2024-02-13 14:26:08,026:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-02-13 14:26:08,026:DEBUG:certbot._internal.main:Arguments: [] 2024-02-13 14:26:08,026:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-02-13 14:26:08,806:DEBUG:certbot._internal.log:Root logging level set at 20 2024-02-13 14:26:08,806:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-02-13 14:26:08,843:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-02-13 14:26:08,882:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-13 14:26:09,076:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-13 14:26:09,079:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is signed by the certificate's issuer. 2024-02-13 14:26:09,087:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is: OCSPCertStatus.GOOD 2024-02-13 14:26:09,099:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:15 UTC. 2024-02-13 14:26:09,099:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-13 14:26:09,099:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-13 14:26:09,104:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-13 14:26:09,104:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-13 14:26:09,105:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-13 14:26:09,110:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-13 14:26:09,111:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-13 14:26:09,115:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-13 14:26:09,592:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-13 14:26:09,594:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:26:09 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "HABiY5cugyM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-13 14:26:09,595:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-13 14:26:14,013:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7571_key-certbot.pem 2024-02-13 14:26:18,131:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7569_csr-certbot.pem 2024-02-13 14:26:18,131:DEBUG:acme.client:Requesting fresh nonce 2024-02-13 14:26:18,132:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-13 14:26:18,281:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-13 14:26:18,282:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:26:18 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o53BeKSYsXh12e-zyr87sO3dXnFXPT1FuBJOZR6edWpbA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-13 14:26:18,282:DEBUG:acme.client:Storing nonce: 6HUcA-o53BeKSYsXh12e-zyr87sO3dXnFXPT1FuBJOZR6edWpbA 2024-02-13 14:26:18,282:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-02-13 14:26:18,288:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzUzQmVLU1lzWGgxMmUtenlyODdzTzNkWG5GWFBUMUZ1QkpPWlI2ZWRXcGJBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "E8O9bdglRk4Td8kJe86lGqR_3pqsRcgBbeVKgTFuww7432loHPPOsHwlvnNTZ2czZaZ5hegq-YXIlIhjTLvARydjq8qx91JkV7rSu7mQaMnNRTGdQh5KMnwFU4Prz7KPAvISjUgX4iPRn6uxDsYKUDtMwG4vsz2jPNY_lWOHFSCbaDsx79AOzEeGU90NdUKiqKzvZJALvSsn_UEc7F2rOc6GIjr576Wo_LqYgbbSPU6KJbXSWVJLNIaXYGgya9qISTjtkMdJPAmfC2rSaTm68eUpDV_91GEnSgTPX8rcZRAxd_LvVoZztt4wATiHCZG42F936_3TURk1r_U2o8qE4w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-13 14:26:18,521:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-02-13 14:26:18,522:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 13 Feb 2024 13:26:18 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256281307 Replay-Nonce: 6HUcA-o53tTH0SMx6kTUdUdryAqaLQWG1Ry75Nl6lYperbCkXjM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:26:39Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540442217" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256281307" } 2024-02-13 14:26:18,523:DEBUG:acme.client:Storing nonce: 6HUcA-o53tTH0SMx6kTUdUdryAqaLQWG1Ry75Nl6lYperbCkXjM 2024-02-13 14:26:18,524:DEBUG:acme.client:JWS payload: b'' 2024-02-13 14:26:18,533:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540442217: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzUzdFRIMFNNeDZrVFVkVWRyeUFxYUxRV0cxUnk3NU5sNmxZcGVyYkNrWGpNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA0NDIyMTcifQ", "signature": "Sa5pUdISRloBhx_R37WtQwcq3I4KpV1pMIqL-v4E5Zh77sORwwU2aSzPSNS-HoM0XRsgRx8zdVcJ7uVaombY_Sbn4h2s6WmmG1OvVqyIz3U55GtnYDBA2-Gf_lKPKYowntcp8R4vXSOT7LPXRZ6JZUaYHr_jb1LdT9TyoqhhC4pb-151SAZ-qqoR2ghV3wNUsNlZtlkDrLDHdltPWvXKp6ysgdsf2Yg6anBfjKzbDy0uQRQFFl-PZ4bG0lnRs9-BjsllFIjTcp1VRAO0vOZKZu_WdJR69CfHDiBVFFtbkul07fXYzLjUiRdXCBXkKiafEb6EvLhT-Jva4ROcaXn5QQ", "payload": "" } 2024-02-13 14:26:18,685:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540442217 HTTP/1.1" 200 810 2024-02-13 14:26:18,686:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:26:18 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o5jnO625fBdfvpkFrYhTrNbx38YMzF-CccNQCdjD9meos X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:26:39Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540442217/D1FeaA", "token": "ArP8a0cUi_G3Nbfrk3cNkTx86Kt5iLXDEYthGSw4EUs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540442217/-mx8SQ", "token": "ArP8a0cUi_G3Nbfrk3cNkTx86Kt5iLXDEYthGSw4EUs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540442217/azK9Sg", "token": "ArP8a0cUi_G3Nbfrk3cNkTx86Kt5iLXDEYthGSw4EUs" } ] } 2024-02-13 14:26:18,686:DEBUG:acme.client:Storing nonce: 6HUcA-o5jnO625fBdfvpkFrYhTrNbx38YMzF-CccNQCdjD9meos 2024-02-13 14:26:18,688:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-13 14:26:18,688:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-02-13 14:26:18,689:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-13 14:26:18,690:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-13 14:26:18,704:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-13 14:26:18,704:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-13 14:26:18,705:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-13 14:26:18,705:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-13 14:26:18,711:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-13 14:26:18,749:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-13 14:26:18,909:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-13 14:26:18,911:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-13 14:26:18,913:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-13 14:26:18,923:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:32 UTC. 2024-02-13 14:26:18,923:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-13 14:26:18,924:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-13 14:26:18,930:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-13 14:26:18,930:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-13 14:26:18,930:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-13 14:26:18,933:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-13 14:26:18,934:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-13 14:26:18,936:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-13 14:26:19,481:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-13 14:26:19,483:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:26:19 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "WNZQUEu77Vs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-13 14:26:19,484:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-13 14:26:23,385:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7572_key-certbot.pem 2024-02-13 14:26:27,196:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7570_csr-certbot.pem 2024-02-13 14:26:27,197:DEBUG:acme.client:Requesting fresh nonce 2024-02-13 14:26:27,197:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-13 14:26:27,422:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-13 14:26:27,423:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:26:27 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GpgmxswpSFKutZ0mCU27STDJChlOqz1-Qv2SQkuhC0hKk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-13 14:26:27,423:DEBUG:acme.client:Storing nonce: HpY91-GpgmxswpSFKutZ0mCU27STDJChlOqz1-Qv2SQkuhC0hKk 2024-02-13 14:26:27,424:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-02-13 14:26:27,431:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BnbXhzd3BTRkt1dFowbUNVMjdTVERKQ2hsT3F6MS1RdjJTUWt1aEMwaEtrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "uOIjnfeeo6ftSzHb8_qncF3D5QR7Y8YwVnNKhiM3pZHB7J4mOVKylGHdc0nbLo5b4w2EdXFn8QNzFm4qJeEDOdlfdavDamW1aIbY0106STsVTMcqQ_0hz2xZgSiMyEupLQ17oz4OVpn8FBUIF7XuDuwPkFiSisTxXHTroLy1XMiC-1a_nIeyAf-GpmEsm2_bFGWZukQGFc7m1mMBiSyvJATmxJY5eP0BoEXThf8SjDAqORlDVsK5EKUFDSQPDFunBN5MeKHtvfDN7-OoH1uim4MtSQM4ESMuMngGlX7HVGl96kTokGBi6aMLe6mcMU72N3TB3s5BD00HMAyA52Eg9w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-13 14:26:27,679:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-02-13 14:26:27,680:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 13 Feb 2024 13:26:27 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256306347 Replay-Nonce: 63lPIS7zSx3MKDWAFflPhxsFgA2d9D6FxaynUHwq-vK9HeeJtEg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:26:49Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540477517" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256306347" } 2024-02-13 14:26:27,681:DEBUG:acme.client:Storing nonce: 63lPIS7zSx3MKDWAFflPhxsFgA2d9D6FxaynUHwq-vK9HeeJtEg 2024-02-13 14:26:27,681:DEBUG:acme.client:JWS payload: b'' 2024-02-13 14:26:27,689:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540477517: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3pTeDNNS0RXQUZmbFBoeHNGZ0EyZDlENkZ4YXluVUh3cS12SzlIZWVKdEVnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA0Nzc1MTcifQ", "signature": "vfIG6kwUfUlSejiDfKKpYkB-UXf3hyZpbYxou99IOZCsCuLkfIrcuYPp8mysKaSlYRQfdh_SjaPCvGDSTOg2ql-nnZ9klhsMHR2FCUMEOlZ9rOiaAsLzun93MtGq4y7GcUWMpTZaEc2mc5Sfq3VsE7jwFOGIdBqQOIVC-jYDsQ163HJcom9jeuztRCmkhsEj0c9Iq4Vt1fB-9gxxVKYfPeD5a1CLiQ1mOGJthBkHQUtRI-mPv0rGEqTbuAQQgjYP0pw8aKiP3kxFJ4jUM9eSyagyHtYchVi9Tc3yiMN4nRuLJ3NnLyoPXqoEZ0_LMnRpdVrkUeRlZKzRWIGVAyvw9w", "payload": "" } 2024-02-13 14:26:27,876:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540477517 HTTP/1.1" 200 804 2024-02-13 14:26:27,876:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:26:27 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-Gp-PsfCp063CKdsTcCaDIeMbzPoT8VwkQxfFgR38dBljM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:26:49Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540477517/zBe4Yw", "token": "8iGzASnL30f6Zg4WsWG91mNySkbT6obzDH-O1WlTCYU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540477517/jvutYw", "token": "8iGzASnL30f6Zg4WsWG91mNySkbT6obzDH-O1WlTCYU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540477517/9Dli9w", "token": "8iGzASnL30f6Zg4WsWG91mNySkbT6obzDH-O1WlTCYU" } ] } 2024-02-13 14:26:27,876:DEBUG:acme.client:Storing nonce: HpY91-Gp-PsfCp063CKdsTcCaDIeMbzPoT8VwkQxfFgR38dBljM 2024-02-13 14:26:27,878:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-13 14:26:27,878:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-02-13 14:26:27,879:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-13 14:26:27,880:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-13 14:26:27,881:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-13 14:26:27,881:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-13 14:26:27,881:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-13 14:26:27,881:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-13 14:26:27,882:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-13 14:26:27,920:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-13 14:26:28,193:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-13 14:26:28,195:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-13 14:26:28,196:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-13 14:26:28,200:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:49 UTC. 2024-02-13 14:26:28,200:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-13 14:26:28,201:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-13 14:26:28,205:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-13 14:26:28,206:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-13 14:26:28,206:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-13 14:26:28,220:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-13 14:26:28,220:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-13 14:26:28,222:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-13 14:26:28,759:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-13 14:26:28,760:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:26:28 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "DcNiFd0_Pag": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-13 14:26:28,760:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-13 14:26:32,811:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7573_key-certbot.pem 2024-02-13 14:26:36,619:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7571_csr-certbot.pem 2024-02-13 14:26:36,620:DEBUG:acme.client:Requesting fresh nonce 2024-02-13 14:26:36,620:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-13 14:26:36,797:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-13 14:26:36,798:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:26:36 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-Gp1d9C3FWjxtS0dvnABr2dtSTpo5AxczwyKv9-M7N6KJI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-13 14:26:36,798:DEBUG:acme.client:Storing nonce: HpY91-Gp1d9C3FWjxtS0dvnABr2dtSTpo5AxczwyKv9-M7N6KJI 2024-02-13 14:26:36,798:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-02-13 14:26:36,804:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3AxZDlDM0ZXanh0UzBkdm5BQnIyZHRTVHBvNUF4Y3p3eUt2OS1NN042S0pJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "lt746WQnlhtyZbMFIbCJYpMXrx2IwoMR3broug9flIBZ3M6Aif86QQcTJq5YIQc_hjJK7kwFWB7Vt2VvkESmWNT1-ckjEpfA4kZItSAGeLHVOJvx12X5pNq1n1BkBi2pJPXhotFoYcq9fgZkaf7lSaVWZJmTcX83sYhoqlNubc3xNvjaQ1Ts__cu0HbOYxyfSg11Wm3SInDcvZOry46U9u9F3iH6DE2vAljNIlZoc1RcAUcK4cFY2v4bFBlX0mi5u61Hq2yJ9Rf6v0rlFsleeyNCJixL9QwANzwH7DTJkJ3AD-6ebMB1pSQ4Bv0NTJMbbZOK_1D-1e-fhu6jVnjIjQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-13 14:26:36,991:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-02-13 14:26:36,992:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 13 Feb 2024 13:26:36 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256330697 Replay-Nonce: HpY91-Gpf6CVlZcXpJixH0-OJwjvnpuU9BFXclUNx5OCxqIbr3g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:26:58Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540514237" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256330697" } 2024-02-13 14:26:36,993:DEBUG:acme.client:Storing nonce: HpY91-Gpf6CVlZcXpJixH0-OJwjvnpuU9BFXclUNx5OCxqIbr3g 2024-02-13 14:26:36,993:DEBUG:acme.client:JWS payload: b'' 2024-02-13 14:26:36,999:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540514237: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BmNkNWbFpjWHBKaXhIMC1PSndqdm5wdVU5QkZYY2xVTng1T0N4cUlicjNnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA1MTQyMzcifQ", "signature": "Oj1x_lvEoHoHs1rEEh6gytcTstzj0hpq6sorEAxgZrd2KQE1WIaepePoAESQglB4w_sIoyeWrfkTddCtQ7C1ZdPJrV77Sa7BTeRjusgrz4onTtDEgdNIHRlAI-SNTSmOt9LkDBolO5nd_6DI5lLlcf3iAqA9dxkD6ymPuAPsBy4I_RkoF1fOrX-XvB73qOgoxYJV_7V1dndDgnma4_FTDIMOyRiBlDOUsSz_5DPAced0Au8_crVy2lYPRv3V0wHYCO975weEurnZJPXmqylDZuQ5MLIWibeAkBLawkerRlrLyLLiHsbK3BzP-t5QkmW-BDNtDCGpdats-9QiM7ZqdA", "payload": "" } 2024-02-13 14:26:37,179:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540514237 HTTP/1.1" 200 807 2024-02-13 14:26:37,180:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:26:36 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-Gp1tjqFDE2GbPObRErpc54T2BDTcga1uDHyWpjaX4I0S4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:26:58Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540514237/y7Fh6A", "token": "mx-KJuR3SKsTvFopAHExnS3CQMuuST_PdD5t2ueC7DE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540514237/tfTCJQ", "token": "mx-KJuR3SKsTvFopAHExnS3CQMuuST_PdD5t2ueC7DE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540514237/pbKBOA", "token": "mx-KJuR3SKsTvFopAHExnS3CQMuuST_PdD5t2ueC7DE" } ] } 2024-02-13 14:26:37,181:DEBUG:acme.client:Storing nonce: HpY91-Gp1tjqFDE2GbPObRErpc54T2BDTcga1uDHyWpjaX4I0S4 2024-02-13 14:26:37,182:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-13 14:26:37,183:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-02-13 14:26:37,184:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-13 14:26:37,184:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-13 14:26:37,186:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-13 14:26:37,186:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-13 14:26:37,186:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-13 14:26:37,187:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-13 14:26:37,190:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-13 14:26:37,241:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-13 14:26:37,402:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-13 14:26:37,404:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-13 14:26:37,405:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-13 14:26:37,409:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:03 UTC. 2024-02-13 14:26:37,409:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-13 14:26:37,409:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-13 14:26:37,413:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-13 14:26:37,413:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-13 14:26:37,413:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-13 14:26:37,418:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-13 14:26:37,419:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-13 14:26:37,420:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-13 14:26:37,880:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-13 14:26:37,881:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:26:37 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "rkl0-ygxnnw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-02-13 14:26:37,882:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-13 14:26:41,774:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7574_key-certbot.pem 2024-02-13 14:26:45,615:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7572_csr-certbot.pem 2024-02-13 14:26:45,616:DEBUG:acme.client:Requesting fresh nonce 2024-02-13 14:26:45,616:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-13 14:26:45,768:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-13 14:26:45,769:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:26:45 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o5B7S0Lmp5fbvO-rURecsNmn78DdkCM0oK2ls3S7gi0DY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-13 14:26:45,769:DEBUG:acme.client:Storing nonce: 6HUcA-o5B7S0Lmp5fbvO-rURecsNmn78DdkCM0oK2ls3S7gi0DY 2024-02-13 14:26:45,769:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-02-13 14:26:45,775:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVCN1MwTG1wNWZidk8tclVSZWNzTm1uNzhEZGtDTTBvSzJsczNTN2dpMERZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "LmcKxobAexREqoq-vAt6l3JvFrE5qru8B7hmaFsCMpM_KmPw1X6NRGxaj2sMna9Z6GxK8GeJnNbOXJmINKz1VvVDNWc3GY92VLx3Nfpcj2-0yiNf97CryIZXFpvFwCfS9eISmG6Cy_1qg82jYkk-daqNGfnNKNBzSOZ4JMgBCFralKO1y2yuWw_JnNVXxxk9wsvbayWybbSDfP-TEUZOfD2UNqIcm2o7VbFWrau89vlDNgwGlbNN3LGnVdkk9mrVV4JZP4oUG6MKTLq1-Pq0V2rCb-c4Nw_tdUlylTJX7bqh8bXmReBpZZoajdsAS2l2vui1hoMRgTBKaSUBJoUHqw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-13 14:26:45,938:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-02-13 14:26:45,939:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 13 Feb 2024 13:26:45 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256364097 Replay-Nonce: HWHXB1ulE3_Lff6M-Ezsd_F9BU6asMGrynKiCZTSXUFn_x9V8BY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:07Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540559067" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256364097" } 2024-02-13 14:26:45,940:DEBUG:acme.client:Storing nonce: HWHXB1ulE3_Lff6M-Ezsd_F9BU6asMGrynKiCZTSXUFn_x9V8BY 2024-02-13 14:26:45,940:DEBUG:acme.client:JWS payload: b'' 2024-02-13 14:26:45,945:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540559067: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWxFM19MZmY2TS1FenNkX0Y5QlU2YXNNR3J5bktpQ1pUU1hVRm5feDlWOEJZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA1NTkwNjcifQ", "signature": "gGWPu1ukDpymhpzIQgEDCxT0QeLhyh_g9lMhRMw-LrOjynp1SdcjbBJIA5l7d9DWnrQ0LytEDQP1iQ-79siZkO8bFsNZ5fNbK88h2Sg9CkoCUI2IUr2D-P1NI3B4M7PEq_xozgwDPVyMOVfiDwlIPJAcgzGXvLfg9Hcua5hIJ1PJKSq3a7m5KKhfcmAOOiVLMH6ikFNj-RPpicSUnngOX54F3BwElCG8jGgFhSRwWGfAy0x-1Vis2SZ7cv_wUyOqovbC8BFS1JZy0tGL8RAXlPS148OlKECDqbhjlE5tEhf8l5RxQqSXrQ0855mQrCTa6_l-Hq6sJqURSTPdF9fQwA", "payload": "" } 2024-02-13 14:26:46,107:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540559067 HTTP/1.1" 200 801 2024-02-13 14:26:46,108:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:26:45 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ulUx3YT7sEM3CHiRqP6JGWO4YzIHIWPh378XY32ya0D74 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:07Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540559067/MBQGZA", "token": "Kw5f1Ld0UlE2yvC6ntUu8B8EKWMoB_0Y2UyMCfhmWLw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540559067/Aot2bg", "token": "Kw5f1Ld0UlE2yvC6ntUu8B8EKWMoB_0Y2UyMCfhmWLw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540559067/YelLvw", "token": "Kw5f1Ld0UlE2yvC6ntUu8B8EKWMoB_0Y2UyMCfhmWLw" } ] } 2024-02-13 14:26:46,109:DEBUG:acme.client:Storing nonce: HWHXB1ulUx3YT7sEM3CHiRqP6JGWO4YzIHIWPh378XY32ya0D74 2024-02-13 14:26:46,110:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-13 14:26:46,110:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-02-13 14:26:46,110:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-13 14:26:46,111:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-13 14:26:46,113:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-13 14:26:46,113:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-13 14:26:46,113:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-13 14:26:46,114:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-13 14:26:46,117:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-13 14:26:46,165:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-13 14:26:46,349:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-13 14:26:46,351:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-13 14:26:46,353:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-13 14:26:46,362:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:20 UTC. 2024-02-13 14:26:46,362:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-13 14:26:46,362:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-13 14:26:46,367:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-13 14:26:46,367:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-13 14:26:46,367:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-13 14:26:46,382:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-13 14:26:46,382:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-13 14:26:46,384:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-13 14:26:46,931:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-13 14:26:46,931:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:26:46 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "OWWrZwSMaR0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-13 14:26:46,931:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-13 14:26:50,914:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7575_key-certbot.pem 2024-02-13 14:26:54,722:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7573_csr-certbot.pem 2024-02-13 14:26:54,722:DEBUG:acme.client:Requesting fresh nonce 2024-02-13 14:26:54,722:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-13 14:26:54,902:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-13 14:26:54,903:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:26:54 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 63lPIS7z4FBkLb3hFeLHvNo8Yz2LyOH1-SYhqvNeG4WkBaGpaqU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-13 14:26:54,903:DEBUG:acme.client:Storing nonce: 63lPIS7z4FBkLb3hFeLHvNo8Yz2LyOH1-SYhqvNeG4WkBaGpaqU 2024-02-13 14:26:54,903:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-02-13 14:26:54,909:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3o0RkJrTGIzaEZlTEh2Tm84WXoyTHlPSDEtU1locXZOZUc0V2tCYUdwYXFVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "e9Jr_Sd_CuJrSlClnDdr_gLVlfMisMUyGVFIuubceJzBBUuOj-dstaTCPBpfaaDOWJvyZuiVfV_elqQoR3bpphp4Sr2jJVDKN5cudeVjzL52UDjdM2oA6mulp6UvY-d3OW8nhT5bLx0Zp_okuX_5yWLfLDnuFcL7OUAT3r8Z4FtjHsGAL7kBxYXyMhkkNXp-vBr9cPgCEmdbc3i5d4S63ETb_5915a-hna7Cl3V_bxh35-hix8NLEWUCe3aX5UgEGEh67Q5Bo51QArNLd-rlDoXOTPx4er3QJtyWSI7LyRiURRlyc2IrmPow1OLhYucryMbA4NkRHmIlSWzUSPUW6Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-13 14:26:55,102:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-13 14:26:55,103:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 13 Feb 2024 13:26:54 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256394317 Replay-Nonce: HpY91-GpZ-WeTLbP4cQ0B80OpJmtQljE7lfY433YHRqWzgMwoqE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:17Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540602497" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256394317" } 2024-02-13 14:26:55,104:DEBUG:acme.client:Storing nonce: HpY91-GpZ-WeTLbP4cQ0B80OpJmtQljE7lfY433YHRqWzgMwoqE 2024-02-13 14:26:55,104:DEBUG:acme.client:JWS payload: b'' 2024-02-13 14:26:55,110:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540602497: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BaLVdlVExiUDRjUTBCODBPcEptdFFsakU3bGZZNDMzWUhScVd6Z013b3FFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA2MDI0OTcifQ", "signature": "oe8u9kzwt4-7w2QytsXlA5vLpwrgzQPNjZeFmzoL2FBHb5520JxnpDAd_fVW7vFChZtB9ujbdY6sarkYHC_47e_Y_YSbU-l7xKFH2KMVJwud7O5RYNwNaOPK31TjtEv5NNoK04Wi_7WkoDUfw6KSTUItHuMRbTtO70A-3e1a4Dec4IUqgROOOV3JhMKTVMyiiZ3rwYvf_MBdnan8rOcRbC8Et4kIsAndVk-Vc-Ci-jv0rnLlcFJ_J_z8mqmdJmZSp0g6i5eK8sN0ov2aQRIecPuDPGp422IV15okybjSsJqVdUBHhCVbHzERLHsYXVy_2kILzKR_IaTKSo77aF7lVQ", "payload": "" } 2024-02-13 14:26:55,293:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540602497 HTTP/1.1" 200 805 2024-02-13 14:26:55,294:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:26:55 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GpOrTWRBeietIokI3R9aTtTHg-IazVredKKw8wGmxKHOM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:17Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540602497/miLWNg", "token": "pNE-ffvpsYrp3EBdQk_eowX33MtP5Ibt0VZFfM0Eaxg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540602497/oFvs1Q", "token": "pNE-ffvpsYrp3EBdQk_eowX33MtP5Ibt0VZFfM0Eaxg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540602497/iyA7eA", "token": "pNE-ffvpsYrp3EBdQk_eowX33MtP5Ibt0VZFfM0Eaxg" } ] } 2024-02-13 14:26:55,295:DEBUG:acme.client:Storing nonce: HpY91-GpOrTWRBeietIokI3R9aTtTHg-IazVredKKw8wGmxKHOM 2024-02-13 14:26:55,296:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-13 14:26:55,296:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-02-13 14:26:55,297:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-13 14:26:55,297:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-13 14:26:55,298:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-13 14:26:55,298:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-13 14:26:55,298:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-13 14:26:55,298:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-13 14:26:55,301:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-13 14:26:55,348:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-13 14:26:55,736:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-13 14:26:55,737:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-13 14:26:55,737:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-13 14:26:55,742:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:36 UTC. 2024-02-13 14:26:55,742:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-13 14:26:55,743:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-13 14:26:55,748:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-13 14:26:55,748:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-13 14:26:55,748:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-13 14:26:55,753:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-13 14:26:55,754:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-13 14:26:55,755:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-13 14:26:56,221:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-13 14:26:56,222:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:26:55 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "uNFLjMRfuPw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-02-13 14:26:56,222:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-13 14:27:00,697:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7576_key-certbot.pem 2024-02-13 14:27:04,531:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7574_csr-certbot.pem 2024-02-13 14:27:04,531:DEBUG:acme.client:Requesting fresh nonce 2024-02-13 14:27:04,531:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-13 14:27:04,686:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-13 14:27:04,687:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:27:04 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ul58TNRuYbpAqlyIW3MaSXkAFHJldl0YNO40d_KFEUx58 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-13 14:27:04,688:DEBUG:acme.client:Storing nonce: HWHXB1ul58TNRuYbpAqlyIW3MaSXkAFHJldl0YNO40d_KFEUx58 2024-02-13 14:27:04,688:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-02-13 14:27:04,694:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWw1OFROUnVZYnBBcWx5SVczTWFTWGtBRkhKbGRsMFlOTzQwZF9LRkVVeDU4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "sGJIaLLOa--YRFEKmY7MtUxqc01f37OF6GGPr990pnI9Yogc7zY5X1ywi65Pp7IwBAusSmbmmmZUKQTIhCm506MT4TENFZAhm6HiTZncbwxnsMmkqtSSG_RBUEe0-4SHE38nDqeNdEIUF-rP1XsQtXWI2NoOWzxs2CdW4aC2zJ1P04BWYBmnyPX_4MfMcPyguENA9hatT4yhRT63nSNL1p62WaHQfsgBkCyPcy8nKqD1P70k3pbNMj9iMy-0Q8VvPTQF6KSb60lbN0mxKPCOtuxMySWnzcv9k4N2eJWZB9hiUxmrN3h6d6Q7HeLP57h3VI1tnaL1jNLyB0dDpXyMJQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-13 14:27:04,857:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-02-13 14:27:04,859:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 13 Feb 2024 13:27:04 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256417567 Replay-Nonce: HWHXB1ulOEJE4LnFSqU8xsXkD6KJXYfBeOab3GLKitRrZvsEaOA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:26Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540637387" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256417567" } 2024-02-13 14:27:04,859:DEBUG:acme.client:Storing nonce: HWHXB1ulOEJE4LnFSqU8xsXkD6KJXYfBeOab3GLKitRrZvsEaOA 2024-02-13 14:27:04,860:DEBUG:acme.client:JWS payload: b'' 2024-02-13 14:27:04,872:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540637387: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWxPRUpFNExuRlNxVTh4c1hrRDZLSlhZZkJlT2FiM0dMS2l0UnJadnNFYU9BIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA2MzczODcifQ", "signature": "q5uRwdrIvpcd1NOyzNsbO44JjA6M3QOWsIKkNMv2V5Nf_XnpsMZVf8t0X9iGzMw9CSrjR4CMF7EJFvDaMMV8AdTaN0s09QZZAWP7INAkCTZZdKgMzYNVcaqWyqb7QxSBDpnky-w0NF6rLuksYfoszNrYbhUb-RsQ7-5Z3CwvSln8tB-idTMvXPqYVOOoNlxBJt8uRmeJb0kZiMTz9y0A6JXf_3BrP6yIv9KOF3BIgyJ7vgPIe3KgWR9EUxNDCEyPeuEnX3QYnTseVOnHmuvZmsayIgp21lKrtfdgowSptpi8XC3BTTYB5CVzTns8v6vNgCjBP6X1AwV_he4fDeTVow", "payload": "" } 2024-02-13 14:27:05,096:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540637387 HTTP/1.1" 200 809 2024-02-13 14:27:05,096:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:27:04 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o5UIyKjjQrUhjaNEB9AtbdKAxS-Qpd6gH-zj12cK_t1TI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:26Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540637387/K5ceNg", "token": "rQDo_fbJZ77G_xMXzDNJ8BgUZelHjyXDE6-SuLThQZ0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540637387/h5pTLw", "token": "rQDo_fbJZ77G_xMXzDNJ8BgUZelHjyXDE6-SuLThQZ0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540637387/S75ZSA", "token": "rQDo_fbJZ77G_xMXzDNJ8BgUZelHjyXDE6-SuLThQZ0" } ] } 2024-02-13 14:27:05,096:DEBUG:acme.client:Storing nonce: 6HUcA-o5UIyKjjQrUhjaNEB9AtbdKAxS-Qpd6gH-zj12cK_t1TI 2024-02-13 14:27:05,097:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-13 14:27:05,097:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-02-13 14:27:05,098:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-13 14:27:05,098:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-13 14:27:05,099:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-13 14:27:05,099:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-13 14:27:05,099:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-13 14:27:05,099:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-13 14:27:05,100:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-13 14:27:05,148:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-13 14:27:05,343:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-13 14:27:05,345:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-13 14:27:05,346:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-13 14:27:05,352:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:50 UTC. 2024-02-13 14:27:05,352:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-13 14:27:05,353:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-13 14:27:05,358:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-13 14:27:05,358:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-13 14:27:05,358:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-13 14:27:05,363:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-13 14:27:05,364:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-13 14:27:05,366:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-13 14:27:05,919:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-13 14:27:05,920:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:27:05 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "4wMAnyweEJM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-13 14:27:05,921:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-13 14:27:09,965:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7577_key-certbot.pem 2024-02-13 14:27:13,747:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7575_csr-certbot.pem 2024-02-13 14:27:13,748:DEBUG:acme.client:Requesting fresh nonce 2024-02-13 14:27:13,748:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-13 14:27:13,928:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-13 14:27:13,929:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:27:13 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-Gp1hCEUSiOXownfnZVSOrdEACPC9fyM9Vv7ccXf7h9Srw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-13 14:27:13,930:DEBUG:acme.client:Storing nonce: HpY91-Gp1hCEUSiOXownfnZVSOrdEACPC9fyM9Vv7ccXf7h9Srw 2024-02-13 14:27:13,930:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-02-13 14:27:13,935:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3AxaENFVVNpT1hvd25mblpWU09yZEVBQ1BDOWZ5TTlWdjdjY1hmN2g5U3J3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Fb9aap5n8DRg7Hm-bN1liFBjcNxhyuZiA2nRY2p-kUfOwT4aBG3HmbnZ3KY0q3UlfCmkmAvvkeG1ormytJJg4NpqqY5332V41W8-9aX0BZpk7CsUm0reJycCBicWiMWbTi3y8DhMGv19vsbTf2IxNaWZUoXhOCjlHLIW5yIyCGN7fd12NGjxAiPHbEB-blNYH3-vHdr0l7nFOXsnzMDRIhBMl3PXSzhI7HmSEZ-2uX4FTLJN2XGgvShd3S3IE0OInpplebqyR1woI_kQY7EEMn1OTiMLgIUGZHOKtCve9mUXrE128hUoCXujdmkBe44s01gESeRFmYxna__sGLgxHQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-13 14:27:14,130:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-02-13 14:27:14,132:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 13 Feb 2024 13:27:13 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256441417 Replay-Nonce: 63lPIS7z1W8RS0VsGZaSeOFuSqy4lPC-SQfMa_MKrJe3G69bmkM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:36Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540672207" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256441417" } 2024-02-13 14:27:14,132:DEBUG:acme.client:Storing nonce: 63lPIS7z1W8RS0VsGZaSeOFuSqy4lPC-SQfMa_MKrJe3G69bmkM 2024-02-13 14:27:14,133:DEBUG:acme.client:JWS payload: b'' 2024-02-13 14:27:14,145:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540672207: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3oxVzhSUzBWc0daYVNlT0Z1U3F5NGxQQy1TUWZNYV9NS3JKZTNHNjlibWtNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA2NzIyMDcifQ", "signature": "OPDWz-fcxDvMj9GV456tLthd5_I1iDRZKtxRPask5hbtPiUs6U0EyVqVuHJfoNjex-cP60NvHjIgsXDH0Prsf6CdLzcvZDQSddIckcWYACiSwsr901HbD5IeJF5BN83cG1EMNVCN_Xfr4olApXtAdjUBbOV1APF24Hvk5R9sZsr8zA0jM9WUWSJ3qr-ZGVLwpSwo0zly_lD7TK7X0h-zAL3gi8YY7od3zBGgzbJjwsU7-XF7Z0H1i7FoB7Fua_5TwaHmJWX6XvYHeZsV6qBqOd3JKtMajPqcDlFskVJ8ONOBVU3PSVT1GXJRFA0iCSy_mxKp3t2AejlQqff3LfNPPw", "payload": "" } 2024-02-13 14:27:14,335:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540672207 HTTP/1.1" 200 806 2024-02-13 14:27:14,336:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:27:14 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GpMKlmdf-FPZvqd2hZGYcxLvkZn2B1Z2f3a6ctlyw8-KE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:36Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540672207/cHbPmQ", "token": "qjTrRwnMu8erDJdXc4snHnVEqSIvVb96brAl4wm-Ifo" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540672207/w9R_yw", "token": "qjTrRwnMu8erDJdXc4snHnVEqSIvVb96brAl4wm-Ifo" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540672207/Hm4ubg", "token": "qjTrRwnMu8erDJdXc4snHnVEqSIvVb96brAl4wm-Ifo" } ] } 2024-02-13 14:27:14,337:DEBUG:acme.client:Storing nonce: HpY91-GpMKlmdf-FPZvqd2hZGYcxLvkZn2B1Z2f3a6ctlyw8-KE 2024-02-13 14:27:14,338:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-13 14:27:14,339:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-02-13 14:27:14,339:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-13 14:27:14,339:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-13 14:27:14,340:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-13 14:27:14,340:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-13 14:27:14,340:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-13 14:27:14,341:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-13 14:27:14,344:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-13 14:27:14,393:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-02-13 14:27:14,393:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-13 14:27:14,393:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-02-13 14:27:14,399:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-02-13 14:27:14,401:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-02-13 14:27:14,401:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-02-13 14:27:14,401:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-02-13 14:27:14,402:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-02-13 14:27:14,403:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-02-13 14:27:14,442:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-13 14:27:14,660:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-13 14:27:14,663:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-13 14:27:14,664:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-13 14:27:14,669:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:07 UTC. 2024-02-13 14:27:14,669:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-13 14:27:14,669:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-13 14:27:14,675:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-13 14:27:14,675:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-13 14:27:14,675:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-13 14:27:14,689:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-13 14:27:14,690:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-13 14:27:14,692:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-13 14:27:15,226:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-13 14:27:15,227:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:27:14 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "DHm35Pb53aY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-13 14:27:15,228:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-13 14:27:19,354:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7578_key-certbot.pem 2024-02-13 14:27:23,164:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7576_csr-certbot.pem 2024-02-13 14:27:23,164:DEBUG:acme.client:Requesting fresh nonce 2024-02-13 14:27:23,164:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-13 14:27:23,343:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-13 14:27:23,344:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:27:23 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-Gpb-f0PT4pvHjqeMQMNiZHz5ohwqZwu-eUqS5ivv5cHNA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-13 14:27:23,344:DEBUG:acme.client:Storing nonce: HpY91-Gpb-f0PT4pvHjqeMQMNiZHz5ohwqZwu-eUqS5ivv5cHNA 2024-02-13 14:27:23,345:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-02-13 14:27:23,354:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BiLWYwUFQ0cHZIanFlTVFNTmlaSHo1b2h3cVp3dS1lVXFTNWl2djVjSE5BIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "EQVU5QkyDHRspW4hCbVHgCRVz5_JsCPeViyLyraOFHs0lIUZru-1O6uHgHeG3pPQBXkgRPdVaG-XJ8z8GBM6JF4jW00TtXuX2Zl3xn7iQKasccoLzjadWeGdKcsPZtMBgYdXyShzgZG3IXr-b12zLG4bbVmUyLWFop0BPN8zLHMhdo2aJOvFknUXtMHaI4gVIIL0lQXkksIta2ac2JZKr-I7MzilnrKW15xJFzBtOjLzx5Bv8NoVzKtz2g00YjO8UtSnmzsAWnxo7SIxZGy967pe5Alm5_Z4c9MB1OS-LFVpdvQwCSKahNrCZg15zRXhjhe_t3hShNec-BcPY3Tskg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-13 14:27:23,614:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-02-13 14:27:23,616:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 13 Feb 2024 13:27:23 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256462697 Replay-Nonce: HpY91-Gpd4yCk259E82wJ9pyGRSPIqYxg-tF8o8QyAQaIIlZw2I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:45Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540704157" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256462697" } 2024-02-13 14:27:23,616:DEBUG:acme.client:Storing nonce: HpY91-Gpd4yCk259E82wJ9pyGRSPIqYxg-tF8o8QyAQaIIlZw2I 2024-02-13 14:27:23,617:DEBUG:acme.client:JWS payload: b'' 2024-02-13 14:27:23,622:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540704157: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BkNHlDazI1OUU4MndKOXB5R1JTUElxWXhnLXRGOG84UXlBUWFJSWxadzJJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA3MDQxNTcifQ", "signature": "ucXbHWcl7C3EwwdSct_m9gCXK_fKoKppiECvWuiydL1XNNCgGu2qUL5cGq-aqWLvugTlJ2W9GwrgySqtnoiBj-Z5w1tiw9u8jjLx8PgExk1R-MS3q7vMZbpID58hRoFInN9yBSLjNFttnwwV4bwmx_6nHep1-fzbhVt5Ohbf-kNM-nevQmUDw6rbqR8v-cNs-p6ieZQQcifXkFnQJJN1BwPR87U9JaVoQvb3v2VMQb7U_0lRoYjn1WS456PE-se4VST2hAUjohI7Jp8G_IpaUzgwKlOepD4-MB_6TWn7jlrVuFAX-auyOYwCbz6GybarnVbMSDWoHjA45TU77drK4Q", "payload": "" } 2024-02-13 14:27:23,804:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540704157 HTTP/1.1" 200 811 2024-02-13 14:27:23,806:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:27:23 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GpSQ1w2nSicg5SlREqcDn8yhmep5a1-vYsfnjMdW-GYuc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:45Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540704157/62ck5w", "token": "N5OAGNuMlPq5wVogNdMQl67gxh-DN3DOXmuMLJugFCo" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540704157/BJFdnw", "token": "N5OAGNuMlPq5wVogNdMQl67gxh-DN3DOXmuMLJugFCo" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540704157/eTpKlQ", "token": "N5OAGNuMlPq5wVogNdMQl67gxh-DN3DOXmuMLJugFCo" } ] } 2024-02-13 14:27:23,806:DEBUG:acme.client:Storing nonce: HpY91-GpSQ1w2nSicg5SlREqcDn8yhmep5a1-vYsfnjMdW-GYuc 2024-02-13 14:27:23,808:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-13 14:27:23,808:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-02-13 14:27:23,809:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-13 14:27:23,809:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-13 14:27:23,810:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-13 14:27:23,810:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-13 14:27:23,810:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-13 14:27:23,811:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-13 14:27:23,813:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-13 14:27:23,851:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-13 14:27:24,039:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-13 14:27:24,042:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-13 14:27:24,044:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-13 14:27:24,050:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:31 UTC. 2024-02-13 14:27:24,050:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-13 14:27:24,051:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-13 14:27:24,058:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-13 14:27:24,059:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-13 14:27:24,059:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-13 14:27:24,078:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-13 14:27:24,080:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-13 14:27:24,084:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-13 14:27:24,532:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-13 14:27:24,533:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:27:24 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "jqHa6MlxX9o": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-13 14:27:24,534:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-13 14:27:28,884:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7579_key-certbot.pem 2024-02-13 14:27:32,641:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7577_csr-certbot.pem 2024-02-13 14:27:32,642:DEBUG:acme.client:Requesting fresh nonce 2024-02-13 14:27:32,642:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-13 14:27:32,792:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-13 14:27:32,792:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:27:32 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ul-rf4ls98G686whm3w5MYwh9b11W-QmA2rcigvqFacpw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-13 14:27:32,792:DEBUG:acme.client:Storing nonce: HWHXB1ul-rf4ls98G686whm3w5MYwh9b11W-QmA2rcigvqFacpw 2024-02-13 14:27:32,793:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-02-13 14:27:32,800:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWwtcmY0bHM5OEc2ODZ3aG0zdzVNWXdoOWIxMVctUW1BMnJjaWd2cUZhY3B3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Y1I7y6Rjt68ZXeil_zjDJGYnRlzcFIt4Wuo0u68r7-BmDqovGA445syOz0kWk9RC_D-OLiQ9W4JawLZ71cXc4YAZS8cY5-nztzCmUu084cGMQnDBpXIIjZOJAEp2wzqjbIIrksHwQor9FH6iJ4OcDNULXS6x6d94kzJxgzdCubYYRIZGMP-WppsWnJfWOV7VKChtZabfknBzueWT3-qSlfg6rjaPpANqje7i0nsGcMqGq6bwuWOVlJB0WZ-uwb8Uk4wqlWchS0QvsZcACxiWZTGGPy-ZQRa_aQ1gNAqPlX6qMwEP9PuFxVypNVxxK-1eYTyDuabGsoYPqvwH5QDNEQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-13 14:27:32,971:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-02-13 14:27:32,972:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 13 Feb 2024 13:27:32 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256484587 Replay-Nonce: HWHXB1ulp-Ews1nyIRUWka4_OhahV1lXxASqoJbqOoxYfv8Qrp8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:54Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540734247" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256484587" } 2024-02-13 14:27:32,973:DEBUG:acme.client:Storing nonce: HWHXB1ulp-Ews1nyIRUWka4_OhahV1lXxASqoJbqOoxYfv8Qrp8 2024-02-13 14:27:32,974:DEBUG:acme.client:JWS payload: b'' 2024-02-13 14:27:32,982:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540734247: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWxwLUV3czFueUlSVVdrYTRfT2hhaFYxbFh4QVNxb0picU9veFlmdjhRcnA4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA3MzQyNDcifQ", "signature": "khAztDIwLMpWPyDlhVspDJDNEJMSZFf_0HDhfa40AN780xQjEVQbRAr2IxV3UWMbGNlLSN-UgIe-y2oDKrcOzX7uRLkiG3FMf6SricQcCjkcGIVo1zQmFPqYMWgGiJsnsrDweG3urAcul2OZ0UJi4HDbRx87e4k6xLRbKQ418ODKLr15RkgEcWhy-NSVCUdkryzxC39IeXjmZxWjV6H6GRu0r0H5zpRh4mWpeeRDKzTXxHRYqSyS-5Rq1rxe5fL4fihWKMTyZUhPrNSHYZVdKvpnxQWeEcry5sf2D0X783IGO6fZBUy-5zAxUlpffU_ofN6UtDoOwQQdE-HfG6hprQ", "payload": "" } 2024-02-13 14:27:33,148:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540734247 HTTP/1.1" 200 810 2024-02-13 14:27:33,150:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:27:32 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o5L5ClTfcc5uTOTPZFEVGEC-lkZBZTmcEsS5aPbjIulQo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:54Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540734247/QhhIwA", "token": "fIJN8ZHL3VyhngYKMiarHrjh5Gae2nH2_mbQusoasGg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540734247/zrc52g", "token": "fIJN8ZHL3VyhngYKMiarHrjh5Gae2nH2_mbQusoasGg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540734247/3Cf07Q", "token": "fIJN8ZHL3VyhngYKMiarHrjh5Gae2nH2_mbQusoasGg" } ] } 2024-02-13 14:27:33,150:DEBUG:acme.client:Storing nonce: 6HUcA-o5L5ClTfcc5uTOTPZFEVGEC-lkZBZTmcEsS5aPbjIulQo 2024-02-13 14:27:33,152:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-13 14:27:33,152:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-02-13 14:27:33,154:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-13 14:27:33,154:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-13 14:27:33,155:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-13 14:27:33,156:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-13 14:27:33,156:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-13 14:27:33,157:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-13 14:27:33,159:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-13 14:27:33,205:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-13 14:27:33,442:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-13 14:27:33,444:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-02-13 14:27:33,446:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-02-13 14:27:33,449:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:09 UTC. 2024-02-13 14:27:33,449:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-13 14:27:33,449:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-13 14:27:33,454:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-13 14:27:33,454:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-13 14:27:33,454:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-13 14:27:33,459:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-13 14:27:33,459:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-13 14:27:33,461:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-13 14:27:33,923:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-13 14:27:33,925:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:27:33 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "qvMmG4a5Q-c": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-13 14:27:33,925:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-13 14:27:38,093:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7580_key-certbot.pem 2024-02-13 14:27:41,893:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7578_csr-certbot.pem 2024-02-13 14:27:41,894:DEBUG:acme.client:Requesting fresh nonce 2024-02-13 14:27:41,894:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-13 14:27:42,046:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-13 14:27:42,047:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:27:41 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o54pn4brM4louCx1JDKhz38w_iwsinb5Y7AjMu1O7Qsvg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-13 14:27:42,048:DEBUG:acme.client:Storing nonce: 6HUcA-o54pn4brM4louCx1JDKhz38w_iwsinb5Y7AjMu1O7Qsvg 2024-02-13 14:27:42,048:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-02-13 14:27:42,058:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzU0cG40YnJNNGxvdUN4MUpES2h6Mzh3X2l3c2luYjVZN0FqTXUxTzdRc3ZnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "hkSpWt6Kd9qD5UlfYSXJMfPTwifMVmPz4-oNyHNpodEn5g9k7rjtr3TNu-TbKq2IACaXvYyv_-bFbE88BbwkgexELD0WS3ut9ncITL8DSlONg4bq4b2Lye-PzilnOB5XmZ1rE1DXrRKJ1nokf76Z4usHVsRBWt4J4sm765_fa46NvKnyL83VGH71prkZnauF65FL4-pCVmSidliI1sF3xbk92s8Qaah_GSpOsBnX4VYGNsAC7kzj0Zao7Oj3CPk0PUDJCZIaf4pocvikvILPp9qqziuFHlfM-UIKLWUbtHc5bPTcdBqlrE2uSB89eF8zsYdVlDReUrnmBfJoOsFSJg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-13 14:27:42,222:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-02-13 14:27:42,223:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 13 Feb 2024 13:27:41 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256513597 Replay-Nonce: HWHXB1ulrxiK-pEpYzcL2zg2ntjkfoVqHohKfZVp096vElbxZ1w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:28:03Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540772027" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256513597" } 2024-02-13 14:27:42,224:DEBUG:acme.client:Storing nonce: HWHXB1ulrxiK-pEpYzcL2zg2ntjkfoVqHohKfZVp096vElbxZ1w 2024-02-13 14:27:42,224:DEBUG:acme.client:JWS payload: b'' 2024-02-13 14:27:42,239:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540772027: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWxyeGlLLXBFcFl6Y0wyemcybnRqa2ZvVnFIb2hLZlpWcDA5NnZFbGJ4WjF3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA3NzIwMjcifQ", "signature": "FLKMyEw_8XzT4UYkMKHlr4CXGPUlsvwb-NJBZMawXqYq1GIdIxM7hVU8K3ZKh_OOrXa0qEN9s0iCAHrZlyB1nkGUdxi4Qkt-1GELh9mPfBSR4jZ8BHSTniadlTPkhgP59BpJrSAkl9m9a9y-068Ioe2WtK3OJp0GHc9Hgnv7Gg4l9hv-URNTjjgT-bD64DuA6UubhI0Y5uolaVEUBrLWNYIf8ftFdWuqazmMJQ2ZAMDfz7GdgVmzPzf37JW_UmUgMqsfQFKe3pwjAHPDRZBBjj7lQ-n77Pkp1Ox4wxni_Q79mQ0M6acFtghoV5FQIgFhu3Ou5zMggXv8b5vUonWlUg", "payload": "" } 2024-02-13 14:27:42,412:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540772027 HTTP/1.1" 200 809 2024-02-13 14:27:42,413:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:27:42 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ulr-wgSKvKCv3ZHeGUtbabw1kly-yr9NqTvNYaSIF8_DY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:28:03Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540772027/6vejxw", "token": "dx8dAtRrvWZPG_3QR_npx78MSNAxtOyiO70IZr2x6Iw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540772027/m1WT-w", "token": "dx8dAtRrvWZPG_3QR_npx78MSNAxtOyiO70IZr2x6Iw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540772027/53Jzvw", "token": "dx8dAtRrvWZPG_3QR_npx78MSNAxtOyiO70IZr2x6Iw" } ] } 2024-02-13 14:27:42,414:DEBUG:acme.client:Storing nonce: HWHXB1ulr-wgSKvKCv3ZHeGUtbabw1kly-yr9NqTvNYaSIF8_DY 2024-02-13 14:27:42,415:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-13 14:27:42,416:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-02-13 14:27:42,417:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-13 14:27:42,417:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-13 14:27:42,418:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-13 14:27:42,418:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-13 14:27:42,418:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-13 14:27:42,419:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-13 14:27:42,421:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-13 14:27:42,475:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-13 14:27:42,680:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-13 14:27:42,682:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is signed by the certificate's issuer. 2024-02-13 14:27:42,684:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD 2024-02-13 14:27:42,689:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:26 UTC. 2024-02-13 14:27:42,689:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-13 14:27:42,689:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-13 14:27:42,694:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-13 14:27:42,694:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-13 14:27:42,694:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-13 14:27:42,710:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-13 14:27:42,711:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-13 14:27:42,714:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-13 14:27:43,248:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-13 14:27:43,249:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:27:42 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "xDinHWXSXj0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-02-13 14:27:43,250:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-13 14:27:47,533:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7581_key-certbot.pem 2024-02-13 14:27:51,325:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7579_csr-certbot.pem 2024-02-13 14:27:51,326:DEBUG:acme.client:Requesting fresh nonce 2024-02-13 14:27:51,326:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-13 14:27:51,503:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-13 14:27:51,504:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:27:51 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 63lPIS7z4qpxFk7x8zQgHpkO1uIkunPSpgq8lpp0MwiJE3AgmRo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-13 14:27:51,505:DEBUG:acme.client:Storing nonce: 63lPIS7z4qpxFk7x8zQgHpkO1uIkunPSpgq8lpp0MwiJE3AgmRo 2024-02-13 14:27:51,506:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-02-13 14:27:51,511:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3o0cXB4Rms3eDh6UWdIcGtPMXVJa3VuUFNwZ3E4bHBwME13aUpFM0FnbVJvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "kLFH90dmcCPXYiwAlAmZqjtIn3hFl_scYngJ4mfQFx0v4GOKxrWhjf7lZeT-EvfHknr47MpgFxPFJFJmh97pzIFz8MgTtygGnA2JCPW5KjJtxb8pEXyNlEfcFDoKFTpNaqbwZZLA1Kvpkax3bzu3CoZnbQHamKvi7DO3TXt5cOzr2JEQyk0z40kpSaXMJt1gqBCzikfJ1s4six_q19WygxOrgyN_Yl-uC2C3zLuVvqbT6MSjDyfUM9Vzz4BbcR_ESyjLFIz3o6bohJj_hupIoeGawpn-VmiJz8dypL6t8FeW7Ixl5BUQBGmioeuGRTHk_RQ5vL4369lZKRJb4d5qsQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-13 14:27:51,704:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-13 14:27:51,705:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 13 Feb 2024 13:27:51 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256544587 Replay-Nonce: HpY91-Gp-oplJWl256ykLo2BP532jBu3DzKl0WKdk_4kbGWTags X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:28:13Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540813967" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256544587" } 2024-02-13 14:27:51,706:DEBUG:acme.client:Storing nonce: HpY91-Gp-oplJWl256ykLo2BP532jBu3DzKl0WKdk_4kbGWTags 2024-02-13 14:27:51,706:DEBUG:acme.client:JWS payload: b'' 2024-02-13 14:27:51,718:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540813967: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3Atb3BsSldsMjU2eWtMbzJCUDUzMmpCdTNEektsMFdLZGtfNGtiR1dUYWdzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA4MTM5NjcifQ", "signature": "U3B4FgrZEG-t4-deQPIuzzYdx3eCZtnCfOKoa9A72IF8vdH0OjRPdGyXeX0FuNsfqf8FMiOK5HSVhLmZfNZv40-3gE9lPMsz1n65TKFnXorcSoEVNfg-Xg71q5ftgpiaEqX1FAgfnucdhwU6_3qa8SD_C3Z1LTFSyptCKC6Bd-EVZtOqWximwo7DJs68TJvWXEuqSAFULHk1QVkGaD94fHcel_R8KXAcz_3361uguwIKv-kF6rWw6dnYFobEZMVQPJ73ldVvic12fJhEXobGfTKztN08ZDkwF6g4jyxfHSiCqDxdbQYvJBQ2tJEI95sSCHsG7_qOgexi-SR0qL1CWQ", "payload": "" } 2024-02-13 14:27:51,901:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540813967 HTTP/1.1" 200 805 2024-02-13 14:27:51,902:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:27:51 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-Gpvb5I-qht1XZEchkN6Nou31m5LGO8vR5eyHUnkjruvRk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:28:13Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540813967/QS3xjQ", "token": "Giw2SKEZArhw1cAd0QrBh2IQ4Gldqfhc9_Txzga0eYM" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540813967/GcxOwg", "token": "Giw2SKEZArhw1cAd0QrBh2IQ4Gldqfhc9_Txzga0eYM" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540813967/pdWHtQ", "token": "Giw2SKEZArhw1cAd0QrBh2IQ4Gldqfhc9_Txzga0eYM" } ] } 2024-02-13 14:27:51,902:DEBUG:acme.client:Storing nonce: HpY91-Gpvb5I-qht1XZEchkN6Nou31m5LGO8vR5eyHUnkjruvRk 2024-02-13 14:27:51,903:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-13 14:27:51,903:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-02-13 14:27:51,904:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-13 14:27:51,905:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-13 14:27:51,906:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-13 14:27:51,907:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-13 14:27:51,907:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-13 14:27:51,908:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-13 14:27:51,910:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-13 14:27:51,967:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-13 14:27:52,137:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-13 14:27:52,139:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-13 14:27:52,141:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-13 14:27:52,150:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:43 UTC. 2024-02-13 14:27:52,151:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-13 14:27:52,151:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-13 14:27:52,156:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-13 14:27:52,156:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-13 14:27:52,156:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-13 14:27:52,163:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-13 14:27:52,164:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-13 14:27:52,166:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-13 14:27:52,713:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-13 14:27:52,714:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:27:52 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "V46z1n7xM-s": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-13 14:27:52,715:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-13 14:27:56,787:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7582_key-certbot.pem 2024-02-13 14:28:00,488:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7580_csr-certbot.pem 2024-02-13 14:28:00,488:DEBUG:acme.client:Requesting fresh nonce 2024-02-13 14:28:00,488:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-13 14:28:00,669:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-13 14:28:00,670:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:28:00 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 63lPIS7z-jXpgTKMVZx-n8bK5n0I3jSKsDUvEguuGlK0_chDrjE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-13 14:28:00,671:DEBUG:acme.client:Storing nonce: 63lPIS7z-jXpgTKMVZx-n8bK5n0I3jSKsDUvEguuGlK0_chDrjE 2024-02-13 14:28:00,671:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-02-13 14:28:00,686:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3otalhwZ1RLTVZaeC1uOGJLNW4wSTNqU0tzRFV2RWd1dUdsSzBfY2hEcmpFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "CJjTS_tCmGYy8JweB4NYdPzOyeRk6mbkhp-FPwA2X2u3EzuHd-AHOk1X6y65lBq-1C5UG0BIXDkiVURedPiCWYEPd9YmiWD45h5BMW21nCV7BRK3DZDrGzf-85lAAu8Htsap659qbw8Z0bkVWPf1Czc3h_zkvnDNfxhaUD20701PYpPk3WihjbXexp8ScPMHQtQmmx2ReAZCRlmV8CV-LOIJ-C9Chfw3ANT-RsbSRQc1sSoORxyTMoDiCToUPwxmzWgEKpTw5BcU5WzqvAh9UmZQgWjOnvu4rQnIwFF96IWei2igk9QLElLF_qjBNvGYUY_Ux86ueJp4NnL5HIvSIA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-13 14:28:00,879:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-13 14:28:00,880:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 13 Feb 2024 13:28:00 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256570667 Replay-Nonce: 63lPIS7zJDhZ2vlVRzlkEIjtD7pYZ84reOb2LPGpThYr-yE868w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:28:22Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540850567" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256570667" } 2024-02-13 14:28:00,880:DEBUG:acme.client:Storing nonce: 63lPIS7zJDhZ2vlVRzlkEIjtD7pYZ84reOb2LPGpThYr-yE868w 2024-02-13 14:28:00,880:DEBUG:acme.client:JWS payload: b'' 2024-02-13 14:28:00,885:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540850567: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3pKRGhaMnZsVlJ6bGtFSWp0RDdwWVo4NHJlT2IyTFBHcFRoWXIteUU4Njh3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA4NTA1NjcifQ", "signature": "h8IzLiDguZgFFRT1q1nycU9C-OyYC5FaMJpl_FYSFEENO3nJwUialofX1a2br0yLVmrzIROg3lDfeJ00ZsWubeW92zR6vtoQUvjsFeqYb_sTjNQxrUkGf6t9b44ptyMWdhT8z1vM4eN9Pk6AhfkddLbfm9SZgHsdyHu_WpdGnmxSGpveEXkD4DoVAhPHr7_fDgISO6fabBH-EKgkYM-6D1qGtaBMgvVHFnqOCLZKLkUIuGMwp1kn_iAu2UamVEBiPvA1vIR3L6cblknqYhwGh7Mm9ibg6YwuOmt1TEvDarS_N9OyWfojHBCqukT6U8iNTKjSB6owhjTId-o1pqaCZw", "payload": "" } 2024-02-13 14:28:01,076:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540850567 HTTP/1.1" 200 805 2024-02-13 14:28:01,076:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:28:00 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 63lPIS7zeEooEUzEmsYgw2xrnq-PfNN-8PyKL_YFCdlDmiXGKwI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:28:22Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540850567/9KsoFg", "token": "F_vhJNcuPiQNg87Bt2dXah4EyIxvrvDquKYXpvMqAbQ" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540850567/qRG9hA", "token": "F_vhJNcuPiQNg87Bt2dXah4EyIxvrvDquKYXpvMqAbQ" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540850567/TwBIlQ", "token": "F_vhJNcuPiQNg87Bt2dXah4EyIxvrvDquKYXpvMqAbQ" } ] } 2024-02-13 14:28:01,076:DEBUG:acme.client:Storing nonce: 63lPIS7zeEooEUzEmsYgw2xrnq-PfNN-8PyKL_YFCdlDmiXGKwI 2024-02-13 14:28:01,077:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-13 14:28:01,077:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-02-13 14:28:01,078:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-13 14:28:01,078:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-13 14:28:01,079:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-13 14:28:01,079:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-13 14:28:01,079:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-13 14:28:01,080:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-13 14:28:01,081:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-13 14:28:01,117:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-13 14:28:01,295:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-13 14:28:01,296:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-13 14:28:01,297:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-13 14:28:01,301:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:40:02 UTC. 2024-02-13 14:28:01,301:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-13 14:28:01,302:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-13 14:28:01,306:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-13 14:28:01,306:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-13 14:28:01,306:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-13 14:28:01,310:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-13 14:28:01,311:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-13 14:28:01,313:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-13 14:28:01,778:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-13 14:28:01,779:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:28:01 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "pV1QHmywIMg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-13 14:28:01,780:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-13 14:28:05,658:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7583_key-certbot.pem 2024-02-13 14:28:09,474:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7581_csr-certbot.pem 2024-02-13 14:28:09,474:DEBUG:acme.client:Requesting fresh nonce 2024-02-13 14:28:09,474:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-13 14:28:09,630:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-13 14:28:09,632:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:28:09 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o5nRe_-XzI9wBUwqaN-WHETJ0Ae7akYik40Nc-armhqQY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-13 14:28:09,632:DEBUG:acme.client:Storing nonce: 6HUcA-o5nRe_-XzI9wBUwqaN-WHETJ0Ae7akYik40Nc-armhqQY 2024-02-13 14:28:09,633:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-02-13 14:28:09,642:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVuUmVfLVh6STl3QlV3cWFOLVdIRVRKMEFlN2FrWWlrNDBOYy1hcm1ocVFZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "mX-DCupTleYc7avfAJxP2285Hi7Fue0ecgoAZ2miPs0B1kyKIGZRGL2ocaRil1gCtXYC3IU6qpskX3X0ksE7SIcoLHYOZ-UODFMozPJpebwy06y8aNKogpBfhCqTgwlvh9k3uLKNdxGjAQpOcGgxqAk7edpkMflF7S34CnICYuUTfXBDlBnGYXU4_zn4squAUWO2YQB4ItyQp3__yVcZAt--FsD-15NBusUtZfui53-A31AV_ecnrQxs726PLoq4Gcc5a8RC6XVTjvFIc08eFz2nlgZHvcwX7GCoZ4_fmdUqfLK76K-POGceUUxUAjCftRpI44C8lEhrP7ZcYopHhQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-13 14:28:09,814:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-13 14:28:09,815:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 13 Feb 2024 13:28:09 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256595137 Replay-Nonce: 6HUcA-o5UcYs5I5qvPNuIJ8U5XcAaVxDJadyCedwgePPZPVZrDs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:28:31Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540885967" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256595137" } 2024-02-13 14:28:09,816:DEBUG:acme.client:Storing nonce: 6HUcA-o5UcYs5I5qvPNuIJ8U5XcAaVxDJadyCedwgePPZPVZrDs 2024-02-13 14:28:09,817:DEBUG:acme.client:JWS payload: b'' 2024-02-13 14:28:09,824:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540885967: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVVY1lzNUk1cXZQTnVJSjhVNVhjQWFWeERKYWR5Q2Vkd2dlUFBaUFZackRzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA4ODU5NjcifQ", "signature": "ZYI7bO42Qnvxu6zJTiDTVQFDdX6XPg5-w0Qs4o4RupLB7d_MAJGZAcTqjkR4nSf37xsEvShAPKbSRDVv2m2kypNlOL0Ymwqw5oC9CKLdoAMYQp9D81MtZo5G3fEB1O9a2Ylv2-RBE2tkkSHcSdcCJOK_WZ0tsf0V2zYMt2UrlaTBW5BcRfPv3OGetQPHSWTSSsdW5cxVSVF2UOKCISn-XdAPKAuYxlIDKno9e0DPxolRV5SFQ_TdV3Za7-9UAfMOZSAbaVMPmvi8PfsxphNXlOpvVUNLRQYxLRFkXnD7iGY6Fx5lOQX0EphtheWowrh-VZw8fCoD1qhkyPrvQTdmhQ", "payload": "" } 2024-02-13 14:28:09,981:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540885967 HTTP/1.1" 200 805 2024-02-13 14:28:09,982:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 13 Feb 2024 13:28:09 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o5eCAtq3AJoOd4cLRCVjk3zLXsa3MiTQHbtnWEXwMQPQg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:28:31Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540885967/OUXDhQ", "token": "M6pE59XecoDIFeZmQ2fOLVruWYIn_qwzTAv5ez_ACcw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540885967/gxpKtA", "token": "M6pE59XecoDIFeZmQ2fOLVruWYIn_qwzTAv5ez_ACcw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540885967/ovBk4w", "token": "M6pE59XecoDIFeZmQ2fOLVruWYIn_qwzTAv5ez_ACcw" } ] } 2024-02-13 14:28:09,983:DEBUG:acme.client:Storing nonce: 6HUcA-o5eCAtq3AJoOd4cLRCVjk3zLXsa3MiTQHbtnWEXwMQPQg 2024-02-13 14:28:09,984:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-13 14:28:09,985:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-02-13 14:28:09,985:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-13 14:28:09,985:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-13 14:28:09,986:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-13 14:28:09,986:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-13 14:28:09,986:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-13 14:28:09,987:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-13 14:28:09,988:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-13 14:28:09,988:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-02-13 14:28:09,988:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-02-13 14:28:09,990:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-02-13 14:28:09,991:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)