15 03:12:03,024:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-02-15 03:12:03,025:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 15 Feb 2024 02:12:01 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256417567 Replay-Nonce: HpY91-GpmchamUBm5hpMZMSG-ioMd6eYyTRB0DIL7DieHVtpCuU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:26Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540637387" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256417567" } 2024-02-15 03:12:03,025:DEBUG:acme.client:Storing nonce: HpY91-GpmchamUBm5hpMZMSG-ioMd6eYyTRB0DIL7DieHVtpCuU 2024-02-15 03:12:03,025:DEBUG:acme.client:JWS payload: b'' 2024-02-15 03:12:03,031:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540637387: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BtY2hhbVVCbTVocE1aTVNHLWlvTWQ2ZVl5VFJCMERJTDdEaWVIVnRwQ3VVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA2MzczODcifQ", "signature": "kUsBP08pjgQtiekp1fVBpKIrXu41Fd0Bl75M93PSaruGy6dgb_TEAqMB50Uwqo7zjrSn4VxSYYR320CzuJ4Kd5eK579Pi1RZatWOYTjmeaXDNS2xHxFKgAm7UxjSGm6AyJAF3d6_UbNQcr9iRR59UMddyfXoJkUXk6qstl9M4izclTZt9Q-t9VJC32apqonoinhQUpCk4Ix94BcttbUPzpL4DtW09HzejPpFynCnOxf0olZOI2DF7ZXenGnzbJIcGJFENFIh7DP-ER8LWac-nJdOdhDc4p9oYfISJJYuOeoCPCiEQvgohqgi2R5rHlDVNAlF643ErR6MapfwB9xDBw", "payload": "" } 2024-02-15 03:12:03,226:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540637387 HTTP/1.1" 200 809 2024-02-15 03:12:03,227:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:12:01 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 63lPIS7zMe8L6w1sOuGrvwK4vCbrVHLV9YIJHFv8bIysDxya2og X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:26Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540637387/K5ceNg", "token": "rQDo_fbJZ77G_xMXzDNJ8BgUZelHjyXDE6-SuLThQZ0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540637387/h5pTLw", "token": "rQDo_fbJZ77G_xMXzDNJ8BgUZelHjyXDE6-SuLThQZ0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540637387/S75ZSA", "token": "rQDo_fbJZ77G_xMXzDNJ8BgUZelHjyXDE6-SuLThQZ0" } ] } 2024-02-15 03:12:03,227:DEBUG:acme.client:Storing nonce: 63lPIS7zMe8L6w1sOuGrvwK4vCbrVHLV9YIJHFv8bIysDxya2og 2024-02-15 03:12:03,228:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-15 03:12:03,228:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-02-15 03:12:03,229:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-15 03:12:03,229:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-15 03:12:03,229:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-15 03:12:03,230:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-15 03:12:03,230:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-15 03:12:03,230:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-15 03:12:03,231:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-15 03:12:03,285:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-15 03:12:03,530:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-15 03:12:03,531:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-15 03:12:03,531:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-15 03:12:03,535:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:50 UTC. 2024-02-15 03:12:03,535:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-15 03:12:03,536:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-15 03:12:03,541:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-15 03:12:03,542:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-15 03:12:03,542:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-15 03:12:03,546:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-15 03:12:03,547:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-15 03:12:03,549:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-15 03:12:04,090:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-15 03:12:04,091:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:12:02 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "8Xf9IWN376k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-15 03:12:04,091:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-15 03:12:08,161:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7616_key-certbot.pem 2024-02-15 03:12:12,115:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7614_csr-certbot.pem 2024-02-15 03:12:12,115:DEBUG:acme.client:Requesting fresh nonce 2024-02-15 03:12:12,115:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-15 03:12:12,295:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-15 03:12:12,296:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:12:11 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-Gp-8tsrbJ5YjaznXJVeXe_bP6EuZnD1A18cJm2hxQX_Is X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-15 03:12:12,296:DEBUG:acme.client:Storing nonce: HpY91-Gp-8tsrbJ5YjaznXJVeXe_bP6EuZnD1A18cJm2hxQX_Is 2024-02-15 03:12:12,296:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-02-15 03:12:12,302:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3AtOHRzcmJKNVlqYXpuWEpWZVhlX2JQNkV1Wm5EMUExOGNKbTJoeFFYX0lzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "nLANYl9A9vC3bD9CsgrnwaAgYEAm0OuC81Em-6uI4qwosFDyWnv0lMjasXP-Oz3mZutNnUK19bnaFFLNnr7u5fjQyzMQOI0JF9Y841oxfOR_7Ex-BH1eg5DD_Lwqw-SJfVNgj7GTIMlbaNWehF1ZfZertrtmvhOyIxKTMEXd4UO6WQgX2nW14x7-KCQ9ptUNZEq6xdGWrYKjQHTQMHWvN537E2SqPvjNKb9ScYoGb4XfbeD85d0Du1fG0Tjj4A7xhTFHCsLdzI90tHuG9dRtufix_EFkeOb2syS-NjmCPMeLsfaFNqJlvYJpvvWx4lHZrDReS050vme-o2KluIUJUg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-15 03:12:12,497:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-02-15 03:12:12,499:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 15 Feb 2024 02:12:11 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256441417 Replay-Nonce: HpY91-Gp8UYWHLYZqiAnfl_WnHrCMNqGBrXmzTZjEpsV7aD8s7Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:36Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540672207" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256441417" } 2024-02-15 03:12:12,499:DEBUG:acme.client:Storing nonce: HpY91-Gp8UYWHLYZqiAnfl_WnHrCMNqGBrXmzTZjEpsV7aD8s7Q 2024-02-15 03:12:12,499:DEBUG:acme.client:JWS payload: b'' 2024-02-15 03:12:12,504:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540672207: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3A4VVlXSExZWnFpQW5mbF9XbkhyQ01OcUdCclhtelRaakVwc1Y3YUQ4czdRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA2NzIyMDcifQ", "signature": "j2dMAg16wT9AMEz3hjIbJr-zSjeDW1mPWeDUvIPeqKmRVc3mVVZ6TZVP9EgJs2n2KhFetsvbrGBAq09WJJtN4ma1WDZBfaXt39yVFHYwkr8jSYeyh9qkr5VVpTxdZr_X9FsRE_4pZzROfNGidz4H2utTBc8j0jLWpKJy3EEX98_u0jJrxsEG9PFG4Yl61NALNFx7HNmIe0liso_tTIojeTgNZ0ZGQJb9QHaqmve9aElIsn2aFa4gZRX5EyTdrf5O15U-I4ypekap0TlJADs7KbVLbd-xiSdUvdIAlqF7nTRZ026RMbuIWAv0_7hm5lFYLwLFwy6pK-Lfu2fssidlnQ", "payload": "" } 2024-02-15 03:12:12,706:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540672207 HTTP/1.1" 200 806 2024-02-15 03:12:12,707:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:12:11 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GpS1whmRKY-zWpcfYv0CYW8Z1sz2o_pdXAKzAvCjuoFpo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:36Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540672207/cHbPmQ", "token": "qjTrRwnMu8erDJdXc4snHnVEqSIvVb96brAl4wm-Ifo" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540672207/w9R_yw", "token": "qjTrRwnMu8erDJdXc4snHnVEqSIvVb96brAl4wm-Ifo" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540672207/Hm4ubg", "token": "qjTrRwnMu8erDJdXc4snHnVEqSIvVb96brAl4wm-Ifo" } ] } 2024-02-15 03:12:12,707:DEBUG:acme.client:Storing nonce: HpY91-GpS1whmRKY-zWpcfYv0CYW8Z1sz2o_pdXAKzAvCjuoFpo 2024-02-15 03:12:12,707:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-15 03:12:12,708:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-02-15 03:12:12,708:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-15 03:12:12,708:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-15 03:12:12,709:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-15 03:12:12,709:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-15 03:12:12,709:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-15 03:12:12,710:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-15 03:12:12,711:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-15 03:12:12,760:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-02-15 03:12:12,760:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-15 03:12:12,760:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-02-15 03:12:12,767:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-02-15 03:12:12,769:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-02-15 03:12:12,769:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-02-15 03:12:12,769:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-02-15 03:12:12,770:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-02-15 03:12:12,772:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-02-15 03:12:12,813:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-15 03:12:13,035:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-15 03:12:13,037:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-15 03:12:13,038:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-15 03:12:13,044:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:07 UTC. 2024-02-15 03:12:13,044:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-15 03:12:13,045:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-15 03:12:13,050:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-15 03:12:13,050:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-15 03:12:13,050:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-15 03:12:13,056:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-15 03:12:13,057:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-15 03:12:13,060:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-15 03:12:13,603:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-15 03:12:13,604:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:12:12 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "qdnXzzyYaOE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-15 03:12:13,605:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-15 03:12:18,172:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7617_key-certbot.pem 2024-02-15 03:12:22,125:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7615_csr-certbot.pem 2024-02-15 03:12:22,126:DEBUG:acme.client:Requesting fresh nonce 2024-02-15 03:12:22,126:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-15 03:12:22,310:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-15 03:12:22,310:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:12:21 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 63lPIS7zr2eXy2dtRqUOQfeVhf1bC6K_xoo5WZO2WEOkcHNjZqY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-15 03:12:22,311:DEBUG:acme.client:Storing nonce: 63lPIS7zr2eXy2dtRqUOQfeVhf1bC6K_xoo5WZO2WEOkcHNjZqY 2024-02-15 03:12:22,311:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-02-15 03:12:22,317:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3pyMmVYeTJkdFJxVU9RZmVWaGYxYkM2S194b281V1pPMldFT2tjSE5qWnFZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "lAQZeIswbFtKT__7q_F430WQSozxXSRfrrBUTImlDeihYs2lS5RLdMmyPmlrxe5Cq49YxUqg9TzCMJAfRGC9kdvPg22R-TSuGN5sE83UbiuDXUtIZB0ZfQ5YS9SRgE4NN2mR3pzwvqer59P_sjpv3rUspKDCuqzB81e1YpiXNzwPBqUrUZZhzQIXB1ercl6UR_o3XStHInwkJ6QFKPakHzlGYdpxrVF-0fqkD9OQ9016Ugu_cmeBujPUwdFQ75bwk-6Gbm11KK6AZ-M_kygAn_6OXhn4yBdWdBDGIhL4auF6ZqfxQHlVcxBXgbS4rxquPiaBCR6bERTCGTBdigoRfQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-15 03:12:22,527:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-02-15 03:12:22,528:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 15 Feb 2024 02:12:21 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256462697 Replay-Nonce: HpY91-GpTIJ3_G8ir9gbgXohM4K7wBurh3M8TwZVhtjzDoSbLoQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:45Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540704157" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256462697" } 2024-02-15 03:12:22,528:DEBUG:acme.client:Storing nonce: HpY91-GpTIJ3_G8ir9gbgXohM4K7wBurh3M8TwZVhtjzDoSbLoQ 2024-02-15 03:12:22,528:DEBUG:acme.client:JWS payload: b'' 2024-02-15 03:12:22,534:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540704157: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BUSUozX0c4aXI5Z2JnWG9oTTRLN3dCdXJoM004VHdaVmh0anpEb1NiTG9RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA3MDQxNTcifQ", "signature": "VmXfzr-UaYhW37Izw13EwvmQAWMjOlkQobRKmU0QEOHnufMumR0GzIShC64Wni4OR2WPYcWK7YIo8AYlYLplVYndbMp7G_DqNXYEF714PHp4n5GqEH-sFvtbBxNkdq_FHkT1JhWgzxY72wlpzng8l9t7Tic9AOAys_ZmTgM1Zn_KTPHkT99jXjSTmjT8Zua9V05mA1-kkj-AiKSrZhR4n5xwtqrmp1UJwaqpebNN-UHoUX2P5AD8aUcrS2E4IhnPEjxZhAfrW4keYqkKBW0MB09ezdtpCSyTsz1iBOt84T4-MtFAkkmnOZKXwXydb8xIxnfyaJ5Molj1VWnFAkDfaQ", "payload": "" } 2024-02-15 03:12:22,764:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540704157 HTTP/1.1" 200 811 2024-02-15 03:12:22,765:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:12:21 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 63lPIS7zOzf3wkiZNDe2WMhdW8FuFut1L4CF2ZWrK9pFehueecA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:45Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540704157/62ck5w", "token": "N5OAGNuMlPq5wVogNdMQl67gxh-DN3DOXmuMLJugFCo" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540704157/BJFdnw", "token": "N5OAGNuMlPq5wVogNdMQl67gxh-DN3DOXmuMLJugFCo" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540704157/eTpKlQ", "token": "N5OAGNuMlPq5wVogNdMQl67gxh-DN3DOXmuMLJugFCo" } ] } 2024-02-15 03:12:22,765:DEBUG:acme.client:Storing nonce: 63lPIS7zOzf3wkiZNDe2WMhdW8FuFut1L4CF2ZWrK9pFehueecA 2024-02-15 03:12:22,765:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-15 03:12:22,766:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-02-15 03:12:22,766:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-15 03:12:22,766:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-15 03:12:22,767:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-15 03:12:22,767:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-15 03:12:22,767:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-15 03:12:22,768:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-15 03:12:22,769:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-15 03:12:22,816:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-15 03:12:23,044:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-15 03:12:23,045:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-15 03:12:23,046:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-15 03:12:23,051:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:31 UTC. 2024-02-15 03:12:23,051:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-15 03:12:23,051:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-15 03:12:23,056:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-15 03:12:23,056:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-15 03:12:23,056:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-15 03:12:23,071:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-15 03:12:23,072:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-15 03:12:23,074:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-15 03:12:23,544:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-15 03:12:23,544:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:12:22 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "xwocyl7Phho": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-02-15 03:12:23,545:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-15 03:12:27,703:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7618_key-certbot.pem 2024-02-15 03:12:31,787:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7616_csr-certbot.pem 2024-02-15 03:12:31,787:DEBUG:acme.client:Requesting fresh nonce 2024-02-15 03:12:31,787:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-15 03:12:31,946:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-15 03:12:31,947:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:12:30 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ul1bJ6j-nCgYz4nk2d6T9wjap-CleH0qAvVfRde_Cc_Ho X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-15 03:12:31,947:DEBUG:acme.client:Storing nonce: HWHXB1ul1bJ6j-nCgYz4nk2d6T9wjap-CleH0qAvVfRde_Cc_Ho 2024-02-15 03:12:31,947:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-02-15 03:12:31,954:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWwxYko2ai1uQ2dZejRuazJkNlQ5d2phcC1DbGVIMHFBdlZmUmRlX0NjX0hvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "DtpzLwZr9NlJta2k_5FQvyg9xdrremausx8O2R8GGwMWeaaaTXJvj3EfHUeNR2IAFNbmLozGG4hXKpT9wef0riW7Uy3wvblVb0vbuyt7XOhSdFVy49sMVPdDuJjs49kRAU0PxwHezvs0cxNWlSJgw-6cbp_Nrav27qM7JVHEZrOKRNZ2R97FOgWIKwQLEJVtunVeeX1q7q3P6M--wIbpzFSNtuDVbdrS6haAbgBXuMaasrf3TcOL0rhh5Gx9terKEQpI5D50VjbfctBpkPUXaYoX-6K7aJlSZZ7A75sidu6gNtRPjElYcCwWVv86TaLlZPo6DgHHIMk9SSDZhRaB_Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-15 03:12:32,124:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-02-15 03:12:32,125:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 15 Feb 2024 02:12:30 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256484587 Replay-Nonce: HWHXB1ulx4VDzF3lcUg4eIahCC5269lAm7YWzaEHkTEXy07Y3bg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:54Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540734247" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256484587" } 2024-02-15 03:12:32,125:DEBUG:acme.client:Storing nonce: HWHXB1ulx4VDzF3lcUg4eIahCC5269lAm7YWzaEHkTEXy07Y3bg 2024-02-15 03:12:32,125:DEBUG:acme.client:JWS payload: b'' 2024-02-15 03:12:32,130:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540734247: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWx4NFZEekYzbGNVZzRlSWFoQ0M1MjY5bEFtN1lXemFFSGtURVh5MDdZM2JnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA3MzQyNDcifQ", "signature": "qq_KjEFE13xZCqRI0rcCSafPPLV6fFE5fsZJZpO8ujZw3auAGM-SgJinTnQ0zBWtRT2B6-IbxnD34wCFJhlIccfN1JXpJa5ZF193g2JqfvhhhuIawwBKPkTj4PwEnYVJnmexT427m5CN9FK6pp0m4zEPebk3ZKYL_nZGgGOD79UlgUrhpbVbVmtkidj9ygkpJfNZUvxoyhoTsIO_woIXwBpuHaI4KgwMvzWxgBP20qbKkhOjMMjVybQA1IJ4nFhHfuijShc8W14d2cNxux5uiAi9FLiYOzqwbZhB9ppl0a3Pc0cVHGETxEYT6nNkHe6JmUvet6poF-BSG0Mp2AHMJg", "payload": "" } 2024-02-15 03:12:32,291:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540734247 HTTP/1.1" 200 810 2024-02-15 03:12:32,292:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:12:31 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ulIc1YQJqATvHWwTgvK_MgHPu-5BrR1kO9MRB0Q0TPn6U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:54Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540734247/QhhIwA", "token": "fIJN8ZHL3VyhngYKMiarHrjh5Gae2nH2_mbQusoasGg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540734247/zrc52g", "token": "fIJN8ZHL3VyhngYKMiarHrjh5Gae2nH2_mbQusoasGg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540734247/3Cf07Q", "token": "fIJN8ZHL3VyhngYKMiarHrjh5Gae2nH2_mbQusoasGg" } ] } 2024-02-15 03:12:32,292:DEBUG:acme.client:Storing nonce: HWHXB1ulIc1YQJqATvHWwTgvK_MgHPu-5BrR1kO9MRB0Q0TPn6U 2024-02-15 03:12:32,293:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-15 03:12:32,293:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-02-15 03:12:32,294:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-15 03:12:32,294:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-15 03:12:32,295:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-15 03:12:32,295:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-15 03:12:32,295:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-15 03:12:32,296:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-15 03:12:32,296:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-15 03:12:32,357:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-15 03:12:32,596:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-15 03:12:32,598:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-02-15 03:12:32,598:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-02-15 03:12:32,601:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:09 UTC. 2024-02-15 03:12:32,602:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-15 03:12:32,602:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-15 03:12:32,607:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-15 03:12:32,607:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-15 03:12:32,608:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-15 03:12:32,624:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-15 03:12:32,625:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-15 03:12:32,627:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-15 03:12:33,171:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-15 03:12:33,171:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:12:31 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "ZLGnWSyDDOo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-15 03:12:33,172:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-15 03:12:37,763:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7619_key-certbot.pem 2024-02-15 03:12:41,816:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7617_csr-certbot.pem 2024-02-15 03:12:41,817:DEBUG:acme.client:Requesting fresh nonce 2024-02-15 03:12:41,817:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-15 03:12:41,999:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-15 03:12:42,000:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:12:40 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 63lPIS7z70RhXGEV8OrsghIxEgm0svG_0fS5LQuBZ4EBx7rfcaA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-15 03:12:42,000:DEBUG:acme.client:Storing nonce: 63lPIS7z70RhXGEV8OrsghIxEgm0svG_0fS5LQuBZ4EBx7rfcaA 2024-02-15 03:12:42,000:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-02-15 03:12:42,008:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3o3MFJoWEdFVjhPcnNnaEl4RWdtMHN2R18wZlM1TFF1Qlo0RUJ4N3JmY2FBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Hy2HABjQFlP8F3Ep7Jx9sLxk5GxG75OrMXekjLS4jRCc0xyXbA3vopxwMOEy4hWFd8laPHWMThqCdRrPT15l0gF4nNmf6_-PxFKRlFQytOMLUqx1VnBlK2zxEnpL2438XpR4J669IOZmLdZkLLUYIbpWQHYHln6ykxxxnXGC8wua35Sc4uMURar7-JRGiciqKabayzFh4GcDRSheSjuh06-XmvCG2OMogjRkTe1OBo16zht40ja9ezF2D49UZpntFBqXZoP0Hks2tV4bbDf05DtY0YOgAItMZiXuSC-g82icGpZhnz5-K2W4dB3KLx_PxtoV4o9vDm1Qp2ZlaHvXNw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-15 03:12:42,202:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-02-15 03:12:42,203:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 15 Feb 2024 02:12:40 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256513597 Replay-Nonce: HpY91-GpUKJeSZNpg7J3Pqwva3e9IEKOxamYFOZ3MND_dB-m4Bo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:28:03Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540772027" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256513597" } 2024-02-15 03:12:42,203:DEBUG:acme.client:Storing nonce: HpY91-GpUKJeSZNpg7J3Pqwva3e9IEKOxamYFOZ3MND_dB-m4Bo 2024-02-15 03:12:42,203:DEBUG:acme.client:JWS payload: b'' 2024-02-15 03:12:42,208:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540772027: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BVS0plU1pOcGc3SjNQcXd2YTNlOUlFS094YW1ZRk9aM01ORF9kQi1tNEJvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA3NzIwMjcifQ", "signature": "pTYDknsFVclhpk0_vYzt7GsPc-PVhQwe9oWoQ-d5MXv1G2a0Ffas5VqHxd-kAHww_a8qKXa6O72paI3WAc2ygMdnq2ANj6tyjn0MglUP3Y9SwMEoc6grDx6Q8V5ty9xdaS9E5uaqSvzWfIVjvuNw8MOlngpUvouIfaVyszsssosdXP6vkQdki6s_yD-s4KphRZfhOIndEJ1fid-1m6LDVO7khYFw7hW_MvU8257zCsBx_0CICECK0LtO1vaMe3suKEEi5NWhqC4sv03jGLg8C7o2icUz4ncoN9VMcrcDRFsOCmvPBVVBUKvCgPq66SH8TNEYV7aNh31F8d9_CM02hg", "payload": "" } 2024-02-15 03:12:42,394:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540772027 HTTP/1.1" 200 809 2024-02-15 03:12:42,394:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:12:41 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-Gpfq3oZ_cViRpxi7qVpNHPrOtOg2BjQP1H_h_7SrZuv5k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:28:03Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540772027/6vejxw", "token": "dx8dAtRrvWZPG_3QR_npx78MSNAxtOyiO70IZr2x6Iw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540772027/m1WT-w", "token": "dx8dAtRrvWZPG_3QR_npx78MSNAxtOyiO70IZr2x6Iw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540772027/53Jzvw", "token": "dx8dAtRrvWZPG_3QR_npx78MSNAxtOyiO70IZr2x6Iw" } ] } 2024-02-15 03:12:42,395:DEBUG:acme.client:Storing nonce: HpY91-Gpfq3oZ_cViRpxi7qVpNHPrOtOg2BjQP1H_h_7SrZuv5k 2024-02-15 03:12:42,395:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-15 03:12:42,396:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-02-15 03:12:42,396:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-15 03:12:42,396:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-15 03:12:42,397:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-15 03:12:42,397:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-15 03:12:42,397:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-15 03:12:42,398:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-15 03:12:42,399:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-15 03:12:42,451:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-15 03:12:42,690:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-15 03:12:42,692:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is signed by the certificate's issuer. 2024-02-15 03:12:42,693:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD 2024-02-15 03:12:42,698:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:26 UTC. 2024-02-15 03:12:42,699:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-15 03:12:42,699:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-15 03:12:42,704:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-15 03:12:42,705:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-15 03:12:42,705:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-15 03:12:42,720:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-15 03:12:42,721:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-15 03:12:42,723:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-15 03:12:43,186:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-15 03:12:43,186:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:12:41 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "I5rqC5sVuQo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-15 03:12:43,187:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-15 03:12:47,574:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7620_key-certbot.pem 2024-02-15 03:12:51,670:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7618_csr-certbot.pem 2024-02-15 03:12:51,671:DEBUG:acme.client:Requesting fresh nonce 2024-02-15 03:12:51,671:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-15 03:12:51,827:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-15 03:12:51,827:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:12:50 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o5uBsMdQ3qRW6P89n4gMLhqRNZIoT7ReRDHiUbxGsDuwI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-15 03:12:51,827:DEBUG:acme.client:Storing nonce: 6HUcA-o5uBsMdQ3qRW6P89n4gMLhqRNZIoT7ReRDHiUbxGsDuwI 2024-02-15 03:12:51,828:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-02-15 03:12:51,833:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzV1QnNNZFEzcVJXNlA4OW40Z01MaHFSTlpJb1Q3UmVSREhpVWJ4R3NEdXdJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ESvHTe_Ne9WEwe5inm8_ycmxRXBcYj8KbsXsH4P-OlGqlLU1ihTPQ-Cpvr_tN2w097ASlKeQ7n4rfH29brA9sRLKSyM7fj8ib_oCH9Z5KgOLHWIgIb2jPLe5klZJq5tT7WxBGzLtVoajJYFEhBY4-0A_r3eeVoinuXVOCBnfVsFGvIit0sGtY4pYuuhLVQNNFWKX1PAGUYCQiEnjBBkxbgpd2YYID8s18PL0FOtIOqKRk9f1zTmO3ZlfNjYG1jcjecHiBbt5OmjyOu2B1SRcIJZMk9HYyJu9mYhfG0KlRIphNeQcOCZKG1SfL8KbLGo_XEhpLnnMKYWXRjfPl1oPpQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-15 03:12:51,998:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-15 03:12:52,000:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 15 Feb 2024 02:12:50 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256544587 Replay-Nonce: 6HUcA-o5Stj972bqnkkuInY6JG3TN-UmN-OMY96t9y-NJBeToDw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:28:13Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540813967" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256544587" } 2024-02-15 03:12:52,000:DEBUG:acme.client:Storing nonce: 6HUcA-o5Stj972bqnkkuInY6JG3TN-UmN-OMY96t9y-NJBeToDw 2024-02-15 03:12:52,001:DEBUG:acme.client:JWS payload: b'' 2024-02-15 03:12:52,011:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540813967: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVTdGo5NzJicW5ra3VJblk2SkczVE4tVW1OLU9NWTk2dDl5LU5KQmVUb0R3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA4MTM5NjcifQ", "signature": "hb0FvFhaXXNyw_Au5nRRjEPkG1-R5v-XHet4aYtMz4riMcNEfsJDFXGEMNc1-9TEoOyXfNrDLUWmaL97yjzfbqgnDO_dOpHFjUjrZ7hvgPnL_TTydgGVolx23s65q_0OjC7fJd6otEQQh4TBgXjL7YoyA1B23pLe-vOpVh3Mi3-8VbfMLCjOkTU9KqFm4LtYjHUAHyS-PUuqN4PIni7dnSEyz3owkOYyxd75WA7yWgCX3VI-3A7kj_Ut8izb-h9khiWKbasfVoxSJkGWkBCwrif_8nknRGicShdJHxl5xdz_mrq_jl_Q2EUzMdWy09t1n3g6RQ2V7utwnVO1vGta9A", "payload": "" } 2024-02-15 03:12:52,198:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540813967 HTTP/1.1" 200 805 2024-02-15 03:12:52,198:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:12:50 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o5prXlmyKnkW-DpuvziHVapWjc-zC_OlUPGWg2OYRdLYk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:28:13Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540813967/QS3xjQ", "token": "Giw2SKEZArhw1cAd0QrBh2IQ4Gldqfhc9_Txzga0eYM" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540813967/GcxOwg", "token": "Giw2SKEZArhw1cAd0QrBh2IQ4Gldqfhc9_Txzga0eYM" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540813967/pdWHtQ", "token": "Giw2SKEZArhw1cAd0QrBh2IQ4Gldqfhc9_Txzga0eYM" } ] } 2024-02-15 03:12:52,198:DEBUG:acme.client:Storing nonce: 6HUcA-o5prXlmyKnkW-DpuvziHVapWjc-zC_OlUPGWg2OYRdLYk 2024-02-15 03:12:52,199:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-15 03:12:52,199:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-02-15 03:12:52,200:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-15 03:12:52,200:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-15 03:12:52,201:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-15 03:12:52,201:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-15 03:12:52,201:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-15 03:12:52,202:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-15 03:12:52,203:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-15 03:12:52,253:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-15 03:12:52,444:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-15 03:12:52,445:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-15 03:12:52,446:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-15 03:12:52,450:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:43 UTC. 2024-02-15 03:12:52,451:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-15 03:12:52,451:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-15 03:12:52,456:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-15 03:12:52,456:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-15 03:12:52,456:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-15 03:12:52,471:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-15 03:12:52,472:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-15 03:12:52,474:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-15 03:12:52,924:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-15 03:12:52,924:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:12:51 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "mo1a2my1MvE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-15 03:12:52,925:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-15 03:12:57,011:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7621_key-certbot.pem 2024-02-15 03:13:01,143:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7619_csr-certbot.pem 2024-02-15 03:13:01,144:DEBUG:acme.client:Requesting fresh nonce 2024-02-15 03:13:01,144:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-15 03:13:01,295:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-15 03:13:01,295:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:13:00 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o5PNIl53g94LV-3iRAgEV3_AMOiwtxIzj2eA1ZqIPXTcE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-15 03:13:01,295:DEBUG:acme.client:Storing nonce: 6HUcA-o5PNIl53g94LV-3iRAgEV3_AMOiwtxIzj2eA1ZqIPXTcE 2024-02-15 03:13:01,295:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-02-15 03:13:01,302:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVQTklsNTNnOTRMVi0zaVJBZ0VWM19BTU9pd3R4SXpqMmVBMVpxSVBYVGNFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "tHeLTmMSJ4Gd0iFqGu3TEdjRwauSdrkVponEadtNG1uODfb3abdYXJNjWDpxBCwATcbe_sMibu9oguZsIOgMIpodhlBBkk59reoiJNhpuRMRlIcYw_JCHg0J4_56XkHw-rH29ptsi6Ukt48Lo8Wk64mrhX-YfVEfBEsTZ3zxzLvijZWU-dWX3nJqZ7CxzybyhGzPY9w-oFuaitWaXujf1IRxwyFxrg5ze87zx2cbC-CmGY3FzDfAz82VtCxTUuCR-OgB9lOQO0k6aLWKIHtfXTSfUa3DhFn7I4qgQGejWoKc7bv7hNsV28aIflY5CligJIZRSSM73vg1k5--gW9wHw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-15 03:13:01,473:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-15 03:13:01,474:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 15 Feb 2024 02:13:00 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256570667 Replay-Nonce: HWHXB1ulXiwYxKKXRZTJG-vzD5NChSt3AjJ_pgRVKYIFAJsVUO0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:28:22Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540850567" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256570667" } 2024-02-15 03:13:01,474:DEBUG:acme.client:Storing nonce: HWHXB1ulXiwYxKKXRZTJG-vzD5NChSt3AjJ_pgRVKYIFAJsVUO0 2024-02-15 03:13:01,474:DEBUG:acme.client:JWS payload: b'' 2024-02-15 03:13:01,480:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540850567: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWxYaXdZeEtLWFJaVEpHLXZ6RDVOQ2hTdDNBakpfcGdSVktZSUZBSnNWVU8wIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA4NTA1NjcifQ", "signature": "qOHsb9ZuQYu9qq1B1_WFSU65PPE26Rm2mwgCHD4fvLRnm6_HhKoasedx7m7eKuuhHkD8Z6NqxS8J1-XM6wmE4A_SkET4E0BqtWNdyTiw5N1iyELViduWd1x73YyfiQXGei1XvKn_TkDFBvF8K7WxL-TWfQzAwy_lTXld7luAx7ARxOP268LWvawgrCba27qYU4N6XGPika042RyVLYQd6ec6yaI_0r2Uk_TnIDZoEIGfO3ldC5IrrnvixeqgO_1t4QO1VsUV6eEjrADhzjiISsIkHgvvZvBfpxNuruhL3uadKUkLyWePYNrr9gEJd9LVv2KylVw3ZDzYJLcJJKs9JQ", "payload": "" } 2024-02-15 03:13:01,644:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540850567 HTTP/1.1" 200 805 2024-02-15 03:13:01,645:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:13:00 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ulSvhq7txP4Q2b4eY4zsZRPF0eJvEFFC5fUDZ3jnmhjSE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:28:22Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540850567/9KsoFg", "token": "F_vhJNcuPiQNg87Bt2dXah4EyIxvrvDquKYXpvMqAbQ" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540850567/qRG9hA", "token": "F_vhJNcuPiQNg87Bt2dXah4EyIxvrvDquKYXpvMqAbQ" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540850567/TwBIlQ", "token": "F_vhJNcuPiQNg87Bt2dXah4EyIxvrvDquKYXpvMqAbQ" } ] } 2024-02-15 03:13:01,645:DEBUG:acme.client:Storing nonce: HWHXB1ulSvhq7txP4Q2b4eY4zsZRPF0eJvEFFC5fUDZ3jnmhjSE 2024-02-15 03:13:01,646:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-15 03:13:01,647:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-02-15 03:13:01,648:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-15 03:13:01,648:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-15 03:13:01,649:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-15 03:13:01,649:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-15 03:13:01,649:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-15 03:13:01,650:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-15 03:13:01,651:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-15 03:13:01,699:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-15 03:13:01,923:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-15 03:13:01,924:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-15 03:13:01,925:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-15 03:13:01,929:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:40:02 UTC. 2024-02-15 03:13:01,929:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-15 03:13:01,929:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-15 03:13:01,934:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-15 03:13:01,934:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-15 03:13:01,934:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-15 03:13:01,950:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-15 03:13:01,951:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-15 03:13:01,953:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-15 03:13:02,493:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-15 03:13:02,493:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:13:01 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "VHe6t2Is6Y4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-15 03:13:02,494:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-15 03:13:06,797:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7622_key-certbot.pem 2024-02-15 03:13:10,985:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7620_csr-certbot.pem 2024-02-15 03:13:10,985:DEBUG:acme.client:Requesting fresh nonce 2024-02-15 03:13:10,985:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-15 03:13:11,166:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-15 03:13:11,167:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:13:09 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-Gp7pm40xbj10F51gKNlCNOJeKeO0syGEYAMySTVEpKoC4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-15 03:13:11,167:DEBUG:acme.client:Storing nonce: HpY91-Gp7pm40xbj10F51gKNlCNOJeKeO0syGEYAMySTVEpKoC4 2024-02-15 03:13:11,168:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-02-15 03:13:11,173:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3A3cG00MHhiajEwRjUxZ0tObENOT0plS2VPMHN5R0VZQU15U1RWRXBLb0M0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ppLhq6RzCAjZW1Tkug_j0-fOJVdF8iZ9Ik78ASmKsY1Pby0fDgxZk9FtjWLXwEIBkT-7aPgDrzx7E9RWpFS0wrUnPg3c4xMBqa5Peb2Q2xyY3xTkdCAoCMuGLyQOPuyVUsOSc5IGbqKy8Td9M4s4SmJqkmCU9yHlFXd6ir3JDAFAozTXqBlTz9SodcQTLvqJQybBuzgoWMZxJQAJGMMfLNe_ygjV09NHLHMi8Gdq4ks0C78ajhCHtgMmbtmHo_CqUKlpvZ9YKDun-dVLh0H8XfVwWKMG2wxmxbLbx8cQjLjssxXiBScWVnzGnqOYS-L41E-qfQeDcOsXa9NqpOYumg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-15 03:13:11,384:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-15 03:13:11,385:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 15 Feb 2024 02:13:10 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256595137 Replay-Nonce: 63lPIS7zGgxEHxWMUa9j8T4Z45VN8ZsNj79lYctSgqV7VisAADk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:28:31Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540885967" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256595137" } 2024-02-15 03:13:11,385:DEBUG:acme.client:Storing nonce: 63lPIS7zGgxEHxWMUa9j8T4Z45VN8ZsNj79lYctSgqV7VisAADk 2024-02-15 03:13:11,385:DEBUG:acme.client:JWS payload: b'' 2024-02-15 03:13:11,392:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540885967: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3pHZ3hFSHhXTVVhOWo4VDRaNDVWTjhac05qNzlsWWN0U2dxVjdWaXNBQURrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA4ODU5NjcifQ", "signature": "p1WpwXibyS0W5oczQb3Lx2iiNJpY0QFaTOd4mVYlVeUhr6lMXRUnMDJnOAtBFGDtsip7T4cfAQJRshY62O2R6oocpk4ZduaMTJYH1uECrqwYgsXe-5Gpt-uPpqJEz6lvm7PHZqRxJNrwMW0uotqPJW5Cs-U-8GWiVjIVoRO3EJZByIsSQaE2mcCNl2713rAc5jjRMkhJ6rzsTXyKtlo5Znu2LFwbwUtIbod3oi1OHizk2wgrzDgcj5fLitubeM1Fk4uvWGmNlKP-czwNxlKrB17FgKaHhRWpLE3c0j_5-Q1GhSnLEA7ZN96sbPIh1kuN5kt7gBT3BVwLKWdM250hjA", "payload": "" } 2024-02-15 03:13:11,583:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540885967 HTTP/1.1" 200 805 2024-02-15 03:13:11,584:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 15 Feb 2024 02:13:10 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 63lPIS7zN-d--5REQWesY2FDzcFOIH_PxQjbbY_2YsdobSAqvDQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:28:31Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540885967/OUXDhQ", "token": "M6pE59XecoDIFeZmQ2fOLVruWYIn_qwzTAv5ez_ACcw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540885967/gxpKtA", "token": "M6pE59XecoDIFeZmQ2fOLVruWYIn_qwzTAv5ez_ACcw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540885967/ovBk4w", "token": "M6pE59XecoDIFeZmQ2fOLVruWYIn_qwzTAv5ez_ACcw" } ] } 2024-02-15 03:13:11,584:DEBUG:acme.client:Storing nonce: 63lPIS7zN-d--5REQWesY2FDzcFOIH_PxQjbbY_2YsdobSAqvDQ 2024-02-15 03:13:11,584:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-15 03:13:11,585:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-02-15 03:13:11,585:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-15 03:13:11,586:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-15 03:13:11,587:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-15 03:13:11,587:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-15 03:13:11,587:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-15 03:13:11,588:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-15 03:13:11,589:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-15 03:13:11,589:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-02-15 03:13:11,589:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-02-15 03:13:11,590:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-02-15 03:13:11,592:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)