2024-02-14 06:46:51,987:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-02-14 06:46:51,987:DEBUG:certbot._internal.main:Arguments: [] 2024-02-14 06:46:51,988:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-02-14 06:46:52,780:DEBUG:certbot._internal.log:Root logging level set at 20 2024-02-14 06:46:52,781:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-02-14 06:46:52,819:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-02-14 06:46:52,860:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-14 06:46:53,105:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-14 06:46:53,107:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is signed by the certificate's issuer. 2024-02-14 06:46:53,111:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is: OCSPCertStatus.GOOD 2024-02-14 06:46:53,119:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:15 UTC. 2024-02-14 06:46:53,119:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-14 06:46:53,120:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-14 06:46:53,125:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-14 06:46:53,125:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-14 06:46:53,125:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-14 06:46:53,130:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-14 06:46:53,131:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-14 06:46:53,133:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-14 06:46:53,667:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-14 06:46:53,667:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:46:52 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "-n3mkBRflXQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-14 06:46:53,668:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-14 06:46:58,354:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7584_key-certbot.pem 2024-02-14 06:47:02,677:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7582_csr-certbot.pem 2024-02-14 06:47:02,677:DEBUG:acme.client:Requesting fresh nonce 2024-02-14 06:47:02,677:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-14 06:47:02,826:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-14 06:47:02,827:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:47:02 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o50m9jHo4ER74Idzbs594_7P6cbbqcTkx-dlJJXa1XNXg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-14 06:47:02,827:DEBUG:acme.client:Storing nonce: 6HUcA-o50m9jHo4ER74Idzbs594_7P6cbbqcTkx-dlJJXa1XNXg 2024-02-14 06:47:02,827:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-02-14 06:47:02,833:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzUwbTlqSG80RVI3NElkemJzNTk0XzdQNmNiYnFjVGt4LWRsSkpYYTFYTlhnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "hh-x7Aq3r-P6wGPEd3J55GI3aZbNidkMlgfv387si-9XgXSrCwuv3F7UmAW0H34QAOHA2YaWN8bNfOegvFJjop5S0YP6gJLuiTS1CXEsnR2CsRSLMUKMSkZXSgwaFCpHG2g3bCZf3X7PJ_JvStbt7ecbOOUJKtzN5hCnjnkeQzUpCSGiX-yCttNeAubJDDt_X42EMDDR8_FglUYn2bWK0PCtFCY9xu0xpjVY0iXWi7L8tlLIgOj6AbtMOrL13EEBOF4Hkq1YAraCTBzoITTFMvFLzeBJ_mGEKjfbyorAuq5VclTT9VIyGbTV0XGo71uKpVNVWQkSB9VFeRLpGurPgQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-14 06:47:02,991:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-02-14 06:47:02,992:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 14 Feb 2024 05:47:02 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256281307 Replay-Nonce: HWHXB1ulVhOinRWXHs2WCz-Z9MTF7K4jglOpqTtnuC-ocxXXwyI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:26:39Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540442217" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256281307" } 2024-02-14 06:47:02,992:DEBUG:acme.client:Storing nonce: HWHXB1ulVhOinRWXHs2WCz-Z9MTF7K4jglOpqTtnuC-ocxXXwyI 2024-02-14 06:47:02,993:DEBUG:acme.client:JWS payload: b'' 2024-02-14 06:47:03,002:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540442217: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWxWaE9pblJXWEhzMldDei1aOU1URjdLNGpnbE9wcVR0bnVDLW9jeFhYd3lJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA0NDIyMTcifQ", "signature": "tQ4Q5lLoWLddFv8xjpdZD44b2CyAcxgB0MIDGZH9itCT3H_x73Q9iptGZfFe7T_0S9yLMXgHYxMECJnGpeYeIH-tc9BXpbWw4lzl81hBCkXL-j-TOckcNU86EHvSyx4oqSZvtU5LdyK8qesQ598wN1iZp7jjrReIUA9y1NDvykzlWpI6d8UgDNz7xRiiIcpa1N3UUX2OCwQN1bmOXU3mMm_5DSYJtGFqcV1Ne5k-wqDIgmtrK32ChBIXQ6AEoBP7InaSAzHEESLhw-LfpXwprSItu38K2RX02nd-hNS-k9kn2dJwh-W8_YWcgIkyb5dq9sSJW5VcbTZvyhwYCAnUpw", "payload": "" } 2024-02-14 06:47:03,167:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540442217 HTTP/1.1" 200 810 2024-02-14 06:47:03,168:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:47:02 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ulw7TWttvAaLfvIpPefFFzcOEoVrQx9KVerombjC3k7hg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:26:39Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540442217/D1FeaA", "token": "ArP8a0cUi_G3Nbfrk3cNkTx86Kt5iLXDEYthGSw4EUs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540442217/-mx8SQ", "token": "ArP8a0cUi_G3Nbfrk3cNkTx86Kt5iLXDEYthGSw4EUs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540442217/azK9Sg", "token": "ArP8a0cUi_G3Nbfrk3cNkTx86Kt5iLXDEYthGSw4EUs" } ] } 2024-02-14 06:47:03,169:DEBUG:acme.client:Storing nonce: HWHXB1ulw7TWttvAaLfvIpPefFFzcOEoVrQx9KVerombjC3k7hg 2024-02-14 06:47:03,170:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-14 06:47:03,170:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-02-14 06:47:03,171:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-14 06:47:03,171:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-14 06:47:03,177:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-14 06:47:03,177:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-14 06:47:03,177:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-14 06:47:03,178:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-14 06:47:03,183:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-14 06:47:03,221:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-14 06:47:03,707:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-14 06:47:03,709:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-14 06:47:03,711:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-14 06:47:03,720:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:32 UTC. 2024-02-14 06:47:03,720:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-14 06:47:03,720:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-14 06:47:03,725:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-14 06:47:03,725:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-14 06:47:03,726:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-14 06:47:03,730:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-14 06:47:03,731:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-14 06:47:03,733:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-14 06:47:04,281:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-14 06:47:04,283:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:47:03 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "u2NZSX94FhY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-02-14 06:47:04,284:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-14 06:47:08,414:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7585_key-certbot.pem 2024-02-14 06:47:12,347:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7583_csr-certbot.pem 2024-02-14 06:47:12,347:DEBUG:acme.client:Requesting fresh nonce 2024-02-14 06:47:12,348:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-14 06:47:12,530:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-14 06:47:12,531:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:47:11 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GpOrdaMJNZaQoyVHGahstLxDrLJzWo5zV_JSJsdfM-qNI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-14 06:47:12,531:DEBUG:acme.client:Storing nonce: HpY91-GpOrdaMJNZaQoyVHGahstLxDrLJzWo5zV_JSJsdfM-qNI 2024-02-14 06:47:12,532:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-02-14 06:47:12,541:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BPcmRhTUpOWmFRb3lWSEdhaHN0THhEckxKeldvNXpWX0pTSnNkZk0tcU5JIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "O6AFVZbdyCYnAcAFDQquZ7IEqo6J7gQZ0UhQwMX1wiDi3GNYl_G0L9jyqhRka-v1XcmVKjMNUYmZ1TXBS2gmMSjWcdEcceHJ25T0SZLZMpUfhmbogtjuQbuc18yTMaXSqyUF3IRfI_R5mhT4gFsX1l2i64XKLfV2gfhmQL4V6eIuzTldPiFp_G8d5L0co838wu5TsSkjrrjRDdE36H_cCmjIaHFjXtffaadiOzuMIeOpeSwzXRAuRpWvkDytQkdCmt33sn9TuRkryWDepSHNbJB4GCkOzbe9v3igP_R9pmsjDMuTj-5yNB0xxF-x9gTRufGW_cL3mOAY_83CwvVORQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-14 06:47:12,733:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-02-14 06:47:12,734:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 14 Feb 2024 05:47:12 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256306347 Replay-Nonce: HpY91-GpYLltQrwi-EPrCjKqK2r0tQTi8Vx5QyJJoogsIuxqvL0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:26:49Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540477517" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256306347" } 2024-02-14 06:47:12,734:DEBUG:acme.client:Storing nonce: HpY91-GpYLltQrwi-EPrCjKqK2r0tQTi8Vx5QyJJoogsIuxqvL0 2024-02-14 06:47:12,734:DEBUG:acme.client:JWS payload: b'' 2024-02-14 06:47:12,740:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540477517: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BZTGx0UXJ3aS1FUHJDaktxSzJyMHRRVGk4Vng1UXlKSm9vZ3NJdXhxdkwwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA0Nzc1MTcifQ", "signature": "hWK8hNueR92l_PD_ym7aK7ssvhbbbnefv8XvugD_wbrMtGJK94wPdTAVEZ6pfu_wqyj9mTndCXm-0yKHH70QG5GbtPCJCbTtqrKMfhxBZEys5qn2yFZysRfFNsMbUsOtJDYKDXemJpamths8ZMJN6RPIxlkvWhyU-4JXtbSGyz0kYwJYT2QmaA-E3qJ3HCV8-cRFZ9xsGFuOLWmORxxlrM3bHs_I5hhwxI8Ac9SIeCQDlynrtN0dV-al6HBA5H6ECcT5rL5LcnQN8iknKsvvDLNepQM_pPVN28_2hzf98Bjjg6vsI-FKCp-FnxZLHeZC7Vs6A9ayKg5GkoFHIgHm3Q", "payload": "" } 2024-02-14 06:47:12,927:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540477517 HTTP/1.1" 200 804 2024-02-14 06:47:12,928:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:47:12 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 63lPIS7zptgSvRA7xGffw_jhx1R2LGNP2PRfcnCGYp8nClskDz8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:26:49Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540477517/zBe4Yw", "token": "8iGzASnL30f6Zg4WsWG91mNySkbT6obzDH-O1WlTCYU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540477517/jvutYw", "token": "8iGzASnL30f6Zg4WsWG91mNySkbT6obzDH-O1WlTCYU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540477517/9Dli9w", "token": "8iGzASnL30f6Zg4WsWG91mNySkbT6obzDH-O1WlTCYU" } ] } 2024-02-14 06:47:12,928:DEBUG:acme.client:Storing nonce: 63lPIS7zptgSvRA7xGffw_jhx1R2LGNP2PRfcnCGYp8nClskDz8 2024-02-14 06:47:12,928:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-14 06:47:12,929:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-02-14 06:47:12,929:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-14 06:47:12,929:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-14 06:47:12,930:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-14 06:47:12,930:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-14 06:47:12,930:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-14 06:47:12,930:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-14 06:47:12,931:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-14 06:47:12,979:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-14 06:47:13,189:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-14 06:47:13,190:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-14 06:47:13,191:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-14 06:47:13,195:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:49 UTC. 2024-02-14 06:47:13,195:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-14 06:47:13,196:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-14 06:47:13,200:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-14 06:47:13,201:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-14 06:47:13,201:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-14 06:47:13,216:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-14 06:47:13,217:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-14 06:47:13,218:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-14 06:47:13,679:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-14 06:47:13,680:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:47:12 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "nUIHX5Rjso4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-14 06:47:13,682:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-14 06:47:17,736:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7586_key-certbot.pem 2024-02-14 06:47:21,604:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7584_csr-certbot.pem 2024-02-14 06:47:21,605:DEBUG:acme.client:Requesting fresh nonce 2024-02-14 06:47:21,605:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-14 06:47:21,754:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-14 06:47:21,755:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:47:21 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o5fcfPrQzm97OCfSHdxbJFcrB_0gGcBC7R5O3_GWk8VB8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-14 06:47:21,755:DEBUG:acme.client:Storing nonce: 6HUcA-o5fcfPrQzm97OCfSHdxbJFcrB_0gGcBC7R5O3_GWk8VB8 2024-02-14 06:47:21,755:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-02-14 06:47:21,762:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVmY2ZQclF6bTk3T0NmU0hkeGJKRmNyQl8wZ0djQkM3UjVPM19HV2s4VkI4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "thEZbsWSVm55JKuUMY5HyydKagckseIRg12wmLOV6R82Jq1f4iFyEWuXGMWecHrT0e4atVmw8OAt86yDdrNpff24_xnlaBt53KP1j6-f33et8pRmnd8j-7rf447Qwok0uj51idOmdHclGy8YpqdnAsuTsT3hVJLTUkT6f0uUpcjFH6zupr6q8K6fFpdWtHqrEsdEYtHOPMh42vCY3E9BzFL7KQGPh0mZM73UGTuVFH4ZnSvDe7Zvm6JrA_5t8tolkRQi7q8Cv2CBB9LHu489DmvzqcVx5oyJXsL6WXKERLcjLGbtSyHc7IpuZCCSVTNNW7RJq8Fh6BQHCLDcyRaL5g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-14 06:47:21,945:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-02-14 06:47:21,946:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 14 Feb 2024 05:47:21 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256330697 Replay-Nonce: 6HUcA-o5Ch28IjfEiiA0PHV-pmrb5Xi4Y0Lbxi48f65FpVJSYx8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:26:58Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540514237" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256330697" } 2024-02-14 06:47:21,946:DEBUG:acme.client:Storing nonce: 6HUcA-o5Ch28IjfEiiA0PHV-pmrb5Xi4Y0Lbxi48f65FpVJSYx8 2024-02-14 06:47:21,946:DEBUG:acme.client:JWS payload: b'' 2024-02-14 06:47:21,952:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540514237: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVDaDI4SWpmRWlpQTBQSFYtcG1yYjVYaTRZMExieGk0OGY2NUZwVkpTWXg4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA1MTQyMzcifQ", "signature": "K18skK3m_16eGWCvwjPAg5iVH5253OmErpAwdpEHSj98yEkdA3KmCwk3B5zTMX2l000V1_M4j7bEI-I8-CvBnTeu5xTe_ZITuyO0I6-frSH0ar9eDwrtDYcGxgYhQtyaEGGoL_u0a6qte8lbGc5D3U1O7Y7WN-dYBSfaJJLGmf8YtgzwkXr6CGakan2FwkrFLYs0yYfbOpfiCXpZl5LFQilT4umYi9HQkdW9Gvb9GhaIyIGryKDJYFk0Zzr7qOqWagPJ76EZY7-Wfg5VClmClsz6gcTbtZ8zVop8o1JYb56HQg-EJ7AcwrEk_5cAYb-y_33KHfOckTErqfxc7k_dRQ", "payload": "" } 2024-02-14 06:47:22,136:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540514237 HTTP/1.1" 200 807 2024-02-14 06:47:22,137:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:47:21 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ul5d8VMrYGe2lvq0rL9c0iQLFAZadtt8VbUCnbK9ngLDM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:26:58Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540514237/y7Fh6A", "token": "mx-KJuR3SKsTvFopAHExnS3CQMuuST_PdD5t2ueC7DE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540514237/tfTCJQ", "token": "mx-KJuR3SKsTvFopAHExnS3CQMuuST_PdD5t2ueC7DE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540514237/pbKBOA", "token": "mx-KJuR3SKsTvFopAHExnS3CQMuuST_PdD5t2ueC7DE" } ] } 2024-02-14 06:47:22,137:DEBUG:acme.client:Storing nonce: HWHXB1ul5d8VMrYGe2lvq0rL9c0iQLFAZadtt8VbUCnbK9ngLDM 2024-02-14 06:47:22,138:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-14 06:47:22,138:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-02-14 06:47:22,139:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-14 06:47:22,139:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-14 06:47:22,140:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-14 06:47:22,140:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-14 06:47:22,140:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-14 06:47:22,140:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-14 06:47:22,141:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-14 06:47:22,191:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-14 06:47:22,256:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-14 06:47:22,258:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-14 06:47:22,259:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-14 06:47:22,270:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:03 UTC. 2024-02-14 06:47:22,270:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-14 06:47:22,271:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-14 06:47:22,277:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-14 06:47:22,277:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-14 06:47:22,278:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-14 06:47:22,283:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-14 06:47:22,284:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-14 06:47:22,286:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-14 06:47:22,737:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-14 06:47:22,738:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:47:22 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "MxIOLfsjre4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-14 06:47:22,739:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-14 06:47:26,718:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7587_key-certbot.pem 2024-02-14 06:47:30,577:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7585_csr-certbot.pem 2024-02-14 06:47:30,577:DEBUG:acme.client:Requesting fresh nonce 2024-02-14 06:47:30,577:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-14 06:47:30,729:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-14 06:47:30,730:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:47:30 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ul59lDhEF2Pz49dTnmMTu0jRt06VVPXUBGGYr6Azzbprs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-14 06:47:30,730:DEBUG:acme.client:Storing nonce: HWHXB1ul59lDhEF2Pz49dTnmMTu0jRt06VVPXUBGGYr6Azzbprs 2024-02-14 06:47:30,731:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-02-14 06:47:30,736:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWw1OWxEaEVGMlB6NDlkVG5tTVR1MGpSdDA2VlZQWFVCR0dZcjZBenpicHJzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "u39fhmls472cNm1kLID_RyK1Y7LymXBv5enbMg2jmE9KYhFyghYYPpz6h_0oGgq6iCP9aEreMtcMP-TI1dpJP_yN52UtOQb9FaZQJDaucBVB3HjzscRctniT5bHX8K2_Bjee7uLk6YvoHJCJaKpI5tFQVHnoGofqYkwlouPmDVkjUigoUjacw8-G2UAr1kY7ukzQYjKDkxfAQ7F7_fRu-VAQA_GE2MX4JI0vgGmdtQDF0RhFd1v5H3niaj3Cwne77HN7IfIPxlLvJgvRgYZYWHPHZvZ492JHK1UoIz7LXF2qEQByQG_TbD5c2zaquOt0ASSxXSFNxxf-JUETGdtFpw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-14 06:47:30,894:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-02-14 06:47:30,894:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 14 Feb 2024 05:47:30 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256364097 Replay-Nonce: 6HUcA-o5tcwIFenXBEeBpzB__84U4hkDG-IGUQrJvYDnLOhuWMU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:07Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540559067" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256364097" } 2024-02-14 06:47:30,894:DEBUG:acme.client:Storing nonce: 6HUcA-o5tcwIFenXBEeBpzB__84U4hkDG-IGUQrJvYDnLOhuWMU 2024-02-14 06:47:30,895:DEBUG:acme.client:JWS payload: b'' 2024-02-14 06:47:30,900:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540559067: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzV0Y3dJRmVuWEJFZUJwekJfXzg0VTRoa0RHLUlHVVFySnZZRG5MT2h1V01VIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA1NTkwNjcifQ", "signature": "QUtPLqFgu5vyLIdnxMhjkZOShedQOAY_VMU8Hh7rxeBRLfV_cjXh3zjrCz8v75loMQWmg-MjYn-f8YPdBmXpKMV4P25Kb8Y_weEEm1dScc0FH6dbn45OndEe0yWlyB4bxhSJh4yY85ZtHYLeB3stVs_jzSQ9lD8HkbvYFXt6qCkppFd0mEkGMpPYOa7b8fkno2Q9Le5jnGO3lSYAFaSil8qaehDjZu18phCbxOf9fZ07dFfFQ7pI7VdEQ6U2qjOllrQucWP4VVBC4cQus6XrF6wJYLtdvvtACxuUlsNXGrLUuKV9W5P2C3FtPBNNXckp2O3ee5xQCTb8PUXpcHHBFA", "payload": "" } 2024-02-14 06:47:31,068:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540559067 HTTP/1.1" 200 801 2024-02-14 06:47:31,069:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:47:30 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ul6dti31Tul__n_qdDTNzawUfPnu7KQJu_h5QM63AGhxY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:07Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540559067/MBQGZA", "token": "Kw5f1Ld0UlE2yvC6ntUu8B8EKWMoB_0Y2UyMCfhmWLw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540559067/Aot2bg", "token": "Kw5f1Ld0UlE2yvC6ntUu8B8EKWMoB_0Y2UyMCfhmWLw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540559067/YelLvw", "token": "Kw5f1Ld0UlE2yvC6ntUu8B8EKWMoB_0Y2UyMCfhmWLw" } ] } 2024-02-14 06:47:31,069:DEBUG:acme.client:Storing nonce: HWHXB1ul6dti31Tul__n_qdDTNzawUfPnu7KQJu_h5QM63AGhxY 2024-02-14 06:47:31,069:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-14 06:47:31,070:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-02-14 06:47:31,070:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-14 06:47:31,071:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-14 06:47:31,071:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-14 06:47:31,072:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-14 06:47:31,072:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-14 06:47:31,072:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-14 06:47:31,073:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-14 06:47:31,110:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-14 06:47:31,320:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-14 06:47:31,321:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-14 06:47:31,322:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-14 06:47:31,328:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:20 UTC. 2024-02-14 06:47:31,328:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-14 06:47:31,328:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-14 06:47:31,334:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-14 06:47:31,334:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-14 06:47:31,334:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-14 06:47:31,350:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-14 06:47:31,350:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-14 06:47:31,352:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-14 06:47:31,807:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-14 06:47:31,808:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:47:31 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "HsbSE6rN2hg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-14 06:47:31,809:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-14 06:47:35,851:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7588_key-certbot.pem 2024-02-14 06:47:39,679:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7586_csr-certbot.pem 2024-02-14 06:47:39,679:DEBUG:acme.client:Requesting fresh nonce 2024-02-14 06:47:39,679:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-14 06:47:39,832:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-14 06:47:39,834:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:47:39 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ulQNrlUttIHDSd519bgu2bRZ2SjOu7RM9eS-RzMQbkDio X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-14 06:47:39,834:DEBUG:acme.client:Storing nonce: HWHXB1ulQNrlUttIHDSd519bgu2bRZ2SjOu7RM9eS-RzMQbkDio 2024-02-14 06:47:39,835:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-02-14 06:47:39,842:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWxRTnJsVXR0SUhEU2Q1MTliZ3UyYlJaMlNqT3U3Uk05ZVMtUnpNUWJrRGlvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "tGoM_NxOtPLYiCZH7-qX0yydByW6e79n2U6yE16sTeQPibuzx1wgDUOYADM2GaxUiOY4K0Gmwn9rzDK_jfcy79MvAOWYU9uPlNRRgWbvR3kFVNS5RkNslW5pOV0Tnp9uGYd_tjLD2YWvtgh2fpZUZEIYYatEx_6Z_kzA09v_JaDvcy3XAOCkbDSbLavsXDq2mCd3jWFnMexQSzgPxA5JJ2pAfopTbibhWTxSLAiUW1cvgAYP4G_m_KAJhe0Ep9ovlbFTvDvYEjSPsn6maG-BYfooDUQ3W1g2cUyGkbNWaUGkK9KQ4kesEvw50mzDOMpgXpcbNwxHI4zAgdbiAMqMrg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-14 06:47:40,013:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-14 06:47:40,015:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 14 Feb 2024 05:47:39 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256394317 Replay-Nonce: 6HUcA-o5bV7hmfabUJxXT0bHKxafLrHK7Irokaq0KncmBCTMLkM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:17Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540602497" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256394317" } 2024-02-14 06:47:40,015:DEBUG:acme.client:Storing nonce: 6HUcA-o5bV7hmfabUJxXT0bHKxafLrHK7Irokaq0KncmBCTMLkM 2024-02-14 06:47:40,016:DEBUG:acme.client:JWS payload: b'' 2024-02-14 06:47:40,024:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540602497: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzViVjdobWZhYlVKeFhUMGJIS3hhZkxySEs3SXJva2FxMEtuY21CQ1RNTGtNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA2MDI0OTcifQ", "signature": "ef1OAyzVS5HdjeoXHHdtNUW_wfRTaazVuKM2O-rxhFDCJofQ01aQzBNPx1C9BsCMJfv2DV9fhLVOXeEayIMIvybO9ocER0tMWVxbC-ywqhJfYis8Z2aZG8DQtp7SYHXzfyzpi0tn7ihvHn5AQOxNRs_S0A4b2o2ykzXJTB9n6BohKzI9lpAO1gMHsdhbMdVT3-_aYOjFupjJgxaTU2ULQzdobMDRoBo6UQ1V8nD6lIEyTDDdAMEJrWqKCtuOPANXzL1Y2Mpupd3sy0QXS61Tp1-hmDIyU7a0LaJEFJcWYeVVKPAMO-yjpHY72OTSjEyjYAWTew2LE57sdlSqtE2uQQ", "payload": "" } 2024-02-14 06:47:40,214:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540602497 HTTP/1.1" 200 805 2024-02-14 06:47:40,216:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:47:39 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o5w_0aPPO7pcH6VRVYmbgMGWQ4PrTrTYt5TOKXQuKfzU4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:17Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540602497/miLWNg", "token": "pNE-ffvpsYrp3EBdQk_eowX33MtP5Ibt0VZFfM0Eaxg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540602497/oFvs1Q", "token": "pNE-ffvpsYrp3EBdQk_eowX33MtP5Ibt0VZFfM0Eaxg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540602497/iyA7eA", "token": "pNE-ffvpsYrp3EBdQk_eowX33MtP5Ibt0VZFfM0Eaxg" } ] } 2024-02-14 06:47:40,216:DEBUG:acme.client:Storing nonce: 6HUcA-o5w_0aPPO7pcH6VRVYmbgMGWQ4PrTrTYt5TOKXQuKfzU4 2024-02-14 06:47:40,217:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-14 06:47:40,218:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-02-14 06:47:40,219:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-14 06:47:40,219:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-14 06:47:40,220:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-14 06:47:40,220:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-14 06:47:40,220:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-14 06:47:40,220:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-14 06:47:40,222:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-14 06:47:40,269:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-14 06:47:40,488:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-14 06:47:40,489:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-14 06:47:40,490:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-14 06:47:40,494:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:36 UTC. 2024-02-14 06:47:40,494:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-14 06:47:40,494:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-14 06:47:40,499:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-14 06:47:40,499:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-14 06:47:40,499:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-14 06:47:40,504:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-14 06:47:40,504:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-14 06:47:40,506:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-14 06:47:40,970:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-14 06:47:40,971:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:47:40 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "qiCx-RxHnNY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-14 06:47:40,971:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-14 06:47:45,398:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7589_key-certbot.pem 2024-02-14 06:47:49,310:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7587_csr-certbot.pem 2024-02-14 06:47:49,311:DEBUG:acme.client:Requesting fresh nonce 2024-02-14 06:47:49,311:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-14 06:47:49,468:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-14 06:47:49,469:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:47:48 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o5inrA47bX0n8y2VSDwTaBYZVNisnK5iX_KjWETQa5RGM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-14 06:47:49,469:DEBUG:acme.client:Storing nonce: 6HUcA-o5inrA47bX0n8y2VSDwTaBYZVNisnK5iX_KjWETQa5RGM 2024-02-14 06:47:49,470:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-02-14 06:47:49,483:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVpbnJBNDdiWDBuOHkyVlNEd1RhQllaVk5pc25LNWlYX0tqV0VUUWE1UkdNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "V5z8CmEMaffRI9ikCSdZYuTFuXUuMfGNYvzHIqLcX7-nQienDzUQ7g_367nFTdPd1rr-Gd5j3361LDOX_PEmvrUnLjsJlgzC8ThJkz1KCmA14g4DXM-Q7bT9mjQYeg6ewhpCZqLMt_lrUZ7VC08Y_Zi3GPZzZ2Y5SY9VjcxoVHFl3qDlGEFdoXSDUwBKy1DQh3zpMrOnj3qq_5SYlB_tUUpp9dhTieeA6hQXD_9A86vXfbcIHd1fGBXcz-0mKDNUpBmZNCiuXG44Dml7fnd10XAtN-mlFhaxu4e5JgkphFBIen4W6wKQr8oS1LzwKy8728taOCKhGsI4SQjUb8qWUA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-14 06:47:49,666:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-02-14 06:47:49,667:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 14 Feb 2024 05:47:48 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256417567 Replay-Nonce: HWHXB1ulA2VyKxXJC5zbxNYmUS64xG0Hj-u4LaWmMffRs2tzHHw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:26Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540637387" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256417567" } 2024-02-14 06:47:49,668:DEBUG:acme.client:Storing nonce: HWHXB1ulA2VyKxXJC5zbxNYmUS64xG0Hj-u4LaWmMffRs2tzHHw 2024-02-14 06:47:49,668:DEBUG:acme.client:JWS payload: b'' 2024-02-14 06:47:49,681:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540637387: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWxBMlZ5S3hYSkM1emJ4TlltVVM2NHhHMEhqLXU0TGFXbU1mZlJzMnR6SEh3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA2MzczODcifQ", "signature": "o9X1s0ePA4mluvDmGKbRtGZtgG-0aUDKCv3Y-eAYJrRWzeKbcd1Zrs2jZ7AGRd1e_U3dqsWVCICMVjCZb0laJY3HGo8i3RrpBeEAv8srhhC_Cj7KerU9X6UUSWepHDBYpVxiy8vuB-ewz8IkI-mzgS05MMvZG-H0Vq1ytMyWw7sJ5eDCYzc04EIPY3cBf0l1WAjJIop3HwI67qJaobDABmeeHIdodrh2iI3-dolkdkkwpqAYSgde3RZofv5HzMKwZv_qbJetRqWqTooSQ_FmmfJR3TjdRGjs19FE15rE8UCIPE7CfJbdEkHDml_to06u0w6PW6Ii8Pm4kT-HiOff4w", "payload": "" } 2024-02-14 06:47:49,860:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540637387 HTTP/1.1" 200 809 2024-02-14 06:47:49,860:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:47:49 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ul1GcaeTc2xLf9OaHoaE_Pgc1R3dXGrOi81GT_IXQLSJU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:26Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540637387/K5ceNg", "token": "rQDo_fbJZ77G_xMXzDNJ8BgUZelHjyXDE6-SuLThQZ0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540637387/h5pTLw", "token": "rQDo_fbJZ77G_xMXzDNJ8BgUZelHjyXDE6-SuLThQZ0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540637387/S75ZSA", "token": "rQDo_fbJZ77G_xMXzDNJ8BgUZelHjyXDE6-SuLThQZ0" } ] } 2024-02-14 06:47:49,860:DEBUG:acme.client:Storing nonce: HWHXB1ul1GcaeTc2xLf9OaHoaE_Pgc1R3dXGrOi81GT_IXQLSJU 2024-02-14 06:47:49,860:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-14 06:47:49,861:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-02-14 06:47:49,861:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-14 06:47:49,861:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-14 06:47:49,862:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-14 06:47:49,862:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-14 06:47:49,862:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-14 06:47:49,863:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-14 06:47:49,864:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-14 06:47:49,911:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-14 06:47:50,105:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-14 06:47:50,106:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-14 06:47:50,107:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-14 06:47:50,115:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:50 UTC. 2024-02-14 06:47:50,115:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-14 06:47:50,115:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-14 06:47:50,120:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-14 06:47:50,121:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-14 06:47:50,121:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-14 06:47:50,136:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-14 06:47:50,137:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-14 06:47:50,139:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-14 06:47:50,596:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-14 06:47:50,598:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:47:49 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "udKZzrbXuMQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-02-14 06:47:50,599:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-14 06:47:55,136:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7590_key-certbot.pem 2024-02-14 06:47:58,921:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7588_csr-certbot.pem 2024-02-14 06:47:58,921:DEBUG:acme.client:Requesting fresh nonce 2024-02-14 06:47:58,922:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-14 06:47:59,078:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-14 06:47:59,079:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:47:58 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1uldAVSMKhNc4JHWC8EJ9CHYR3GECfrc8rPL5lGb7PB0W8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-14 06:47:59,079:DEBUG:acme.client:Storing nonce: HWHXB1uldAVSMKhNc4JHWC8EJ9CHYR3GECfrc8rPL5lGb7PB0W8 2024-02-14 06:47:59,080:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-02-14 06:47:59,088:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWxkQVZTTUtoTmM0SkhXQzhFSjlDSFlSM0dFQ2ZyYzhyUEw1bEdiN1BCMFc4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ploH_-n5VGyGXJreC1PuoZ9ugtLiG5HeD-x1ez-5Z9Djy3AkC6ciQ8a7FRoJo2iCqEVq7cfoNDUCIozVUIsIRA4ZtBNIH-TyzOTjxdcn7Zhl3ye8wuXgriMg5LtijWRnph1dfpfCPEofXNeaiEtL-kBhZ3sEol4ty-uDR8SYVDpWsC9D44PsPlDebbQrzgB8D8K6fvsakea32mMY3ltHqbda7C7Hvf2GtvzWh1PTT6hsJlCCejxiuXxhwREApyZT6bHiarAdnDsuoPJX-Qqk_jgzCbohQWSFwRcmXSMx_f5Bg_Yxsfj8Y8UIQicUUecypzOQM-tGTYvr2sofNntGnQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-14 06:47:59,272:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-02-14 06:47:59,273:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 14 Feb 2024 05:47:58 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256441417 Replay-Nonce: 6HUcA-o5Ps5SYcegF0QhBFQ2eIWHD2S2dN53-zJUKugB7CZcQUY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:36Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540672207" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256441417" } 2024-02-14 06:47:59,273:DEBUG:acme.client:Storing nonce: 6HUcA-o5Ps5SYcegF0QhBFQ2eIWHD2S2dN53-zJUKugB7CZcQUY 2024-02-14 06:47:59,273:DEBUG:acme.client:JWS payload: b'' 2024-02-14 06:47:59,278:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540672207: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVQczVTWWNlZ0YwUWhCRlEyZUlXSEQyUzJkTjUzLXpKVUt1Z0I3Q1pjUVVZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA2NzIyMDcifQ", "signature": "hFU7EELg0KaEO7IzRo2-2PKpEV1X58s3i1iKchNd7ogI0HCkuGQs5QfrXlIRXkEywTzO4p_Lqs__j9rtrmwZEdkN_yIOnfZcvLn7vTL6-N1EqteqZhU4fr-Q7Nr-_bvXD69LFB1Keo3pPGn8xORweE2pOROB1BGM5OQyWNw5gJfGezey5zJvtGeGgh79IvgTcaTY8mciGsvug_Wg19nsMwH7tNvb1eP05VImArZFDPKMANARr6ND8uhMssYZGbr3hEIyiNgSUnt4rBW045yQF61W_JYTO12i2d25C_MHCbyz_KUAOYmgeE0JeYAEC5iMMBfAiMJBLKieK5RdSjVbcA", "payload": "" } 2024-02-14 06:47:59,453:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540672207 HTTP/1.1" 200 806 2024-02-14 06:47:59,454:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:47:58 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o5sghZh8h9CxgDyAh7dHv3nMii8eo0ttXZBZQbSnOOPdY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:36Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540672207/cHbPmQ", "token": "qjTrRwnMu8erDJdXc4snHnVEqSIvVb96brAl4wm-Ifo" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540672207/w9R_yw", "token": "qjTrRwnMu8erDJdXc4snHnVEqSIvVb96brAl4wm-Ifo" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540672207/Hm4ubg", "token": "qjTrRwnMu8erDJdXc4snHnVEqSIvVb96brAl4wm-Ifo" } ] } 2024-02-14 06:47:59,455:DEBUG:acme.client:Storing nonce: 6HUcA-o5sghZh8h9CxgDyAh7dHv3nMii8eo0ttXZBZQbSnOOPdY 2024-02-14 06:47:59,456:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-14 06:47:59,457:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-02-14 06:47:59,458:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-14 06:47:59,459:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-14 06:47:59,459:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-14 06:47:59,460:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-14 06:47:59,460:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-14 06:47:59,460:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-14 06:47:59,461:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-14 06:47:59,506:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-02-14 06:47:59,506:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-14 06:47:59,507:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-02-14 06:47:59,514:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-02-14 06:47:59,515:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-02-14 06:47:59,516:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-02-14 06:47:59,516:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-02-14 06:47:59,516:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-02-14 06:47:59,518:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-02-14 06:47:59,556:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-14 06:47:59,728:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-14 06:47:59,729:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-14 06:47:59,730:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-14 06:47:59,734:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:07 UTC. 2024-02-14 06:47:59,734:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-14 06:47:59,735:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-14 06:47:59,740:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-14 06:47:59,740:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-14 06:47:59,740:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-14 06:47:59,745:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-14 06:47:59,746:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-14 06:47:59,748:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-14 06:48:00,205:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-14 06:48:00,206:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:47:59 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "4HupYsakBcY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-14 06:48:00,207:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-14 06:48:04,289:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7591_key-certbot.pem 2024-02-14 06:48:08,252:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7589_csr-certbot.pem 2024-02-14 06:48:08,253:DEBUG:acme.client:Requesting fresh nonce 2024-02-14 06:48:08,253:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-14 06:48:08,405:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-14 06:48:08,406:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:48:07 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o5vaB5AP3YQHXGEJ7cOUmAUTkh1kOpdwf8kdWSHESf1as X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-14 06:48:08,406:DEBUG:acme.client:Storing nonce: 6HUcA-o5vaB5AP3YQHXGEJ7cOUmAUTkh1kOpdwf8kdWSHESf1as 2024-02-14 06:48:08,407:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-02-14 06:48:08,414:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzV2YUI1QVAzWVFIWEdFSjdjT1VtQVVUa2gxa09wZHdmOGtkV1NIRVNmMWFzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "JL9X4DROXAt495zehKONKbR39eZ56Qg2C7mUkW4_NeyXsRq8oo1b8-h6jrLdmQwGPtl9fOlz4hUGFilIfpJHeKn_a86JZmV8V2awn81GPO-M6rB9zGJhkKOJQgP0tzEPXw7rJtR3KuTwEGChPSFmqRukzDq6HcosNsyfmOtFb60DvxEstma4EWUF7EakjKWXGuoWvdNvU6EtIlaZCv_t7KAO3S8W22QSl2Y8pC3tTEc4wssHHM3Ufdooliyf6QjY2ijE3Tl_1eDfo__2KrJOrjTOISMzY983SGi1T55Gpf7X3FBDWboKNGuhdtwHE25dwUzHKJyTjihyzP9Maonjsg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-14 06:48:08,591:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-02-14 06:48:08,593:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 14 Feb 2024 05:48:07 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256462697 Replay-Nonce: HWHXB1uleyeUt4D2Ugnl6ewTpZJi3afGiv3bRxrBgijYJGv0cBo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:45Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540704157" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256462697" } 2024-02-14 06:48:08,593:DEBUG:acme.client:Storing nonce: HWHXB1uleyeUt4D2Ugnl6ewTpZJi3afGiv3bRxrBgijYJGv0cBo 2024-02-14 06:48:08,594:DEBUG:acme.client:JWS payload: b'' 2024-02-14 06:48:08,607:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540704157: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWxleWVVdDREMlVnbmw2ZXdUcFpKaTNhZkdpdjNiUnhyQmdpallKR3YwY0JvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA3MDQxNTcifQ", "signature": "hiHjNNsIIUFKRHeMSlZDXsuhQuLfZxUTnBm31uOstpwfnDMSuPEEguSC_A8Q05WXQ7y5OjXyKR7pafUFwz7RRnkQ6q0zHrJpNb5NQsuK5tLUhb1iCd3rh1nLG6y-4WadTS16mEN3WFvH4UNsa1APS0008em1rn1KO0UTtmjhUgxL1PXlCwBfCGS1A1Pe-UDmaZWcZqDNtKIzqQW11JEYkWBaIE6Dp-C8SohAWfJHHuq1m2ezTOf9YjOXALpGcHR87guxj5jiD2jadds_vd2L1ZY2YKmtL_ARCJfU3QU7zbiD3ZwP5yrqKQD0X29G7hiZG2Ijyeubs8t_wp0zWK2L6Q", "payload": "" } 2024-02-14 06:48:08,767:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540704157 HTTP/1.1" 200 811 2024-02-14 06:48:08,767:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:48:08 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ul9k-UDrZUL_0VaLLDwq2bm6vHJQXu-QHrakdZHJGEVaI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:45Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540704157/62ck5w", "token": "N5OAGNuMlPq5wVogNdMQl67gxh-DN3DOXmuMLJugFCo" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540704157/BJFdnw", "token": "N5OAGNuMlPq5wVogNdMQl67gxh-DN3DOXmuMLJugFCo" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540704157/eTpKlQ", "token": "N5OAGNuMlPq5wVogNdMQl67gxh-DN3DOXmuMLJugFCo" } ] } 2024-02-14 06:48:08,768:DEBUG:acme.client:Storing nonce: HWHXB1ul9k-UDrZUL_0VaLLDwq2bm6vHJQXu-QHrakdZHJGEVaI 2024-02-14 06:48:08,768:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-14 06:48:08,769:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-02-14 06:48:08,769:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-14 06:48:08,770:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-14 06:48:08,771:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-14 06:48:08,772:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-14 06:48:08,772:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-14 06:48:08,773:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-14 06:48:08,774:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-14 06:48:08,810:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-14 06:48:09,026:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-14 06:48:09,028:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-14 06:48:09,030:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-14 06:48:09,034:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:31 UTC. 2024-02-14 06:48:09,034:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-14 06:48:09,034:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-14 06:48:09,038:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-14 06:48:09,038:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-14 06:48:09,038:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-14 06:48:09,054:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-14 06:48:09,055:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-14 06:48:09,057:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-14 06:48:09,520:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-14 06:48:09,521:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:48:08 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "jRKuGc7Un8M": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-14 06:48:09,522:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-14 06:48:13,560:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7592_key-certbot.pem 2024-02-14 06:48:17,297:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7590_csr-certbot.pem 2024-02-14 06:48:17,298:DEBUG:acme.client:Requesting fresh nonce 2024-02-14 06:48:17,298:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-14 06:48:17,452:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-14 06:48:17,453:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:48:16 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o54ZX0HP_P_eciumFakldOX5DrPC_PV7KQxuSOIXs7wxg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-14 06:48:17,453:DEBUG:acme.client:Storing nonce: 6HUcA-o54ZX0HP_P_eciumFakldOX5DrPC_PV7KQxuSOIXs7wxg 2024-02-14 06:48:17,454:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-02-14 06:48:17,461:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzU0WlgwSFBfUF9lY2l1bUZha2xkT1g1RHJQQ19QVjdLUXh1U09JWHM3d3hnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "W1UKH-LnKQqsMNOCNVOdzCtsk6jIFsG5ZwiyAv6VSShD0OCwDWR58lmxmVI6gggFBMit-5kNyhGwKlkq9Jy289MOtYGgEFxDc_lhMAseFyPM1gBuuHbM45X2MbOnrUxHgTaQGG1JGhKFEOpyMdCeZ6B1cogKJX2cY_oPJ5H3i2FUF8qNlWQF9B5YMW48GC5VhMhdO17N--ylcUfCmKsrgaf-OUAnqVc8nDSfMj-2Id9TVE6EqhweBw0-1wi8e8_iASWBy4I_WAFbCY_phct8GVyBD6PTZK6R00BAFusS4asbLki9A9qBX7p967Eoe8NOhbh4V8g86PTJhGY1M7N-Hg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-14 06:48:17,624:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-02-14 06:48:17,626:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 14 Feb 2024 05:48:16 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256484587 Replay-Nonce: HWHXB1ulSYgsH0BFUAbjn66mMzCyYNHS9hku9bfxBo4UoFUvAyc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:54Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540734247" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256484587" } 2024-02-14 06:48:17,626:DEBUG:acme.client:Storing nonce: HWHXB1ulSYgsH0BFUAbjn66mMzCyYNHS9hku9bfxBo4UoFUvAyc 2024-02-14 06:48:17,627:DEBUG:acme.client:JWS payload: b'' 2024-02-14 06:48:17,639:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540734247: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWxTWWdzSDBCRlVBYmpuNjZtTXpDeVlOSFM5aGt1OWJmeEJvNFVvRlV2QXljIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA3MzQyNDcifQ", "signature": "Bt5o-jmOBFf0ucoMm2BDnSI0qrwmWgEnDvvSxY34eZvNULaRholPFIQ0YzFh2zmjoN9mDNgWq43t399MvKmVJdrzfcRtG4u1Brf3H2u_IlWqdUbD2WSW5bxbGJpekrvxmI6TkeYYkSEHA7vsRziZR1Z9HiMtUHvyq2amIHiYxywzU4sftPnPTzekCr83sdYNqPUI0z3V1uN7pRUD1TmI-o5sdAJW5ArWoopGQLxq5VqTZpgn-mckJhBuIrDfkDwOEUzLNvKAvVi8WjwGPTO77tmH1dHyzKDDU-r3DQNom6DBYHu3pxry9Q8wijNXtZHqpwmAwMTCyt7AtuBuNguQ9g", "payload": "" } 2024-02-14 06:48:17,801:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540734247 HTTP/1.1" 200 810 2024-02-14 06:48:17,801:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:48:17 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o5lYLO1aotGvlXYTTWULdoRRQZNuZAoGYnSzw4pYdNb2A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:54Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540734247/QhhIwA", "token": "fIJN8ZHL3VyhngYKMiarHrjh5Gae2nH2_mbQusoasGg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540734247/zrc52g", "token": "fIJN8ZHL3VyhngYKMiarHrjh5Gae2nH2_mbQusoasGg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540734247/3Cf07Q", "token": "fIJN8ZHL3VyhngYKMiarHrjh5Gae2nH2_mbQusoasGg" } ] } 2024-02-14 06:48:17,801:DEBUG:acme.client:Storing nonce: 6HUcA-o5lYLO1aotGvlXYTTWULdoRRQZNuZAoGYnSzw4pYdNb2A 2024-02-14 06:48:17,801:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-14 06:48:17,802:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-02-14 06:48:17,803:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-14 06:48:17,803:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-14 06:48:17,804:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-14 06:48:17,804:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-14 06:48:17,804:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-14 06:48:17,805:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-14 06:48:17,806:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-14 06:48:17,853:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-14 06:48:18,347:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-14 06:48:18,350:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-02-14 06:48:18,351:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-02-14 06:48:18,358:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:09 UTC. 2024-02-14 06:48:18,359:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-14 06:48:18,359:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-14 06:48:18,364:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-14 06:48:18,364:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-14 06:48:18,364:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-14 06:48:18,369:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-14 06:48:18,370:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-14 06:48:18,373:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-14 06:48:18,836:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-14 06:48:18,837:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:48:18 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "McuXKwSdv4U": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-14 06:48:18,838:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-14 06:48:22,701:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7593_key-certbot.pem 2024-02-14 06:48:26,453:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7591_csr-certbot.pem 2024-02-14 06:48:26,454:DEBUG:acme.client:Requesting fresh nonce 2024-02-14 06:48:26,454:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-14 06:48:26,607:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-14 06:48:26,608:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:48:25 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o5lFEPCpqm8d_67CW92HertYf4t5SrIjTBJwTXsoGHe_o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-14 06:48:26,608:DEBUG:acme.client:Storing nonce: 6HUcA-o5lFEPCpqm8d_67CW92HertYf4t5SrIjTBJwTXsoGHe_o 2024-02-14 06:48:26,609:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-02-14 06:48:26,623:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVsRkVQQ3BxbThkXzY3Q1c5MkhlcnRZZjR0NVNySWpUQkp3VFhzb0dIZV9vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "jVaqwtssc-ntK-Y6fo9vhOcCzuzgPusao1h0p_by2BobSJNMAyg7tNZ6w0ZyDE7Vqtis4k_32CEZIknN2QDi8V2c2HliiNadGBskSoKlloWLMLxlDjpFP-l2lFgkiVMlwb7-2S-MZ22QSwk9oWTUSVUSfnG47Qfv72Knmhu91obSKZgtS8TgCyp8SlXXGySpeeWvOKmNXPVooq186fwAXj5wi05mMSF5znl7bua90xS45X5WtOzZBbRVcQb0QDieP4iEXWYAUtcGg2Wzh7uPeOrt9J1XMO99J57OmOQMMaS9iDanEcfwisQXHEEf_Mn3EZNlAHMvZMdPTsE_RNwzKw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-14 06:48:26,800:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-02-14 06:48:26,801:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 14 Feb 2024 05:48:26 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256513597 Replay-Nonce: 6HUcA-o5nqpgBMtN7-MuZdWd9S9b4kEJyGCxNeMEFVks3VWsHTs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:28:03Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540772027" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256513597" } 2024-02-14 06:48:26,801:DEBUG:acme.client:Storing nonce: 6HUcA-o5nqpgBMtN7-MuZdWd9S9b4kEJyGCxNeMEFVks3VWsHTs 2024-02-14 06:48:26,801:DEBUG:acme.client:JWS payload: b'' 2024-02-14 06:48:26,806:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540772027: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVucXBnQk10TjctTXVaZFdkOVM5YjRrRUp5R0N4TmVNRUZWa3MzVldzSFRzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA3NzIwMjcifQ", "signature": "ZaXLmhc8KyXwqK45ot9vKu_bRguKzK9aoIjpFLQrs0xZKADBpKi9J4JHvKJqPyTt3jr5PvurC2OWaHpv-5Yo4Acb1MmGBIBqGB1njt5SLmghB7eX-OGREmkJqhivnmMqMc06YCP4RYZBvNg1t6pBF1Gj4wNk_O0SMKy0LDfopy7BeS5ahZnMh70swiMsCxjXUfmEvHWO7QsTvNIBPEEzr4GYAkgUlvQf15ji_dvCRtSmfMRgAVdmUcf1HVimdB7qH_6xfwi162yZlSXx1y4rGMiH6WMfYnAe-mph4kE2Lj2I9daMeNHL21uoUuNh00U8zqT6Dacp2DPYOv35fvvSgg", "payload": "" } 2024-02-14 06:48:26,964:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540772027 HTTP/1.1" 200 809 2024-02-14 06:48:26,964:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:48:26 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o5B8GvXIN7O4O21aMjfJPs43tiqdfu-_1y7Pvwc8cD5U0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:28:03Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540772027/6vejxw", "token": "dx8dAtRrvWZPG_3QR_npx78MSNAxtOyiO70IZr2x6Iw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540772027/m1WT-w", "token": "dx8dAtRrvWZPG_3QR_npx78MSNAxtOyiO70IZr2x6Iw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540772027/53Jzvw", "token": "dx8dAtRrvWZPG_3QR_npx78MSNAxtOyiO70IZr2x6Iw" } ] } 2024-02-14 06:48:26,965:DEBUG:acme.client:Storing nonce: 6HUcA-o5B8GvXIN7O4O21aMjfJPs43tiqdfu-_1y7Pvwc8cD5U0 2024-02-14 06:48:26,965:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-14 06:48:26,966:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-02-14 06:48:26,966:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-14 06:48:26,966:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-14 06:48:26,967:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-14 06:48:26,967:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-14 06:48:26,967:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-14 06:48:26,968:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-14 06:48:26,969:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-14 06:48:27,010:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-14 06:48:27,269:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-14 06:48:27,270:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is signed by the certificate's issuer. 2024-02-14 06:48:27,271:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD 2024-02-14 06:48:27,275:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:26 UTC. 2024-02-14 06:48:27,275:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-14 06:48:27,276:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-14 06:48:27,280:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-14 06:48:27,280:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-14 06:48:27,280:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-14 06:48:27,285:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-14 06:48:27,285:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-14 06:48:27,288:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-14 06:48:27,877:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-14 06:48:27,878:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:48:27 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Tl_aLH6RbJw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-14 06:48:27,878:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-14 06:48:31,818:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7594_key-certbot.pem 2024-02-14 06:48:35,654:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7592_csr-certbot.pem 2024-02-14 06:48:35,654:DEBUG:acme.client:Requesting fresh nonce 2024-02-14 06:48:35,654:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-14 06:48:35,836:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-14 06:48:35,837:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:48:35 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 63lPIS7zMvYTWZj1ENiwZrkKB1XtqDYOrAciUp6TmdwAfKfTUw4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-14 06:48:35,838:DEBUG:acme.client:Storing nonce: 63lPIS7zMvYTWZj1ENiwZrkKB1XtqDYOrAciUp6TmdwAfKfTUw4 2024-02-14 06:48:35,839:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-02-14 06:48:35,851:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3pNdllUV1pqMUVOaXdacmtLQjFYdHFEWU9yQWNpVXA2VG1kd0FmS2ZUVXc0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "NmwoHaIf_jFEYvllpihHODhJhlzI7vvfz6C_pbUZ4UMd2FfCyKVBXLUp8Eu8wl3fEpxvlOc_c29oU2F8yv1yQ2S8RvYIw8-_qnZc5vjBmEYDjGLln0U7yhRZTzgXDMU5ij2yn8dc2PNynYrJB6QPnBNpGuleQl2127A-FLBIetoBrAFx8hK9HhBYJH1EWY-us4WreDYC8aRX156plCQWKodfMzhn9JAOmX3XAmAJvhOVN3cuoKTu7alhpokXHjo6VU58SYewPqxcoG1QQMYudzFGP_o9F_FJ7UjJjmN0lOP3UjYDx1P2jiAncQnG1nYDWXH3WwMxF8ACbQFq__T0rw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-14 06:48:36,043:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-14 06:48:36,043:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 14 Feb 2024 05:48:35 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256544587 Replay-Nonce: HpY91-GpturBrdKf-9IWcRgnB3zQklowxD3CRFss8FAYPmOGQ84 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:28:13Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540813967" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256544587" } 2024-02-14 06:48:36,044:DEBUG:acme.client:Storing nonce: HpY91-GpturBrdKf-9IWcRgnB3zQklowxD3CRFss8FAYPmOGQ84 2024-02-14 06:48:36,044:DEBUG:acme.client:JWS payload: b'' 2024-02-14 06:48:36,051:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540813967: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3B0dXJCcmRLZi05SVdjUmduQjN6UWtsb3d4RDNDUkZzczhGQVlQbU9HUTg0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA4MTM5NjcifQ", "signature": "tk5rSEnrofgvwUHkbilQVrNlYTi5MOSHHa1tgaJdMM4gjzjJ4gk5Hjg0EI933CWvYvmWkHrv0oLhXcmHmXkRljD74lVHsVkThW8EoPcrR3nPOwJ15vXN7XOwkj_b1xsp1UwbN2DKBL4LkIY8LhMClEN1P72MQkxmrXg8VvdX3kYKPCo-DpPgJSU1M7pACezismf74XkS1vSKLg2Ad7zDnhTIotxw-ua926VSTS6m2L3tFcFwxwpjC47rrxru1qZv9a-gWnOkp_9eIDt4Av6cCtrnu8dfurQktEg9V_-L7N1hOaG9DmhsTb4qz3ebqBIy9yK2T02aE2i3BproFdfaRg", "payload": "" } 2024-02-14 06:48:36,242:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540813967 HTTP/1.1" 200 805 2024-02-14 06:48:36,244:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:48:35 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 63lPIS7zJfxU5fZRfKUJtUCasS1R_S6-rqRq6C3_TbpKJy7V1JM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:28:13Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540813967/QS3xjQ", "token": "Giw2SKEZArhw1cAd0QrBh2IQ4Gldqfhc9_Txzga0eYM" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540813967/GcxOwg", "token": "Giw2SKEZArhw1cAd0QrBh2IQ4Gldqfhc9_Txzga0eYM" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540813967/pdWHtQ", "token": "Giw2SKEZArhw1cAd0QrBh2IQ4Gldqfhc9_Txzga0eYM" } ] } 2024-02-14 06:48:36,244:DEBUG:acme.client:Storing nonce: 63lPIS7zJfxU5fZRfKUJtUCasS1R_S6-rqRq6C3_TbpKJy7V1JM 2024-02-14 06:48:36,245:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-14 06:48:36,246:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-02-14 06:48:36,247:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-14 06:48:36,247:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-14 06:48:36,248:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-14 06:48:36,248:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-14 06:48:36,248:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-14 06:48:36,249:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-14 06:48:36,251:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-14 06:48:36,299:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-14 06:48:36,472:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-14 06:48:36,474:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-14 06:48:36,475:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-14 06:48:36,481:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:43 UTC. 2024-02-14 06:48:36,481:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-14 06:48:36,482:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-14 06:48:36,486:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-14 06:48:36,486:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-14 06:48:36,486:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-14 06:48:36,491:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-14 06:48:36,492:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-14 06:48:36,493:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-14 06:48:36,954:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-14 06:48:36,955:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:48:36 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "IrbdBaPwJuU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-14 06:48:36,955:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-14 06:48:41,200:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7595_key-certbot.pem 2024-02-14 06:48:45,039:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7593_csr-certbot.pem 2024-02-14 06:48:45,040:DEBUG:acme.client:Requesting fresh nonce 2024-02-14 06:48:45,040:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-14 06:48:45,196:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-14 06:48:45,197:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:48:44 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ulpx-2g4F9iHRNuSviR17ipuOwsCABxn_txsfGoE9ovM4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-14 06:48:45,197:DEBUG:acme.client:Storing nonce: HWHXB1ulpx-2g4F9iHRNuSviR17ipuOwsCABxn_txsfGoE9ovM4 2024-02-14 06:48:45,197:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-02-14 06:48:45,206:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWxweC0yZzRGOWlIUk51U3ZpUjE3aXB1T3dzQ0FCeG5fdHhzZkdvRTlvdk00IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "l5oIdWOI9GGvfjqpS7SZ0aos-BKHGy-_iwPxNlS_o5JCRD5NUUgKNarw-2_XcrPGgVClVb_UU1ve8Sjw6phOAHF8_kc_2pIezAqpFN0H9sT9UDAZqcA0bxofV1Go84Sc72yl7doTEr8XouZWajJWHsvAvmpPJmvCWJecjjkZdmYNdKnOrmtecIQkwEyUZHC_MBY4EaRzV3YBLaMsXmBLJZvemjyViLopxi1u-Thwe1tkEeloEM11B1cgB8f0WWS6sfG8mZykHlkOVn9SMx0rIJRpqZgLc0zQqkIPmSgtGQxgfLRX-LNiP8YGF4mOZj_XShvyM_PWvbvTtuiIeVZxEQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-14 06:48:45,380:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-14 06:48:45,381:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 14 Feb 2024 05:48:44 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256570667 Replay-Nonce: 6HUcA-o5VfCveog0EproWoP2qB2h05E8oRr4u6SmPUOhPgcy9t0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:28:22Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540850567" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256570667" } 2024-02-14 06:48:45,382:DEBUG:acme.client:Storing nonce: 6HUcA-o5VfCveog0EproWoP2qB2h05E8oRr4u6SmPUOhPgcy9t0 2024-02-14 06:48:45,383:DEBUG:acme.client:JWS payload: b'' 2024-02-14 06:48:45,393:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540850567: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVWZkN2ZW9nMEVwcm9Xb1AycUIyaDA1RThvUnI0dTZTbVBVT2hQZ2N5OXQwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA4NTA1NjcifQ", "signature": "LxgcUvE4SX0zYHCaYCbRT5WehldWVg5ulqjouzYNpqUlRwkJmZgbijViLyS7KLMnk6wKB_JAVHv_anJTSSjCpRSdo3zr4fKOk-HoO-UbJdkLgRaLqFV50GVtiYAi6--3o-H7V6FtKxKAi1F-1ZCHV-tC85AyOW6lOtaQDAmIWEgQxtaBi8QhL_7UOfdqqO9qrlptahSw4ns8I3N1fm9WuW_6uewNzcC03kv33TWWHTxslqze5R-nUb1bc3F7GOuo6ysw4G5oUhMp9dDdHSkRFXp7SfirEGLTvb0TZ71IH5i69OgQQxHW1RcU8_6eYY2hECrDJDw0fNQDi3KAGBzHmQ", "payload": "" } 2024-02-14 06:48:45,571:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540850567 HTTP/1.1" 200 805 2024-02-14 06:48:45,573:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:48:44 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ulY8HFhQmJ9ShpE4txlhlUgpBnM8AM3JPMYUULxO8R1SE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:28:22Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540850567/9KsoFg", "token": "F_vhJNcuPiQNg87Bt2dXah4EyIxvrvDquKYXpvMqAbQ" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540850567/qRG9hA", "token": "F_vhJNcuPiQNg87Bt2dXah4EyIxvrvDquKYXpvMqAbQ" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540850567/TwBIlQ", "token": "F_vhJNcuPiQNg87Bt2dXah4EyIxvrvDquKYXpvMqAbQ" } ] } 2024-02-14 06:48:45,573:DEBUG:acme.client:Storing nonce: HWHXB1ulY8HFhQmJ9ShpE4txlhlUgpBnM8AM3JPMYUULxO8R1SE 2024-02-14 06:48:45,574:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-14 06:48:45,575:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-02-14 06:48:45,576:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-14 06:48:45,576:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-14 06:48:45,577:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-14 06:48:45,577:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-14 06:48:45,577:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-14 06:48:45,578:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-14 06:48:45,581:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-14 06:48:45,629:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-14 06:48:45,653:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-14 06:48:45,655:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-14 06:48:45,655:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-14 06:48:45,659:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:40:02 UTC. 2024-02-14 06:48:45,660:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-14 06:48:45,660:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-14 06:48:45,665:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-14 06:48:45,665:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-14 06:48:45,665:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-14 06:48:45,669:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-14 06:48:45,670:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-14 06:48:45,672:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-14 06:48:46,214:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-14 06:48:46,216:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:48:45 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "ynkhst7u398": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-02-14 06:48:46,217:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-14 06:48:50,321:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7596_key-certbot.pem 2024-02-14 06:48:54,122:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7594_csr-certbot.pem 2024-02-14 06:48:54,123:DEBUG:acme.client:Requesting fresh nonce 2024-02-14 06:48:54,123:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-14 06:48:54,304:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-14 06:48:54,305:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:48:53 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GpzOxNI9rmg4gLOoRjEbWEv80wMR-rYkgxr5HXZf2BzaU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-14 06:48:54,306:DEBUG:acme.client:Storing nonce: HpY91-GpzOxNI9rmg4gLOoRjEbWEv80wMR-rYkgxr5HXZf2BzaU 2024-02-14 06:48:54,306:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-02-14 06:48:54,317:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3B6T3hOSTlybWc0Z0xPb1JqRWJXRXY4MHdNUi1yWWtneHI1SFhaZjJCemFVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "guxDJU2lLRC0sZgOxlN8T_FADd8pnUB8r_tH_yaSLkEIQqKRKlM_LImSzlIMBIeHwyvh89hNfniNCipDmq3xLVWEjZz-880_uK0SGZguwMad7tuCCrha4giERGa9LQz6Ya60a345rdT5gg6z_BpyUH8yNb_GnVzR9cl1KfITK7hgf2J63FHqsE-lmVu2xpKsWaLE6HTorJcYsd6UxKs9vZP0qfI2bGTwhhNUryOI6-OctbjTFjXJwSCe3WUxFouGazo-XpRntAseKQ2OTZP3bFz-Z3HUSOLvne_LuMM5F-SL2_ivBhHFgg_24x-Y8hh2kUp1vrrSSstYP5aTpmUifA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-14 06:48:54,585:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-14 06:48:54,586:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 14 Feb 2024 05:48:53 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256595137 Replay-Nonce: 63lPIS7zPMKcG3UcKSMGLUDcAjoMEwatSbWIBcxC8OLRyQW8z9g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:28:31Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540885967" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256595137" } 2024-02-14 06:48:54,586:DEBUG:acme.client:Storing nonce: 63lPIS7zPMKcG3UcKSMGLUDcAjoMEwatSbWIBcxC8OLRyQW8z9g 2024-02-14 06:48:54,586:DEBUG:acme.client:JWS payload: b'' 2024-02-14 06:48:54,599:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540885967: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3pQTUtjRzNVY0tTTUdMVURjQWpvTUV3YXRTYldJQmN4QzhPTFJ5UVc4ejlnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA4ODU5NjcifQ", "signature": "ln83sMGrubmUx7aSgo_M-zNzt3a6zKWL4bn4aTFg2y3I842ao_NM3DdVqsv7JAlEj5MkrIeKfYV9Z2Y48akqySQomHN2sRaGaod9TvaBF8xGycKFdMKTGQS4mljMr9vLnn5gfsWGj7g8Zh-UwzP44lBZyCQkFPXizVubco9RZG51haPPxLG1kI_AOGQ2zEcQ2cj8AkkNSJiJs9jo2aSygXf-VsFfWYEEbfdB1cbj_tsqZTCPnQEafjQb63it6vJNq4MKq8kTVzgHRKHoqh2JMQ6qdtawrrnl5NbI1sNa6s4eztxTbenyTYO-3d_FYwoqnoqxmUrwEwD0aYT9xgCugg", "payload": "" } 2024-02-14 06:48:54,796:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540885967 HTTP/1.1" 200 805 2024-02-14 06:48:54,797:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 14 Feb 2024 05:48:54 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-Gp8JFnRLADFKbNuWchzau3sYccj_Xc24hPwKtEdLMnMiU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:28:31Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540885967/OUXDhQ", "token": "M6pE59XecoDIFeZmQ2fOLVruWYIn_qwzTAv5ez_ACcw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540885967/gxpKtA", "token": "M6pE59XecoDIFeZmQ2fOLVruWYIn_qwzTAv5ez_ACcw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540885967/ovBk4w", "token": "M6pE59XecoDIFeZmQ2fOLVruWYIn_qwzTAv5ez_ACcw" } ] } 2024-02-14 06:48:54,797:DEBUG:acme.client:Storing nonce: HpY91-Gp8JFnRLADFKbNuWchzau3sYccj_Xc24hPwKtEdLMnMiU 2024-02-14 06:48:54,798:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-14 06:48:54,798:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-02-14 06:48:54,799:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-14 06:48:54,799:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-14 06:48:54,800:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-14 06:48:54,800:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-14 06:48:54,800:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-14 06:48:54,800:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-14 06:48:54,800:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-14 06:48:54,800:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-02-14 06:48:54,801:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-02-14 06:48:54,812:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-02-14 06:48:54,813:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)