2024-02-11 20:16:49,031:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-02-11 20:16:49,032:DEBUG:certbot._internal.main:Arguments: [] 2024-02-11 20:16:49,032:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-02-11 20:16:49,855:DEBUG:certbot._internal.log:Root logging level set at 20 2024-02-11 20:16:49,855:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-02-11 20:16:49,894:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-02-11 20:16:49,933:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-11 20:16:50,167:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-11 20:16:50,169:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is signed by the certificate's issuer. 2024-02-11 20:16:50,173:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is: OCSPCertStatus.GOOD 2024-02-11 20:16:50,181:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:15 UTC. 2024-02-11 20:16:50,181:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-11 20:16:50,181:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-11 20:16:50,186:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-11 20:16:50,187:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-11 20:16:50,187:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-11 20:16:50,193:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-11 20:16:50,194:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-11 20:16:50,196:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-11 20:16:50,794:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-11 20:16:50,795:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:16:50 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "V7pf3HRx58k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-11 20:16:50,795:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-11 20:16:55,784:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7519_key-certbot.pem 2024-02-11 20:17:00,087:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7517_csr-certbot.pem 2024-02-11 20:17:00,088:DEBUG:acme.client:Requesting fresh nonce 2024-02-11 20:17:00,088:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-11 20:17:00,269:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-11 20:17:00,270:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:16:59 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GpVfsPWSCvGwPYaVTyem4pH-ZsegLsrnfsyl5WkLuafRo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-11 20:17:00,270:DEBUG:acme.client:Storing nonce: HpY91-GpVfsPWSCvGwPYaVTyem4pH-ZsegLsrnfsyl5WkLuafRo 2024-02-11 20:17:00,270:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-02-11 20:17:00,276:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BWZnNQV1NDdkd3UFlhVlR5ZW00cEgtWnNlZ0xzcm5mc3lsNVdrTHVhZlJvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "UXVG-qw2tYA1mA6q3EJeYL0d1_wFZGEC7p-R1VGbuCROmXLbVdiekmfSd7gAT06w3tseKJ0tD195sL88o1-s04MVdxz-08iNWKfMk-LB564HcpSGOSYKR8B48BUOyJpaaefysU8g_gQqFoMiqjWrYRR_FNmQQB18XH3yyuvva-aiJJFHWbSj650TZ3vCRcy6PQtP0xDX4BlE4UKyWCxCu0fSN_B63hhJT7jTsHwKrcM_x6LOxFWoRx---1pJUCHW8fUjcOMNCCMYHrnnyIGrFMksxUsV9ykGkiUPd8daqEAcZePWX3N0-9-Ry5P1aQZXn8crqpugg2BKOuVOFWZ9hQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-11 20:17:00,468:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-02-11 20:17:00,469:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 11 Feb 2024 19:17:00 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256281307 Replay-Nonce: 63lPIS7zholvvVvR7prnnuyNLQchSVUl0FtkDUDjVBTAQzhDUoI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:26:39Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540442217" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256281307" } 2024-02-11 20:17:00,469:DEBUG:acme.client:Storing nonce: 63lPIS7zholvvVvR7prnnuyNLQchSVUl0FtkDUDjVBTAQzhDUoI 2024-02-11 20:17:00,469:DEBUG:acme.client:JWS payload: b'' 2024-02-11 20:17:00,475:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540442217: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3pob2x2dlZ2Ujdwcm5udXlOTFFjaFNWVWwwRnRrRFVEalZCVEFRemhEVW9JIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA0NDIyMTcifQ", "signature": "UTPIY1X-FY3FDGVr09CtYvr4cdP2iHRwRv6QXqqdpaFg_dnuosb_Ljtd_S_v1yBf1_Opk7kNDSqoCU4V1ZzAPdMfOCG0aqQ-VxJ2k_-cGw8MDPUkEcBHTzkI6oFxvQcjwH_3OD8kfwmHLxr_oYKDI9mNB3UJsjuFfga5J-fPTTTwwFOTC_gcuo58hPbvjAOjyjVkhSulyVtSYkYP9Po03Ih03_IKDOTJ1tEaA0_p2YVXRL0EyR_L5hfrqDUVzQtbyueAqqiXDQ2YxKIpqD2V3GNWoJ4Q0CgGgCJ7P45-Y7x5Y6Ua-EDSXVoA3n9Bq2tM8ypjj2_GQStyeZdIN69YUg", "payload": "" } 2024-02-11 20:17:00,660:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540442217 HTTP/1.1" 200 810 2024-02-11 20:17:00,660:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:17:00 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GpqS-p7roPM8ETYxCPaq8-tv1WBt0coDurHf6ly3XfmOc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:26:39Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540442217/D1FeaA", "token": "ArP8a0cUi_G3Nbfrk3cNkTx86Kt5iLXDEYthGSw4EUs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540442217/-mx8SQ", "token": "ArP8a0cUi_G3Nbfrk3cNkTx86Kt5iLXDEYthGSw4EUs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540442217/azK9Sg", "token": "ArP8a0cUi_G3Nbfrk3cNkTx86Kt5iLXDEYthGSw4EUs" } ] } 2024-02-11 20:17:00,661:DEBUG:acme.client:Storing nonce: HpY91-GpqS-p7roPM8ETYxCPaq8-tv1WBt0coDurHf6ly3XfmOc 2024-02-11 20:17:00,661:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-11 20:17:00,661:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-02-11 20:17:00,662:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-11 20:17:00,662:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-11 20:17:00,666:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-11 20:17:00,666:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-11 20:17:00,666:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-11 20:17:00,667:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-11 20:17:00,672:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-11 20:17:00,710:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-11 20:17:00,912:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-11 20:17:00,913:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-11 20:17:00,914:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-11 20:17:00,918:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:32 UTC. 2024-02-11 20:17:00,918:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-11 20:17:00,918:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-11 20:17:00,923:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-11 20:17:00,923:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-11 20:17:00,924:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-11 20:17:00,928:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-11 20:17:00,929:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-11 20:17:00,931:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-11 20:17:01,468:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-11 20:17:01,468:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:17:01 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "DWPkvYh1S00": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-11 20:17:01,469:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-11 20:17:05,838:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7520_key-certbot.pem 2024-02-11 20:17:09,771:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7518_csr-certbot.pem 2024-02-11 20:17:09,772:DEBUG:acme.client:Requesting fresh nonce 2024-02-11 20:17:09,772:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-11 20:17:09,951:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-11 20:17:09,951:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:17:09 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-Gp1wURowfzXjqSRdfz6vMCLpVD7hEuapXZEm7igFTJMQE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-11 20:17:09,952:DEBUG:acme.client:Storing nonce: HpY91-Gp1wURowfzXjqSRdfz6vMCLpVD7hEuapXZEm7igFTJMQE 2024-02-11 20:17:09,952:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-02-11 20:17:09,958:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3Axd1VSb3dmelhqcVNSZGZ6NnZNQ0xwVkQ3aEV1YXBYWkVtN2lnRlRKTVFFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "IeUhiieIAqtk0B5hNMMfudoXGZaPDNqWW0-e0Gy7RZfqUNmkrt9SMeS1jnNp15uD1Nqe-SyNsxsmxrAxctqbbmHpoHGwsWSvA65fFJSxSY4gFjP9kiqNceJL_wqU01M5e1ku5avb4rlh8LUnpc3AktQ60WTAXjhVUJg2fbuHExkVZcSVTjYux_qmeF2RiG7ltB6W6n55edZa0OOlwpwJP79RvDRWiEPx2m9Qk2-jJz8jCnZzvF-vHzjKTnU8-I4RXlQ9ljRjwlxxXSevU9AMNEy_OYYe47e5lGUJN6-gXnHGGKAAmuz-upwupHulTf8EvcSSD_CFmwpVzW1kL-7viQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-11 20:17:10,147:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-02-11 20:17:10,149:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 11 Feb 2024 19:17:09 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256306347 Replay-Nonce: 63lPIS7zGx0d_Vs8PdA6lhtGj3Wr_eEjE-hzEqsCXpmo1c0JeQs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:26:49Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540477517" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256306347" } 2024-02-11 20:17:10,149:DEBUG:acme.client:Storing nonce: 63lPIS7zGx0d_Vs8PdA6lhtGj3Wr_eEjE-hzEqsCXpmo1c0JeQs 2024-02-11 20:17:10,150:DEBUG:acme.client:JWS payload: b'' 2024-02-11 20:17:10,156:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540477517: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3pHeDBkX1ZzOFBkQTZsaHRHajNXcl9lRWpFLWh6RXFzQ1hwbW8xYzBKZVFzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA0Nzc1MTcifQ", "signature": "TrcZ5u1wTK9-iwIOwJQEpCKcyUgFJOlC4bz0o5dTBEelUMsuy9MPN-oOV7zu_m0LhWmTgGKuCcKZRnndnNeT0fvM0arRjodHkGN9Hh12W4vA-I8rd5gtFq5ZN36OmImfpKSDKsja7O336PlWbi-QrrIkT3TJ1JitHt8j5JUrSHSQnDv7qxUNcHpQpgRlYFuM9Pc7sPRza9-zODmEVX35tNQz7YF1IUaA0mj5RQH_HR-VyAtiFxH10H11I2JpDioueZXZFmX9W3cnj86lGLJiCp3K41u8G0_09rMY65Xu3jcbV0JM7VhsmkNyLZWSsuzK8qzKNUXZeHsl9DgV4Eq5nw", "payload": "" } 2024-02-11 20:17:10,363:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540477517 HTTP/1.1" 200 804 2024-02-11 20:17:10,364:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:17:10 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GpJuT4TgGsbAPJvb1ATqOd9FX5j-w0PEV3mRQiI-EbaNU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:26:49Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540477517/zBe4Yw", "token": "8iGzASnL30f6Zg4WsWG91mNySkbT6obzDH-O1WlTCYU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540477517/jvutYw", "token": "8iGzASnL30f6Zg4WsWG91mNySkbT6obzDH-O1WlTCYU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540477517/9Dli9w", "token": "8iGzASnL30f6Zg4WsWG91mNySkbT6obzDH-O1WlTCYU" } ] } 2024-02-11 20:17:10,364:DEBUG:acme.client:Storing nonce: HpY91-GpJuT4TgGsbAPJvb1ATqOd9FX5j-w0PEV3mRQiI-EbaNU 2024-02-11 20:17:10,365:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-11 20:17:10,365:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-02-11 20:17:10,366:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-11 20:17:10,366:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-11 20:17:10,367:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-11 20:17:10,367:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-11 20:17:10,367:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-11 20:17:10,368:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-11 20:17:10,369:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-11 20:17:10,408:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-11 20:17:10,636:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-11 20:17:10,638:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-11 20:17:10,638:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-11 20:17:10,642:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:49 UTC. 2024-02-11 20:17:10,642:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-11 20:17:10,642:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-11 20:17:10,647:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-11 20:17:10,647:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-11 20:17:10,647:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-11 20:17:10,651:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-11 20:17:10,652:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-11 20:17:10,654:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-11 20:17:11,200:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-11 20:17:11,201:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:17:10 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "i-xygHpuvrg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-11 20:17:11,201:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-11 20:17:15,542:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7521_key-certbot.pem 2024-02-11 20:17:19,436:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7519_csr-certbot.pem 2024-02-11 20:17:19,437:DEBUG:acme.client:Requesting fresh nonce 2024-02-11 20:17:19,437:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-11 20:17:19,619:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-11 20:17:19,620:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:17:19 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GpEzZGFkp6Im5n7L3bdnvX8Yla5QaaJCGLosUpHaozzYg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-11 20:17:19,620:DEBUG:acme.client:Storing nonce: HpY91-GpEzZGFkp6Im5n7L3bdnvX8Yla5QaaJCGLosUpHaozzYg 2024-02-11 20:17:19,620:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-02-11 20:17:19,626:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BFelpHRmtwNkltNW43TDNiZG52WDhZbGE1UWFhSkNHTG9zVXBIYW96ellnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "jekp5nRhYH0aeBWNHuacIeM43o1OtnnWcK3Kq9zzvzRaL40hrYX4SKPJBgRHU7zPqS9LInVqK9dfqaFOREpa6FEaTiHZyz1FT2o1TyOQFpWLtq_DkcwQjylX_i005Q-9ilDBfRX9wUg8SJmQBXTC61PGTu6nmnvNWiASPfOstFwSDkVKRBC6k2szUOAtE86TFD_4aShHaJFLVRodPblUMg6IFasA2hz397CJeOM__maAbGY-Tk2oHV5mHh_hUVQLGt3Rt1cUPP74fBIJwb2WU6vp0rmc-x6CHTE_vXwu2eYx-Pfru6x3YopJ_1gt1yjXQrCrFJ8-rl5IT-mAb5PuKg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-11 20:17:19,869:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-02-11 20:17:19,870:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 11 Feb 2024 19:17:19 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256330697 Replay-Nonce: HpY91-GpQcTG48dc2eM92DtaNqrySLMWTVUz9GTDwa37aiQcEoQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:26:58Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540514237" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256330697" } 2024-02-11 20:17:19,870:DEBUG:acme.client:Storing nonce: HpY91-GpQcTG48dc2eM92DtaNqrySLMWTVUz9GTDwa37aiQcEoQ 2024-02-11 20:17:19,870:DEBUG:acme.client:JWS payload: b'' 2024-02-11 20:17:19,877:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540514237: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BRY1RHNDhkYzJlTTkyRHRhTnFyeVNMTVdUVlV6OUdURHdhMzdhaVFjRW9RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA1MTQyMzcifQ", "signature": "PZ355vLV7PcBAA63vq2vQHnXO81lQ4I6SRmMaMOnxIcyWXCDFoVqeVYhbKd9vNohkC0sHge-Lh7n_dOkjx1P233dRvm4FWHrdQDgW7GLTdW4PmKlyGpdNCMohw3FMHA9Q7gMJErXo8EbRMcflY1qYRPcYepg9i9yn0PW06fjzPmL3XO7XQfJwmm5taT-MlGyRcu05zxQi1mnASK0dvFdkGZMNwBYiFuR28PEhRQyduCc5jp-Gjkx844R5rxsoKfiZvcAOvZ9zY0h-G2oAqzas1hz8XlYRfUsnETZcrb--zFFbZGMOc0A8wd5V3C4dM52AnNnF9bz1xZa0QkXVirzTQ", "payload": "" } 2024-02-11 20:17:20,063:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540514237 HTTP/1.1" 200 807 2024-02-11 20:17:20,063:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:17:19 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 63lPIS7zLJKEcE5TKyPNiyV_yIJSaQuVQkHLeW6JwlAyMbeOYIw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:26:58Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540514237/y7Fh6A", "token": "mx-KJuR3SKsTvFopAHExnS3CQMuuST_PdD5t2ueC7DE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540514237/tfTCJQ", "token": "mx-KJuR3SKsTvFopAHExnS3CQMuuST_PdD5t2ueC7DE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540514237/pbKBOA", "token": "mx-KJuR3SKsTvFopAHExnS3CQMuuST_PdD5t2ueC7DE" } ] } 2024-02-11 20:17:20,064:DEBUG:acme.client:Storing nonce: 63lPIS7zLJKEcE5TKyPNiyV_yIJSaQuVQkHLeW6JwlAyMbeOYIw 2024-02-11 20:17:20,065:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-11 20:17:20,065:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-02-11 20:17:20,065:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-11 20:17:20,066:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-11 20:17:20,067:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-11 20:17:20,067:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-11 20:17:20,067:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-11 20:17:20,068:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-11 20:17:20,069:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-11 20:17:20,120:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-11 20:17:20,186:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-11 20:17:20,187:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-11 20:17:20,188:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-11 20:17:20,193:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:03 UTC. 2024-02-11 20:17:20,193:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-11 20:17:20,194:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-11 20:17:20,200:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-11 20:17:20,201:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-11 20:17:20,201:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-11 20:17:20,204:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-11 20:17:20,205:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-11 20:17:20,207:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-11 20:17:20,680:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-11 20:17:20,680:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:17:20 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "rixDkbpp6Ko": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-02-11 20:17:20,681:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-11 20:17:24,673:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7522_key-certbot.pem 2024-02-11 20:17:28,474:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7520_csr-certbot.pem 2024-02-11 20:17:28,474:DEBUG:acme.client:Requesting fresh nonce 2024-02-11 20:17:28,474:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-11 20:17:28,629:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-11 20:17:28,630:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:17:28 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o5wbIxyNIbBB2cNw_zRi1XSiMFPXCMCan1PNWdGI30H5c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-11 20:17:28,630:DEBUG:acme.client:Storing nonce: 6HUcA-o5wbIxyNIbBB2cNw_zRi1XSiMFPXCMCan1PNWdGI30H5c 2024-02-11 20:17:28,630:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-02-11 20:17:28,638:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzV3Ykl4eU5JYkJCMmNOd196UmkxWFNpTUZQWENNQ2FuMVBOV2RHSTMwSDVjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "XM7RFcG8CZBdrP0nUn7_c3hgDQKJIMWRquEY0vTDnFROWMoRF0KADJUlz9BTI9edJFjDtczAVr37TQ67jtUPFE200XYXtftLpdL_86plmIB5GVBL8xS_ch2y-jMYRqp0z2Mu2VVyp9X9Un7RcYjhNd6bT5nVmndnMIGjL7qGGFQGl2bZrgmYqt2NIgJdaifWJc_GRHLu2d325ofjRWJfNKaYn94EE5tVilGcl_w5RDUQgOX8HJNOArQAmnpkoNXGvhZUAYA6hwkbEp3Ux3V4PxcjtmMNFrV-44yIcFUCwnA2A-wxJavtQBIhNHS4GqLRkj2nQGgRhr-sNvV7_lZwOg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-11 20:17:28,840:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-02-11 20:17:28,841:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 11 Feb 2024 19:17:28 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256364097 Replay-Nonce: HWHXB1ulDOdBzuUwwYu_vNWn93MudiZD7i1UhAxz6XuKiflnDiE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:07Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540559067" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256364097" } 2024-02-11 20:17:28,841:DEBUG:acme.client:Storing nonce: HWHXB1ulDOdBzuUwwYu_vNWn93MudiZD7i1UhAxz6XuKiflnDiE 2024-02-11 20:17:28,841:DEBUG:acme.client:JWS payload: b'' 2024-02-11 20:17:28,847:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540559067: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWxET2RCenVVd3dZdV92TlduOTNNdWRpWkQ3aTFVaEF4ejZYdUtpZmxuRGlFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA1NTkwNjcifQ", "signature": "MGYa3CHryeRANB7TsCFDInK8CjeCw7PasdrK8hIoRxPIyQoWKJY9txdVyZeuEr5XvKobXiUGgWc1ZP37iinATudeTX9F7GmGy9KWkuFhvnDxkGVd9RlhCef3cd2EiUvFHHsoS6f0NP0o-FGwl78CjAdYEJXm2hrxJxJknN3UtbF0oP32S5ltlCpZSsNRyzeC0-PL83-2NYpdw3MA7NBxhYe-_-NORuRwAjORPtApPEZ7wrO1Ld-lQdBlUlIK2dfKUUGt3UHbycAsJa14BcGXsfzim7BsOHStCh16CB8P9Tq0JUw6TonI5-rwdTsLcvSbdtF8GzaVrK7syAbWYHzQvg", "payload": "" } 2024-02-11 20:17:29,014:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540559067 HTTP/1.1" 200 801 2024-02-11 20:17:29,015:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:17:28 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ul7R9eH02MCO_66CJRGKFXQdasOmDQkeLDrJ5s0joe0sY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:07Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540559067/MBQGZA", "token": "Kw5f1Ld0UlE2yvC6ntUu8B8EKWMoB_0Y2UyMCfhmWLw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540559067/Aot2bg", "token": "Kw5f1Ld0UlE2yvC6ntUu8B8EKWMoB_0Y2UyMCfhmWLw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540559067/YelLvw", "token": "Kw5f1Ld0UlE2yvC6ntUu8B8EKWMoB_0Y2UyMCfhmWLw" } ] } 2024-02-11 20:17:29,015:DEBUG:acme.client:Storing nonce: HWHXB1ul7R9eH02MCO_66CJRGKFXQdasOmDQkeLDrJ5s0joe0sY 2024-02-11 20:17:29,016:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-11 20:17:29,016:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-02-11 20:17:29,016:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-11 20:17:29,016:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-11 20:17:29,017:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-11 20:17:29,017:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-11 20:17:29,017:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-11 20:17:29,018:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-11 20:17:29,019:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-11 20:17:29,068:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-11 20:17:29,328:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-11 20:17:29,330:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-11 20:17:29,330:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-11 20:17:29,335:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:20 UTC. 2024-02-11 20:17:29,335:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-11 20:17:29,335:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-11 20:17:29,340:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-11 20:17:29,340:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-11 20:17:29,340:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-11 20:17:29,345:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-11 20:17:29,346:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-11 20:17:29,347:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-11 20:17:29,879:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-11 20:17:29,879:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:17:29 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "qQrULyCd6LU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-11 20:17:29,880:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-11 20:17:33,874:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7523_key-certbot.pem 2024-02-11 20:17:37,728:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7521_csr-certbot.pem 2024-02-11 20:17:37,728:DEBUG:acme.client:Requesting fresh nonce 2024-02-11 20:17:37,728:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-11 20:17:37,905:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-11 20:17:37,906:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:17:37 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GpCmykh-80vpGFwIHV8214S8ZyXyven_E7GKXneKix_JI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-11 20:17:37,907:DEBUG:acme.client:Storing nonce: HpY91-GpCmykh-80vpGFwIHV8214S8ZyXyven_E7GKXneKix_JI 2024-02-11 20:17:37,907:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-02-11 20:17:37,915:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BDbXlraC04MHZwR0Z3SUhWODIxNFM4WnlYeXZlbl9FN0dLWG5lS2l4X0pJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "G-HUDSixQ3fQy8UE8oXY-WhE_REXnxqDlilNoiGqYjlSGrWEZbsZRwS3FYHYgwgGurKDZGfFqKSVB3PM1B3QHEgSk6CWzTiLEybAz__tQsQR9NLi88uydOcfX4EdAswa0mriT1Q1FYh0uQpb3s86nJLpY8DxjYtBGDs0gEccJVG-4DnFYI6SZF0Om3uDx4pxPRSvk06s3vv7m6o56O4ZJsD3mt97-oGceFhvIVaIptFtv7SHUo2kLWZpeSXeLNzJ4TkDlgYVT7rUwKCF8KoinFdkuEDlPJfRyE6dWrtAK0Gd4IGIXeFNxp47WIdcH2dD6z6PdqAfVz82CnSVJW39cw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-11 20:17:38,103:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-11 20:17:38,104:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 11 Feb 2024 19:17:37 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256394317 Replay-Nonce: 63lPIS7zVwryjSOfeuyr7tR1tyWsqsIMdNmEzeiDiVWDzOqYb3c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:17Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540602497" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256394317" } 2024-02-11 20:17:38,104:DEBUG:acme.client:Storing nonce: 63lPIS7zVwryjSOfeuyr7tR1tyWsqsIMdNmEzeiDiVWDzOqYb3c 2024-02-11 20:17:38,104:DEBUG:acme.client:JWS payload: b'' 2024-02-11 20:17:38,110:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540602497: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3pWd3J5alNPZmV1eXI3dFIxdHlXc3FzSU1kTm1FemVpRGlWV0R6T3FZYjNjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA2MDI0OTcifQ", "signature": "vkidVOLKtRyh_4xm3UGcOCfWuwAzY0f2Ly8KOCaprfV-hzZLFkPHxtOvPO7SEy38sT-gR9_BbEBKGb_HSTP8oQKkO3ucEDwF607jLllW3_qKARx2PEN_3Ide4QX6RfCioNtM6P2GjiHzSsKbmtD5oG670vPz88tnioU-1VCKneX4NNLMhSS5TJUfel0L-QSa9TTm51o3lQe3XImxxBbhag-VDJECm7PQtuik8FrZ4kNo5rdpjNeKFxrOSd5OIH003KkJgQpLbvU-AEq6nRta35xi6pEBVEVXKNEgs1cccpGUVnJiythXQSQrynQByzz1otN1Qt2uE61cPplLza_srg", "payload": "" } 2024-02-11 20:17:38,291:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540602497 HTTP/1.1" 200 805 2024-02-11 20:17:38,292:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:17:38 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-Gp1yLfKhBudkHkwrDrhL7UO90yI8e0gk4LXa6SLqOIV2c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:17Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540602497/miLWNg", "token": "pNE-ffvpsYrp3EBdQk_eowX33MtP5Ibt0VZFfM0Eaxg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540602497/oFvs1Q", "token": "pNE-ffvpsYrp3EBdQk_eowX33MtP5Ibt0VZFfM0Eaxg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540602497/iyA7eA", "token": "pNE-ffvpsYrp3EBdQk_eowX33MtP5Ibt0VZFfM0Eaxg" } ] } 2024-02-11 20:17:38,292:DEBUG:acme.client:Storing nonce: HpY91-Gp1yLfKhBudkHkwrDrhL7UO90yI8e0gk4LXa6SLqOIV2c 2024-02-11 20:17:38,293:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-11 20:17:38,293:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-02-11 20:17:38,294:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-11 20:17:38,294:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-11 20:17:38,295:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-11 20:17:38,295:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-11 20:17:38,295:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-11 20:17:38,296:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-11 20:17:38,297:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-11 20:17:38,346:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-11 20:17:38,534:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-11 20:17:38,536:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-11 20:17:38,538:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-11 20:17:38,545:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:36 UTC. 2024-02-11 20:17:38,545:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-11 20:17:38,546:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-11 20:17:38,550:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-11 20:17:38,551:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-11 20:17:38,551:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-11 20:17:38,555:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-11 20:17:38,556:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-11 20:17:38,558:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-11 20:17:39,003:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-11 20:17:39,004:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:17:38 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Muyv5s3o69g": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-11 20:17:39,004:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-11 20:17:43,400:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7524_key-certbot.pem 2024-02-11 20:17:47,258:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7522_csr-certbot.pem 2024-02-11 20:17:47,259:DEBUG:acme.client:Requesting fresh nonce 2024-02-11 20:17:47,259:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-11 20:17:47,420:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-11 20:17:47,421:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:17:47 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o5LzjLcI3RvtoSK9OXB-37AAJZl7KsLpNnj_L6jifexm0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-11 20:17:47,421:DEBUG:acme.client:Storing nonce: 6HUcA-o5LzjLcI3RvtoSK9OXB-37AAJZl7KsLpNnj_L6jifexm0 2024-02-11 20:17:47,421:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-02-11 20:17:47,427:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVMempMY0kzUnZ0b1NLOU9YQi0zN0FBSlpsN0tzTHBObmpfTDZqaWZleG0wIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "C3UDBbW3nJDesoy-mnUG2FRFkYG2rY_h58HLkDAULm0ZJ0GrLj288YYFTarjB7ZzeRBykQRxVdklS8aaql14h3816ljJinBD91_NjAlKS7JCHJEElJ3G1ottRWzLJE3QU6gSOe9eNBxKh7RT6JjMFU4fUoBZ0CuwM6e3GA-hHQCn3qlx2MhAN0Sd_5Klnisr_ljZjXB7IaJI4tHZ1L3z9s4E2T4lMCaCsqXjkqdGkDcgNFLCKBOZUxjKV-tLiwB4cNCx6lQqT0Snr6jGY0zGoM2hQVImIBM5p8TbbwILIOK3krOUIJslPHq3gUUCBy0pnr7-ZG4jxGLvXs8SLvOcVA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-11 20:17:47,661:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-02-11 20:17:47,662:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 11 Feb 2024 19:17:47 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256417567 Replay-Nonce: 6HUcA-o53ArQpfvxVwLwCl7BCdVanWSSWTQ_YtVXaeafPH8EgTE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:26Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540637387" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256417567" } 2024-02-11 20:17:47,662:DEBUG:acme.client:Storing nonce: 6HUcA-o53ArQpfvxVwLwCl7BCdVanWSSWTQ_YtVXaeafPH8EgTE 2024-02-11 20:17:47,662:DEBUG:acme.client:JWS payload: b'' 2024-02-11 20:17:47,668:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540637387: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzUzQXJRcGZ2eFZ3THdDbDdCQ2RWYW5XU1NXVFFfWXRWWGFlYWZQSDhFZ1RFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA2MzczODcifQ", "signature": "LpAxyHijlFrB8H7UMx4eTLT9qXkX1IE2PBC72KErDZ9BWhQgD5OUYIhEnT0ifB3aLPFpVt5G1lK9XmBgwzJdW9zngT_x58AkE5opsPLahhXn0yZi9s8esM_3y3gZTNrTeLwfOOtAZU69rZq6Y47Z4et0EZY4slzZZ1IZThmFk8M9h4rrbPnGdj639xFQOEtfU6ySY9tAm3Jc4jeVfUEoGQWTm5y_NPuUPVznJhP2SFZAu-Z-8F1W0zs5-qeYyMKYCWnHkyWWIsgiewPMm10EN9qE6Udy0QdrHMRX_Ooste7McdSH-7jdFS5y7HMdSjWdmN6NvG76Dcyu0S6v7bvX-Q", "payload": "" } 2024-02-11 20:17:47,827:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540637387 HTTP/1.1" 200 809 2024-02-11 20:17:47,828:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:17:47 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ulWLL3QZYT3-yqvRnhHbDmKq5qxsXQ1aIezxysdv5eV6I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:26Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540637387/K5ceNg", "token": "rQDo_fbJZ77G_xMXzDNJ8BgUZelHjyXDE6-SuLThQZ0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540637387/h5pTLw", "token": "rQDo_fbJZ77G_xMXzDNJ8BgUZelHjyXDE6-SuLThQZ0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540637387/S75ZSA", "token": "rQDo_fbJZ77G_xMXzDNJ8BgUZelHjyXDE6-SuLThQZ0" } ] } 2024-02-11 20:17:47,828:DEBUG:acme.client:Storing nonce: HWHXB1ulWLL3QZYT3-yqvRnhHbDmKq5qxsXQ1aIezxysdv5eV6I 2024-02-11 20:17:47,829:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-11 20:17:47,829:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-02-11 20:17:47,830:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-11 20:17:47,830:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-11 20:17:47,830:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-11 20:17:47,831:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-11 20:17:47,831:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-11 20:17:47,831:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-11 20:17:47,832:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-11 20:17:47,881:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-11 20:17:48,104:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-11 20:17:48,105:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-11 20:17:48,106:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-11 20:17:48,111:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:50 UTC. 2024-02-11 20:17:48,111:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-11 20:17:48,112:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-11 20:17:48,117:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-11 20:17:48,118:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-11 20:17:48,118:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-11 20:17:48,121:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-11 20:17:48,122:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-11 20:17:48,124:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-11 20:17:48,665:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-11 20:17:48,666:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:17:48 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "P1zK86Gn9o0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-11 20:17:48,666:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-11 20:17:52,539:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7525_key-certbot.pem 2024-02-11 20:17:56,374:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7523_csr-certbot.pem 2024-02-11 20:17:56,375:DEBUG:acme.client:Requesting fresh nonce 2024-02-11 20:17:56,375:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-11 20:17:56,557:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-11 20:17:56,557:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:17:56 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 63lPIS7z0Jo957GBhwHVjmjSlZkeUo7VA3uvvwfqMLKZixCRBqE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-11 20:17:56,558:DEBUG:acme.client:Storing nonce: 63lPIS7z0Jo957GBhwHVjmjSlZkeUo7VA3uvvwfqMLKZixCRBqE 2024-02-11 20:17:56,558:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-02-11 20:17:56,564:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3owSm85NTdHQmh3SFZqbWpTbFprZVVvN1ZBM3V2dndmcU1MS1ppeENSQnFFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "csh-LY0mxb9jNOWN5ZLpfJ8n8lo2UYIwtM5vVSlM3WAbHQ9MXDOpSEupzpS7fIWrQR5DktuFim6axyLs7Ep6m4CZXqDEwPCYTpFov9uCA6TRenHxGA5BnQ6lSxHGFDnauy65nJtHfnot0_gIGtowcaZLNpPu9bowdM_2rlx78_GEVhcuR6ixi9f49KQGFtzaJ_8CNm3nfedU-NxIPPBi6hnpauxmHNqOKqkq9u_5tkeLGRlG9GE9GKUvWNG9qMHP7kAkgUsKTOvlPdmqJshoQEUrKq2xX-AI7XbBmpBLw6yxBm5XNSI2NckoC5q1D05PNDnHTc2YxRv2yFiIutZAPw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-11 20:17:56,779:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-02-11 20:17:56,780:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 11 Feb 2024 19:17:56 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256441417 Replay-Nonce: 63lPIS7zHA6XjsNlbrYKU73PdCtoUNUiW5uuBSdK2V2FaOl7d7o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:36Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540672207" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256441417" } 2024-02-11 20:17:56,781:DEBUG:acme.client:Storing nonce: 63lPIS7zHA6XjsNlbrYKU73PdCtoUNUiW5uuBSdK2V2FaOl7d7o 2024-02-11 20:17:56,782:DEBUG:acme.client:JWS payload: b'' 2024-02-11 20:17:56,789:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540672207: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3pIQTZYanNObGJyWUtVNzNQZEN0b1VOVWlXNXV1QlNkSzJWMkZhT2w3ZDdvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA2NzIyMDcifQ", "signature": "d2-ToyAOAJVbfvVLZx6mike_CgXFnrgkP0rL4VvOGbPifP68WhZtt_l7Jp0df-H9QE8bXIwslrhGE1Y8rCqVARZs9uBdJfkhWDEHZq_T3xGKf_Sqy2Vkq9ru-3TGdtAuw1YneI3QBR5i4tjjAcvSjHl-MzDk-xzMUIJjBcdRPnUuvJsqnBYUDqDuRiSy04lTFvNkjbCSn6FW7a_SDou3BoeXGuUEbD7nlxxltNkfH8Q9v8UsOuCwzJCOsjm8Ox51fIVC3dUW-dSse-zRypdIdS7Vrrr_87UXb-wOILHxlRfjRL3IhpsEOoVThonDcTk1Y87PNmz06ihI_eC0i5bIKA", "payload": "" } 2024-02-11 20:17:56,974:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540672207 HTTP/1.1" 200 806 2024-02-11 20:17:56,974:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:17:56 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GpQ7mI6W4SBMepgza44CmjFMtHpXk5K4HtaVnseJ-Hjng X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:36Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540672207/cHbPmQ", "token": "qjTrRwnMu8erDJdXc4snHnVEqSIvVb96brAl4wm-Ifo" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540672207/w9R_yw", "token": "qjTrRwnMu8erDJdXc4snHnVEqSIvVb96brAl4wm-Ifo" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540672207/Hm4ubg", "token": "qjTrRwnMu8erDJdXc4snHnVEqSIvVb96brAl4wm-Ifo" } ] } 2024-02-11 20:17:56,974:DEBUG:acme.client:Storing nonce: HpY91-GpQ7mI6W4SBMepgza44CmjFMtHpXk5K4HtaVnseJ-Hjng 2024-02-11 20:17:56,975:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-11 20:17:56,975:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-02-11 20:17:56,976:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-11 20:17:56,976:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-11 20:17:56,977:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-11 20:17:56,977:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-11 20:17:56,977:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-11 20:17:56,977:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-11 20:17:56,979:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-11 20:17:57,024:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-02-11 20:17:57,024:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-11 20:17:57,025:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-02-11 20:17:57,032:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-02-11 20:17:57,035:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-02-11 20:17:57,035:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-02-11 20:17:57,035:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-02-11 20:17:57,035:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-02-11 20:17:57,037:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-02-11 20:17:57,075:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-11 20:17:57,317:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-11 20:17:57,318:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-11 20:17:57,319:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-11 20:17:57,324:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:07 UTC. 2024-02-11 20:17:57,325:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-11 20:17:57,325:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-11 20:17:57,330:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-11 20:17:57,330:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-11 20:17:57,331:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-11 20:17:57,335:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-11 20:17:57,336:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-11 20:17:57,338:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-11 20:17:57,787:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-11 20:17:57,788:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:17:57 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "rY7CgRllWVo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-11 20:17:57,788:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-11 20:18:02,000:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7526_key-certbot.pem 2024-02-11 20:18:05,955:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7524_csr-certbot.pem 2024-02-11 20:18:05,955:DEBUG:acme.client:Requesting fresh nonce 2024-02-11 20:18:05,955:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-11 20:18:06,117:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-11 20:18:06,118:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:18:05 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ulSkR199xszU-oXoAAcOK5mveZ8b-FMTWuklUTyPLL2-8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-11 20:18:06,118:DEBUG:acme.client:Storing nonce: HWHXB1ulSkR199xszU-oXoAAcOK5mveZ8b-FMTWuklUTyPLL2-8 2024-02-11 20:18:06,118:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-02-11 20:18:06,124:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWxTa1IxOTl4c3pVLW9Yb0FBY09LNW12ZVo4Yi1GTVRXdWtsVVR5UExMMi04IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "vACqVETV_goSslkPjY-OCzVfsApbem6Gw-s1qa4jm4Q01bf7i7fN5qEDspOmg3bC4U3EmHb4uhpvBb44v6BkeQ3bk82qhA1tuyqMv-QvN3bNgdt9nBIbjuANfSjplQFh6C4cO3OZ5Fy-B6LI8QZLcyGL6Y7sVVTVzWujo3J4HxhWuZncnjmPxVWl4_gq3Fgtf3Btz-L6OdaZO859RZNpxDeBsLYpP7xrC3Xpji3PSloRq-InXCu6jNBA-8DFH1HZy9COFTih2tVy-Y-wkw6Zfwadfwl3Hv4M2IMulw2qsA3ZU4xHS-fxOn_DjsBwEpNKRoRTXbWIM8V5dlmKZ8FbZA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-11 20:18:06,317:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-02-11 20:18:06,318:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 11 Feb 2024 19:18:06 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256462697 Replay-Nonce: 6HUcA-o5ADJWd-9ep2b2iajbtgcBDAdA9amGeIpoELSqc-SY8Ts X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:45Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540704157" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256462697" } 2024-02-11 20:18:06,318:DEBUG:acme.client:Storing nonce: 6HUcA-o5ADJWd-9ep2b2iajbtgcBDAdA9amGeIpoELSqc-SY8Ts 2024-02-11 20:18:06,318:DEBUG:acme.client:JWS payload: b'' 2024-02-11 20:18:06,324:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540704157: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVBREpXZC05ZXAyYjJpYWpidGdjQkRBZEE5YW1HZUlwb0VMU3FjLVNZOFRzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA3MDQxNTcifQ", "signature": "Z-j3Jx56CezC1B7_nEn8p-G4xtxm2vTQCI55Pxes4zx6B75E3_U6vkLhARHnHlCMPgLtRZveFDkKSD-S0iwFwY_bD3BnQm9ZIkT06DY_LxcrnJHYC0v5eJjUp7X_dLSUiOSudPJo2O31MQIOIWNWqWMPC5e3pFN_nIK0yRh9CehD9w64GDNGHJWdqWFkmiIXRAiOV7hZ5BK3HCH_KpxjwpcYq03VfwVXJL1jT8izZHYa_3uvi5RMDz-1wYGy4gzfIB8cmIogE-dxJf4mDLjOb9dtFCu9QFytGI5QzNvROaVq7o3I6OnrfMOSPYDg0RgROCxycT5SBpXYhShSYq2Row", "payload": "" } 2024-02-11 20:18:06,490:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540704157 HTTP/1.1" 200 811 2024-02-11 20:18:06,490:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:18:06 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ul4eDfAtAYCAH7KCYZXaiR_JRpXtzGyAUpNp-Syomjh8I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:45Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540704157/62ck5w", "token": "N5OAGNuMlPq5wVogNdMQl67gxh-DN3DOXmuMLJugFCo" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540704157/BJFdnw", "token": "N5OAGNuMlPq5wVogNdMQl67gxh-DN3DOXmuMLJugFCo" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540704157/eTpKlQ", "token": "N5OAGNuMlPq5wVogNdMQl67gxh-DN3DOXmuMLJugFCo" } ] } 2024-02-11 20:18:06,491:DEBUG:acme.client:Storing nonce: HWHXB1ul4eDfAtAYCAH7KCYZXaiR_JRpXtzGyAUpNp-Syomjh8I 2024-02-11 20:18:06,491:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-11 20:18:06,492:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-02-11 20:18:06,492:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-11 20:18:06,492:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-11 20:18:06,493:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-11 20:18:06,493:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-11 20:18:06,493:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-11 20:18:06,494:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-11 20:18:06,495:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-11 20:18:06,558:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-11 20:18:06,740:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-11 20:18:06,741:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-11 20:18:06,742:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-11 20:18:06,746:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:31 UTC. 2024-02-11 20:18:06,746:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-11 20:18:06,747:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-11 20:18:06,752:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-11 20:18:06,752:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-11 20:18:06,752:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-11 20:18:06,757:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-11 20:18:06,757:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-11 20:18:06,760:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-11 20:18:07,219:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-11 20:18:07,219:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:18:06 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "L2-g3Y04SDk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-11 20:18:07,220:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-11 20:18:11,557:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7527_key-certbot.pem 2024-02-11 20:18:15,412:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7525_csr-certbot.pem 2024-02-11 20:18:15,412:DEBUG:acme.client:Requesting fresh nonce 2024-02-11 20:18:15,412:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-11 20:18:15,567:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-11 20:18:15,568:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:18:15 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o5hSQHx0ARtdnOO8YptIUdUz7iZg59oJTvj3MljQlF2kE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-11 20:18:15,568:DEBUG:acme.client:Storing nonce: 6HUcA-o5hSQHx0ARtdnOO8YptIUdUz7iZg59oJTvj3MljQlF2kE 2024-02-11 20:18:15,571:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-02-11 20:18:15,576:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVoU1FIeDBBUnRkbk9POFlwdElVZFV6N2laZzU5b0pUdmozTWxqUWxGMmtFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "GZbPCc_y9DgKTD-gdbytbFwUtSWCXnGlViBR9yq6aPuhnVDPQT9jBOKGOWdB97BJKDHsXjWNGZWXtuu9rCGui4P5FaKV_aatWuda7asP9A2P4Gtfor_9hj0wIz7wbdrzks7N9Wp72ghnNrgCMFfusgxcAZgij7vfh1dRf8vs9WFicaDgpGfR5kS9YijcKHPG5yT13D1ZvtmUBDbYo_Cc6Ib583LMqgIcMV8MoUFBNBD22MXqpE1I_i76Jhr_GNTT9E4AO2O3JbE1Vb-ehtEBoIXReZoDS-0RyCC6WYgT80ow1QMloAZxG65qaoDnYjf0yDpAlelCOuODiQcXGMwm-Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-11 20:18:15,766:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-02-11 20:18:15,767:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 11 Feb 2024 19:18:15 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256484587 Replay-Nonce: 6HUcA-o5tu90q6M4NlLMtaLKok2TXzrR0EM9jOO6duFz9MPiI7c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:27:54Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540734247" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256484587" } 2024-02-11 20:18:15,767:DEBUG:acme.client:Storing nonce: 6HUcA-o5tu90q6M4NlLMtaLKok2TXzrR0EM9jOO6duFz9MPiI7c 2024-02-11 20:18:15,767:DEBUG:acme.client:JWS payload: b'' 2024-02-11 20:18:15,772:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540734247: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzV0dTkwcTZNNE5sTE10YUxLb2syVFh6clIwRU05ak9PNmR1Rno5TVBpSTdjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA3MzQyNDcifQ", "signature": "sXGeiEehPpzorn8_tngmeujiJ8zgvyq8otzZ_Td0nEKlk-38SS34ptF-uzg66mNKqj8AZV839qMD_Xr4xvWLDcbiKjodNnWfeQXVPLYNT5Rej8JNNTLDlQGvS1AyXGi1oNG4vSuXC7ABTD9sSLJaBHJk5KIyONrjUVBaaMaj4j2EVoo6BpTthXNr1DPSg5arB42XhLOxYDUvE5f3ylI-Ozwycos7PEGYCkvFhLep4z18LmRtstrZnqzkg4V9DkYLr7dupcgqr_LkFzjC9ALw6ZwEUrL2uIDm9m8o_ZXATKTTXYla7o6aGqdO08PuYTFF6BX7dGDQaaywI5lWhudS2Q", "payload": "" } 2024-02-11 20:18:15,974:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540734247 HTTP/1.1" 200 810 2024-02-11 20:18:15,974:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:18:15 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ulcCfH8FW0I-5sHJkdZ3FsSBDHiAphIZiH1VXikkvINwg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:27:54Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540734247/QhhIwA", "token": "fIJN8ZHL3VyhngYKMiarHrjh5Gae2nH2_mbQusoasGg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540734247/zrc52g", "token": "fIJN8ZHL3VyhngYKMiarHrjh5Gae2nH2_mbQusoasGg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540734247/3Cf07Q", "token": "fIJN8ZHL3VyhngYKMiarHrjh5Gae2nH2_mbQusoasGg" } ] } 2024-02-11 20:18:15,975:DEBUG:acme.client:Storing nonce: HWHXB1ulcCfH8FW0I-5sHJkdZ3FsSBDHiAphIZiH1VXikkvINwg 2024-02-11 20:18:15,975:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-11 20:18:15,975:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-02-11 20:18:15,976:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-11 20:18:15,976:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-11 20:18:15,977:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-11 20:18:15,977:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-11 20:18:15,977:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-11 20:18:15,978:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-11 20:18:15,979:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-11 20:18:16,028:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-11 20:18:16,191:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-11 20:18:16,193:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-02-11 20:18:16,193:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-02-11 20:18:16,198:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:09 UTC. 2024-02-11 20:18:16,198:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-11 20:18:16,198:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-11 20:18:16,203:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-11 20:18:16,203:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-11 20:18:16,203:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-11 20:18:16,207:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-11 20:18:16,208:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-11 20:18:16,210:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-11 20:18:16,676:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-11 20:18:16,677:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:18:16 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "0aHxhvE1HQw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-11 20:18:16,677:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-11 20:18:20,890:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7528_key-certbot.pem 2024-02-11 20:18:24,750:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7526_csr-certbot.pem 2024-02-11 20:18:24,751:DEBUG:acme.client:Requesting fresh nonce 2024-02-11 20:18:24,751:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-11 20:18:24,904:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-11 20:18:24,904:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:18:24 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o5xf5l1D6g_C9I0FZk0cLVOhUJLP4mXm3uqhlE8fH2Eck X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-11 20:18:24,905:DEBUG:acme.client:Storing nonce: 6HUcA-o5xf5l1D6g_C9I0FZk0cLVOhUJLP4mXm3uqhlE8fH2Eck 2024-02-11 20:18:24,905:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-02-11 20:18:24,910:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzV4ZjVsMUQ2Z19DOUkwRlprMGNMVk9oVUpMUDRtWG0zdXFobEU4ZkgyRWNrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "RREKJYlq44AfcX8HE9lFhaxVF8Ke5mp5XX3HWr1090i-Cxs7PWQOz7AYbRxRaPWS4r6UePJ6s7IGU-ZaWWKbRX3OasdL671W70z1-fPIYAf1qFWVCErFbq_c-80YQwihGSAii0Gcm4jsdAkpuV46VeF7Zo4-3FdoSFnyREpXPnHtxct3BwfBii6CVxLOz4dal5k5saEV40eq3yhReLX9zBTSkBwS3Htour6BFm7J685ozWCxu9hbpDos-lNetNtmonWq7wSXZcY1eA-eN6qNpPaYWVAwgdGJozSG4xGLshBZSLoQiT6t-wbtEAzNMuC-VRRCwAXhardlBEmlOmFcmA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-11 20:18:25,081:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-02-11 20:18:25,081:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 11 Feb 2024 19:18:24 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256513597 Replay-Nonce: HWHXB1ulf1nNO81kUqVqC4bL7YlEgWkfqBiA3SBo83hd5Wuc29A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:28:03Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540772027" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256513597" } 2024-02-11 20:18:25,082:DEBUG:acme.client:Storing nonce: HWHXB1ulf1nNO81kUqVqC4bL7YlEgWkfqBiA3SBo83hd5Wuc29A 2024-02-11 20:18:25,082:DEBUG:acme.client:JWS payload: b'' 2024-02-11 20:18:25,088:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540772027: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWxmMW5OTzgxa1VxVnFDNGJMN1lsRWdXa2ZxQmlBM1NCbzgzaGQ1V3VjMjlBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA3NzIwMjcifQ", "signature": "Je9hIXXAE6cY84GdlGpwhPM3VEI5AL3hObk4tq3JDiT7A6ulxaK_wQYJm27F-lPQg-mfDIZqIOZgHfQii3Kpz8jSAGe8tDl8DK5TKx-WxanaCLpjJptb23bzsLflGEEMJL2zuUuBGPxaeQo4nLDbcpnbZUNdYgt8ExSYFPirfIgV02upGL80sPAJ213_0pS7fSmBav5iGNB7ohqrElIAdzXwPObcXTXqWCbXSryDyaIo8dgp8zZj2slSM0lvt4N0VLa3TiJwtljlqneUVbnxpLaF9xav07lbnZd6jxRIBCbjzvrgkY6QIO3B1dM0dG5c3s4-JA1fyRqsnclnDQFqTg", "payload": "" } 2024-02-11 20:18:25,258:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540772027 HTTP/1.1" 200 809 2024-02-11 20:18:25,259:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:18:24 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o5Gfr8hlrsUEDf8_Ez9U0Xo5aRLdbelc6PelnVYBB-TaU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:28:03Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540772027/6vejxw", "token": "dx8dAtRrvWZPG_3QR_npx78MSNAxtOyiO70IZr2x6Iw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540772027/m1WT-w", "token": "dx8dAtRrvWZPG_3QR_npx78MSNAxtOyiO70IZr2x6Iw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540772027/53Jzvw", "token": "dx8dAtRrvWZPG_3QR_npx78MSNAxtOyiO70IZr2x6Iw" } ] } 2024-02-11 20:18:25,259:DEBUG:acme.client:Storing nonce: 6HUcA-o5Gfr8hlrsUEDf8_Ez9U0Xo5aRLdbelc6PelnVYBB-TaU 2024-02-11 20:18:25,260:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-11 20:18:25,260:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-02-11 20:18:25,260:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-11 20:18:25,261:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-11 20:18:25,261:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-11 20:18:25,262:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-11 20:18:25,262:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-11 20:18:25,262:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-11 20:18:25,263:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-11 20:18:25,303:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-11 20:18:25,533:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-11 20:18:25,534:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is signed by the certificate's issuer. 2024-02-11 20:18:25,535:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD 2024-02-11 20:18:25,539:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:26 UTC. 2024-02-11 20:18:25,539:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-11 20:18:25,540:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-11 20:18:25,544:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-11 20:18:25,544:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-11 20:18:25,544:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-11 20:18:25,549:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-11 20:18:25,549:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-11 20:18:25,552:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-11 20:18:26,015:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-11 20:18:26,016:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:18:25 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "DVyv_IvFa8E": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-11 20:18:26,016:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-11 20:18:30,520:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7529_key-certbot.pem 2024-02-11 20:18:34,345:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7527_csr-certbot.pem 2024-02-11 20:18:34,346:DEBUG:acme.client:Requesting fresh nonce 2024-02-11 20:18:34,346:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-11 20:18:34,502:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-11 20:18:34,503:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:18:34 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ulVDI5gCwf9Vs_uathE59hBZpPgW3MANicKpEoaV4caIw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-11 20:18:34,503:DEBUG:acme.client:Storing nonce: HWHXB1ulVDI5gCwf9Vs_uathE59hBZpPgW3MANicKpEoaV4caIw 2024-02-11 20:18:34,503:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-02-11 20:18:34,509:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWxWREk1Z0N3ZjlWc191YXRoRTU5aEJacFBnVzNNQU5pY0twRW9hVjRjYUl3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Y84OnHxgzC8t8Iw1m87PIMZ4hSRWePuaNMVl6Fu_VOtWuNWyg2ocSy3LUoaJ_FsG_aA9zMUeQpJ9iAohWrNA6nfsgdwvFazKn0YEiMOEslilPgf59RezvXSQiWBSfuaJEhXVDWIPwDMDtIPCWvbdwMf_enQSvcwEtDjVxxNJAeOzBvsU8jvihN8TK0LJ-hKlNYudVwhJhrQqSDZEiZ6tr1yXtScLCQDmfH1EsgkJfOMe3oNIftBBLfpl-r-udaYAcA6gDjiRwUl5SSiIfz1FfaEHpM7R7KEW9lQH6l-jIogxJ8oChJrcZDULS1zd8WJkElyLuKJRI_iSgelUCc4aZg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-11 20:18:34,691:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-11 20:18:34,692:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 11 Feb 2024 19:18:34 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256544587 Replay-Nonce: HWHXB1ulrBw7B6iLg0aM9QCp7Vm4weB6ehlw8xbsEfFiOWDs3aE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:28:13Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540813967" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256544587" } 2024-02-11 20:18:34,692:DEBUG:acme.client:Storing nonce: HWHXB1ulrBw7B6iLg0aM9QCp7Vm4weB6ehlw8xbsEfFiOWDs3aE 2024-02-11 20:18:34,692:DEBUG:acme.client:JWS payload: b'' 2024-02-11 20:18:34,698:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540813967: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWxyQnc3QjZpTGcwYU05UUNwN1ZtNHdlQjZlaGx3OHhic0VmRmlPV0RzM2FFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA4MTM5NjcifQ", "signature": "ortcWze0GYYHamL6JF7H7SNcf9V8cqkNIVykms_nJOdvJb_3QBnxwMUobTz32Dt6C0yPI3VThkpHJlaEdn-F9jUvS0dFBQ3J2Vs5RXy1oPAY2l9C-ipTeG0S__YU2hnW1hLtCeQv059oq589FGNgdBT1DgJT6F1KjGl3WKdTVQEicxq5j7895L0pxK_1SGbUVqfN75jO6PtfryOXJOvq63tHz14MlmhXRooYUAbFBs3G1nsPkkfuLfoe-v3ZmunbA5PAgZiuGCBvwwheKLU-2DwDaWQ3od0R1A4uTB8jop5OWOJjTkn3bjxnECRwU-5F7hVKDK5M4iDCFgR0XxQasg", "payload": "" } 2024-02-11 20:18:34,953:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540813967 HTTP/1.1" 200 805 2024-02-11 20:18:34,953:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:18:34 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o5lDyJaU7J0WnK_3yyvbDo9yR_5upIRllYRQ3TzOqtUF8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:28:13Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540813967/QS3xjQ", "token": "Giw2SKEZArhw1cAd0QrBh2IQ4Gldqfhc9_Txzga0eYM" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540813967/GcxOwg", "token": "Giw2SKEZArhw1cAd0QrBh2IQ4Gldqfhc9_Txzga0eYM" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540813967/pdWHtQ", "token": "Giw2SKEZArhw1cAd0QrBh2IQ4Gldqfhc9_Txzga0eYM" } ] } 2024-02-11 20:18:34,954:DEBUG:acme.client:Storing nonce: 6HUcA-o5lDyJaU7J0WnK_3yyvbDo9yR_5upIRllYRQ3TzOqtUF8 2024-02-11 20:18:34,954:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-11 20:18:34,954:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-02-11 20:18:34,955:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-11 20:18:34,955:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-11 20:18:34,956:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-11 20:18:34,956:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-11 20:18:34,956:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-11 20:18:34,956:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-11 20:18:34,958:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-11 20:18:35,005:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-11 20:18:35,183:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-11 20:18:35,184:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-11 20:18:35,185:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-11 20:18:35,189:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:43 UTC. 2024-02-11 20:18:35,189:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-11 20:18:35,190:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-11 20:18:35,196:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-11 20:18:35,197:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-11 20:18:35,197:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-11 20:18:35,202:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-11 20:18:35,203:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-11 20:18:35,206:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-11 20:18:35,651:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-11 20:18:35,652:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:18:35 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "IbCRx99XxfQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-11 20:18:35,652:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-11 20:18:40,339:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7530_key-certbot.pem 2024-02-11 20:18:44,199:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7528_csr-certbot.pem 2024-02-11 20:18:44,199:DEBUG:acme.client:Requesting fresh nonce 2024-02-11 20:18:44,199:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-11 20:18:44,351:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-11 20:18:44,352:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:18:44 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o5MHLC49rmx18MEatxPiagm3mSoOGcMN5xi8w6tC9jpvA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-11 20:18:44,352:DEBUG:acme.client:Storing nonce: 6HUcA-o5MHLC49rmx18MEatxPiagm3mSoOGcMN5xi8w6tC9jpvA 2024-02-11 20:18:44,352:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-02-11 20:18:44,359:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVNSExDNDlybXgxOE1FYXR4UGlhZ20zbVNvT0djTU41eGk4dzZ0QzlqcHZBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "DpTZDNSlvWsuGO9fYERAOgkg5lrsc22Y_qoDr9wqndHngMVwWnODGY4ec1-ADg4pH_x-o9YSUehKt3ZuepEcNue-S_1xhL_6BAlh76RHtbh1D-_uhZF64STChPaOodRqYG3ZUb0JhEYuD9T4Pzxj4ejVq7YGiWoFlqdYMO5Nd_mYNHn2y8dHRACZkEWl26Du3NOxcMVjCYo4qgCT1PIQb7C6m6sVE6yCfClMOGgxTF9LRFtLFZeb7tDYKNRvtTrNrDy1SEw46eEQRE0X7FmkvHmd7V1O3ZBAe9WztuEjDtzVFaiRwW1MdFsv_yDDFi4hmzberW3foKaIwPYSliXcHw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-11 20:18:44,594:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-11 20:18:44,594:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 11 Feb 2024 19:18:44 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256570667 Replay-Nonce: 6HUcA-o5Dy9Eg2L0vul9hq-9f6ydrJVk_pVLovjdURFYs3kOiB8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:28:22Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540850567" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256570667" } 2024-02-11 20:18:44,594:DEBUG:acme.client:Storing nonce: 6HUcA-o5Dy9Eg2L0vul9hq-9f6ydrJVk_pVLovjdURFYs3kOiB8 2024-02-11 20:18:44,595:DEBUG:acme.client:JWS payload: b'' 2024-02-11 20:18:44,600:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540850567: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVEeTlFZzJMMHZ1bDlocS05ZjZ5ZHJKVmtfcFZMb3ZqZFVSRllzM2tPaUI4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA4NTA1NjcifQ", "signature": "lHCN5aGl_KWN6HSYz9QFX2sboHO98rERTvKxn0i-mVZpkh9rb1BfKgnYk_FooftzwW16Kv5MfkOlMFl9rm0ZUSPQ5rJmOpSgy3m4ylB1ZhhJ2GtHc8uVZ73McpfJdM87ibCNGX4CJD6IynxEu49kFfTv76_zoIw32IodnS7tDmplFtoPkHga-sxBljTLuHF1nE_aZboVb1Ny7dkB2kVrN4quu0goBd429FZkxHikJK7Hx3F_FFiI6ah5Usp-HTKhpBngeIVc2uijD_fbCTPhrU8G1JpvMMujQnQ1mmcPkIr_uEvTK-CT2_JfTHcTjLie5AMJLwu1rhYPwfX9aKF2lg", "payload": "" } 2024-02-11 20:18:44,765:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540850567 HTTP/1.1" 200 805 2024-02-11 20:18:44,765:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:18:44 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o545b9SuUduBJ5HmlH6Jrv03K6f92ZgOkrFFKtP6DbZN4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:28:22Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540850567/9KsoFg", "token": "F_vhJNcuPiQNg87Bt2dXah4EyIxvrvDquKYXpvMqAbQ" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540850567/qRG9hA", "token": "F_vhJNcuPiQNg87Bt2dXah4EyIxvrvDquKYXpvMqAbQ" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540850567/TwBIlQ", "token": "F_vhJNcuPiQNg87Bt2dXah4EyIxvrvDquKYXpvMqAbQ" } ] } 2024-02-11 20:18:44,766:DEBUG:acme.client:Storing nonce: 6HUcA-o545b9SuUduBJ5HmlH6Jrv03K6f92ZgOkrFFKtP6DbZN4 2024-02-11 20:18:44,766:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-11 20:18:44,767:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-02-11 20:18:44,767:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-11 20:18:44,768:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-11 20:18:44,769:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-11 20:18:44,769:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-11 20:18:44,769:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-11 20:18:44,769:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-11 20:18:44,770:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-11 20:18:44,816:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-11 20:18:44,830:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-11 20:18:44,831:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-11 20:18:44,831:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-11 20:18:44,835:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:40:02 UTC. 2024-02-11 20:18:44,835:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-11 20:18:44,836:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-11 20:18:44,842:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-11 20:18:44,842:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-11 20:18:44,843:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-11 20:18:44,847:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-11 20:18:44,848:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-11 20:18:44,850:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-11 20:18:45,383:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-11 20:18:45,383:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:18:45 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "z4jim1uMcVw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-02-11 20:18:45,384:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-11 20:18:49,552:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7531_key-certbot.pem 2024-02-11 20:18:53,440:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7529_csr-certbot.pem 2024-02-11 20:18:53,441:DEBUG:acme.client:Requesting fresh nonce 2024-02-11 20:18:53,441:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-11 20:18:53,620:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-11 20:18:53,620:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:18:53 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 63lPIS7zFLmpP2fbvOMSd3GAK8xNL_THgwkc9r3a9MrFGmLWcK4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-11 20:18:53,620:DEBUG:acme.client:Storing nonce: 63lPIS7zFLmpP2fbvOMSd3GAK8xNL_THgwkc9r3a9MrFGmLWcK4 2024-02-11 20:18:53,621:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-02-11 20:18:53,626:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3pGTG1wUDJmYnZPTVNkM0dBSzh4TkxfVEhnd2tjOXIzYTlNckZHbUxXY0s0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "XsCZBsISZbtPtUGkDpXJJhjIPE7a41UngEPdpLP-zLDAlfx5L-rVU-aiyj1tITcfPH6GTKCpZ0wyIbRLhiOCj8dFcz2Med5Y307QRKsPRjBZypwtQ2L0C1GuU0caF2_HNvcyHmD5TPbusdSrf_sEk1qTy9FBaXwCmniwab7IB47zG5ByjtDEoBGjf-iX-oYopTz0QEhNe7Rmg2gJofesj2RWW1ZGY41W2YHjK1NSy9_KPj0bATQQrIoth-qQH_KVK2WcZr6oXODkuxHfXXUzuye6ZkK-svYCT0GOTCxH_UnTDL2MLWu22O_jj_6-FKPbM64uc5UNTHQw3D8V8z9sOw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-11 20:18:53,820:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-11 20:18:53,820:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 11 Feb 2024 19:18:53 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/243256595137 Replay-Nonce: HpY91-GpsBP_c3n6oiZKKoABz_ON_BDsvbf6vlCfBS0rJqJ_uog X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-17T02:28:31Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540885967" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/243256595137" } 2024-02-11 20:18:53,821:DEBUG:acme.client:Storing nonce: HpY91-GpsBP_c3n6oiZKKoABz_ON_BDsvbf6vlCfBS0rJqJ_uog 2024-02-11 20:18:53,821:DEBUG:acme.client:JWS payload: b'' 2024-02-11 20:18:53,826:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/313540885967: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BzQlBfYzNuNm9pWktLb0FCel9PTl9CRHN2YmY2dmxDZkJTMHJKcUpfdW9nIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTM1NDA4ODU5NjcifQ", "signature": "Dh1OyE44fiEvswzS-GB41rsaeMl7jgApiGyukOwWuMo55QDkxUTsaqjYGeUgktEmcawmgZQMXml_Vy3OarGNhC0glekl-cKaAWFc9HIXfOQy5WAMI1ZCy4OnFolcwh4uR9ZknsxiVmn8xMn-IyLGOLocQkA1pCY4n9kicMTh_B9YeVexake4u1N9kD1a4lkdoRh2fE72Pgttb-CYAJNW4Qzk1V2IZzl0Sts3eeqQ0bCd_hSXFZpa_dTpOzJMOTMC0W0rOqupJg7p3dCAEcXd6A3jk1DJ1lePtLprix8SoQiVwLwVDLTsLQ_6UKXH_e2wtXJ-AOZyhBxUvZ_80CMTKg", "payload": "" } 2024-02-11 20:18:54,010:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/313540885967 HTTP/1.1" 200 805 2024-02-11 20:18:54,010:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 11 Feb 2024 19:18:53 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GpPIqonqCJv6pe1MX2s5LGyUlA1KFoK285WwIipog7M3Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-17T02:28:31Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540885967/OUXDhQ", "token": "M6pE59XecoDIFeZmQ2fOLVruWYIn_qwzTAv5ez_ACcw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540885967/gxpKtA", "token": "M6pE59XecoDIFeZmQ2fOLVruWYIn_qwzTAv5ez_ACcw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/313540885967/ovBk4w", "token": "M6pE59XecoDIFeZmQ2fOLVruWYIn_qwzTAv5ez_ACcw" } ] } 2024-02-11 20:18:54,010:DEBUG:acme.client:Storing nonce: HpY91-GpPIqonqCJv6pe1MX2s5LGyUlA1KFoK285WwIipog7M3Y 2024-02-11 20:18:54,011:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-11 20:18:54,011:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-02-11 20:18:54,012:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-11 20:18:54,012:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-11 20:18:54,013:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-11 20:18:54,013:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-11 20:18:54,013:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-11 20:18:54,013:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-11 20:18:54,015:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-11 20:18:54,015:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-02-11 20:18:54,015:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-02-11 20:18:54,016:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-02-11 20:18:54,017:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)