2024-02-09 02:51:20,890:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-02-09 02:51:20,891:DEBUG:certbot._internal.main:Arguments: [] 2024-02-09 02:51:20,891:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-02-09 02:51:21,671:DEBUG:certbot._internal.log:Root logging level set at 20 2024-02-09 02:51:21,671:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-02-09 02:51:21,715:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-02-09 02:51:21,769:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-09 02:51:22,034:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-09 02:51:22,046:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is signed by the certificate's issuer. 2024-02-09 02:51:22,050:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is: OCSPCertStatus.GOOD 2024-02-09 02:51:22,058:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:15 UTC. 2024-02-09 02:51:22,058:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-09 02:51:22,058:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-09 02:51:22,063:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-09 02:51:22,063:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-09 02:51:22,063:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-09 02:51:22,069:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-09 02:51:22,070:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-09 02:51:22,071:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-09 02:51:22,630:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-09 02:51:22,631:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:51:24 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "-BmeammKvD0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-09 02:51:22,632:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-09 02:51:27,493:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7467_key-certbot.pem 2024-02-09 02:51:31,667:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7465_csr-certbot.pem 2024-02-09 02:51:31,667:DEBUG:acme.client:Requesting fresh nonce 2024-02-09 02:51:31,667:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-09 02:51:31,850:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-09 02:51:31,851:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:51:33 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GpRBigFZ5uU6HauXrVzY3EeqCJZGKqvsvfD_cOvTIpA_c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-09 02:51:31,851:DEBUG:acme.client:Storing nonce: HpY91-GpRBigFZ5uU6HauXrVzY3EeqCJZGKqvsvfD_cOvTIpA_c 2024-02-09 02:51:31,852:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-02-09 02:51:31,864:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BSQmlnRlo1dVU2SGF1WHJWelkzRWVxQ0paR0txdnN2ZkRfY092VElwQV9jIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "qCsOiYE0H2tMIsFJJjN4X8ccmDlQ7hRzAbsAZqrZ0wHAcOQO4bEcAN0hmoAeIRNmRLMtlySU9UDD26uYfKBIXuNN8FznwsLS0-8ALkUg8CWkK-DskW7R8lzwALyfyhvI1hYa7AB0Gmcu29XlPA4h_u_1A-PTFJTuND5erTMCaK6MqRXyjUgo_3fsqxoIlkRX-d55C8bgwlrBoVjLhnpjjMiq2ffRmddELE5jqkCloAUbBApIQKFWFnCWgLkqXCG81D3nDEHqnm68PtCRlxI2ZPJ83_Yg4R-IWBDAy2Jnle4j61l1cHxOfSbiAoeuHBcZ2Nu2e0mbyHUEk5WCKz4L5g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-09 02:51:32,058:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-02-09 02:51:32,060:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 09 Feb 2024 01:51:33 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308706407 Replay-Nonce: 63lPIS7zNbi_YkNP8KHRyOX_ZGvtH0ThMBOP8D-kX1tT8Hc-b6U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:25:24Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820152497" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308706407" } 2024-02-09 02:51:32,060:DEBUG:acme.client:Storing nonce: 63lPIS7zNbi_YkNP8KHRyOX_ZGvtH0ThMBOP8D-kX1tT8Hc-b6U 2024-02-09 02:51:32,061:DEBUG:acme.client:JWS payload: b'' 2024-02-09 02:51:32,072:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820152497: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3pOYmlfWWtOUDhLSFJ5T1hfWkd2dEgwVGhNQk9QOEQta1gxdFQ4SGMtYjZVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAxNTI0OTcifQ", "signature": "eOzSmGEZhzfK6cDUzK2WEtYySq0ME3QGIdYuGkBNyMBCgBEan2-NYouU1Ngah5dd53sPNjQEIZH1NOiGW2e9XxB61YI7z5JEOfooWtXIJ_i44dG70eyDlyKUiOQwe7LHOfM-WMHAnRNYFDD_eCwJBB384bp0hZP6N6V6oWB8hmiwxCLOxacxJS8jEkoUpPUavjAxDFtsbzI_sIFZqRoGzpr7aRbZjf4KbuRjUuTY-9aojPOAZkLkmiQo1XhuSs8Dek20OJlXnmQ1rgKO8A_HFpn8QXojTlLojaS_zWld3JpEDutot5kF2PiKLX5oNU5a9qJe0741MTg-c9TwBUpWdQ", "payload": "" } 2024-02-09 02:51:32,261:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820152497 HTTP/1.1" 200 810 2024-02-09 02:51:32,261:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:51:33 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GpONGwRCF_ekzUoaoWHXQfVqlog6fpoS57hew82kXT_RA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:25:24Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/GeKDkA", "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/sBY_pA", "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/dU31hg", "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI" } ] } 2024-02-09 02:51:32,262:DEBUG:acme.client:Storing nonce: HpY91-GpONGwRCF_ekzUoaoWHXQfVqlog6fpoS57hew82kXT_RA 2024-02-09 02:51:32,262:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-09 02:51:32,263:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-02-09 02:51:32,263:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-09 02:51:32,263:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-09 02:51:32,276:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-09 02:51:32,277:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-09 02:51:32,277:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-09 02:51:32,277:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-09 02:51:32,283:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-09 02:51:32,322:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-09 02:51:32,556:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-09 02:51:32,558:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-09 02:51:32,560:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-09 02:51:32,568:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:32 UTC. 2024-02-09 02:51:32,568:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-09 02:51:32,568:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-09 02:51:32,580:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-09 02:51:32,580:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-09 02:51:32,581:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-09 02:51:32,595:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-09 02:51:32,596:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-09 02:51:32,598:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-09 02:51:33,043:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-09 02:51:33,045:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:51:34 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "7S-IFY__3FI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-09 02:51:33,046:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-09 02:51:37,589:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7468_key-certbot.pem 2024-02-09 02:51:41,531:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7466_csr-certbot.pem 2024-02-09 02:51:41,531:DEBUG:acme.client:Requesting fresh nonce 2024-02-09 02:51:41,532:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-09 02:51:41,685:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-09 02:51:41,685:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:51:43 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ulGcAGS-LdxsoMMz72naNzaKyX-BgzOaZkwwtz0Jk5HMY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-09 02:51:41,686:DEBUG:acme.client:Storing nonce: HWHXB1ulGcAGS-LdxsoMMz72naNzaKyX-BgzOaZkwwtz0Jk5HMY 2024-02-09 02:51:41,686:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-02-09 02:51:41,691:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSFdIWEIxdWxHY0FHUy1MZHhzb01NejcybmFOemFLeVgtQmd6T2Faa3d3dHowSms1SE1ZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "SsZg1-2paEqaNQuXgrxTeh9PgXAtBwDtiS79qlf_E5_lgxnsoVH6qYd1Br5WASFMyQ7R77k2b7JDuzD-ZNkzEczSfJtY12ukvjSVT74kACPMPysbvuIxdLavnlHm-NKSH5e0mL58HcSNq1hJY1BaKBDBmSnlKvPFL-iHFfyHlxYO-R9ia4meJiCG2h95-lRcpIjF3uY0XsBK3HA39LNVl1YpETjE-ommSzatw6wzC6JAuygF7AfC090mxvmilhhKFPBq0GEUxlVqgMw2LUg8XhoE9qXyW1yG0A6IDsTJGnBoVODM7vz9YU-1hh9HCschG7OO0st4DzBJezTgqg5QVg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-09 02:51:41,873:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-02-09 02:51:41,874:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 09 Feb 2024 01:51:43 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308730387 Replay-Nonce: 6HUcA-o5JGEyZvl15Muenq69aItCSofL0uvrUEfjdgNOyOWM3Sk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:25:33Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820188867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308730387" } 2024-02-09 02:51:41,875:DEBUG:acme.client:Storing nonce: 6HUcA-o5JGEyZvl15Muenq69aItCSofL0uvrUEfjdgNOyOWM3Sk 2024-02-09 02:51:41,876:DEBUG:acme.client:JWS payload: b'' 2024-02-09 02:51:41,884:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820188867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVKR0V5WnZsMTVNdWVucTY5YUl0Q1NvZkwwdXZyVUVmamRnTk95T1dNM1NrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAxODg4NjcifQ", "signature": "ZIwfrz1c_CXzwu_2qNoLYrHct2LZCwYwHhrLFvW2VEpGFd_v3VlKQsGeKdVlutm0KHkmNStLh4rWwzU4AcVZbpu15Uuum_B39BeHKYr0A-831wn3s4wPGEjjmKwM8rKVen-sloE-mWjV8QE1XXsZTuRfEaaOCL3GR0wS9j2Qr6-3M0vXUYmgXJLMIF58wLegZ3RESAkOTE9xW4XIomcatn9PUf7_VxKjAr-4j9cCedWaKILla2MiGG-V07aE6SUdWWOfJpV_B8v5gQSprr3VlHgTCnrJmymKsMiswm7WFnZ07y9HoWdBj9Ma1mQTOEgc2sxE1dB2_phVMU3Sas9DIw", "payload": "" } 2024-02-09 02:51:42,066:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820188867 HTTP/1.1" 200 804 2024-02-09 02:51:42,067:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:51:43 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ulhTczmpt12ZyEvX_QrS4xr7cBOq7bAlsbr-0qbdwVfr0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:25:33Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/Yq7npQ", "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/OkyE8g", "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/IRVMDw", "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU" } ] } 2024-02-09 02:51:42,067:DEBUG:acme.client:Storing nonce: HWHXB1ulhTczmpt12ZyEvX_QrS4xr7cBOq7bAlsbr-0qbdwVfr0 2024-02-09 02:51:42,068:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-09 02:51:42,069:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-02-09 02:51:42,070:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-09 02:51:42,070:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-09 02:51:42,072:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-09 02:51:42,072:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-09 02:51:42,072:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-09 02:51:42,073:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-09 02:51:42,075:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-09 02:51:42,123:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-09 02:51:42,309:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-09 02:51:42,310:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-09 02:51:42,311:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-09 02:51:42,315:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:49 UTC. 2024-02-09 02:51:42,315:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-09 02:51:42,315:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-09 02:51:42,320:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-09 02:51:42,320:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-09 02:51:42,320:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-09 02:51:42,324:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-09 02:51:42,325:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-09 02:51:42,327:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-09 02:51:42,859:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-09 02:51:42,860:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:51:44 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "tIjMJe-pV2k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-02-09 02:51:42,860:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-09 02:51:47,135:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7469_key-certbot.pem 2024-02-09 02:51:50,838:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7467_csr-certbot.pem 2024-02-09 02:51:50,839:DEBUG:acme.client:Requesting fresh nonce 2024-02-09 02:51:50,839:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-09 02:51:51,017:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-09 02:51:51,018:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:51:52 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GpT0F1bkYL0qv0rwJAgHjPXrgmbGU2xpPRO8x5GKA1Dzk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-09 02:51:51,018:DEBUG:acme.client:Storing nonce: HpY91-GpT0F1bkYL0qv0rwJAgHjPXrgmbGU2xpPRO8x5GKA1Dzk 2024-02-09 02:51:51,018:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-02-09 02:51:51,023:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BUMEYxYmtZTDBxdjByd0pBZ0hqUFhyZ21iR1UyeHBQUk84eDVHS0ExRHprIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "FGjQf1YHX62B0jHC-9e4mU0avM1XOFQ-ZDdr7HnuS_p_vcDfYGYSDsqQxDE_qfULkEYsFpzCDHuOPFI2iv3XsUJFhTpXsEakynC0vIw_8NhRp8mykaNnHR2M_SPtHuSGSvEwuyOIrIHQ405gr0kYq1bctzcCcATSVROW5yzIACGTWZrpGtVdmsc3_Z5K3iQLMvcHqMLGXjtCgo64Vj9P-b7iZojXmalUMqnWQwtydcWJy3OzTuF4bhHRaPmVtRv5xJ8pYVQCk_Jt9er-3zCr6l3GKTmHWV_MtpZ1sLDS1ka6LbA93IfoHOsqr9gCLgCq68-C7ovFFpK8Gev4djMdtA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-09 02:51:51,214:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-02-09 02:51:51,215:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 09 Feb 2024 01:51:52 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308754257 Replay-Nonce: HpY91-GpqzvLABphR-BZ9fPeoKLl_Uwpo9mbYTyuxfgiRDMPZik X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:25:42Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820220907" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308754257" } 2024-02-09 02:51:51,215:DEBUG:acme.client:Storing nonce: HpY91-GpqzvLABphR-BZ9fPeoKLl_Uwpo9mbYTyuxfgiRDMPZik 2024-02-09 02:51:51,215:DEBUG:acme.client:JWS payload: b'' 2024-02-09 02:51:51,221:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820220907: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BxenZMQUJwaFItQlo5ZlBlb0tMbF9Vd3BvOW1iWVR5dXhmZ2lSRE1QWmlrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyMjA5MDcifQ", "signature": "EorAoHB2QY1jUUYltr5hJ0mS1W_6pKoIwTnLooXFlI0VhGmcSqxFp-Cp2_NCOyRNl4cKXNf62_UILVAX47gqyopV6zCAyQop0MSIXTrNb7_wDh6peyfhkMTOvBV2HzIozMdSzHNNKFb5WboZl7JmSg8L-GlK2TVLuVT5nz7VzvaWI-uaw6yhQEzmbbSluwB5zDQtE4Ss4VlC1t2Y5FCUoTPGmvXLp0WMBsDcHpdBTmLsmtoMSn9nf4nM5txYYyvoOR24Gwgaa87wM6bcqoQ5Ih_6OKpJaknBfPMERjIZCw3kaOszWgEUNhlNwDMAWh45ETCW2EccDZmh8JOACeo7HQ", "payload": "" } 2024-02-09 02:51:51,402:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820220907 HTTP/1.1" 200 807 2024-02-09 02:51:51,403:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:51:53 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-Gp9Puz85yaWpbDjC2DU6ft4aMfsxarzdCHkFm26a34Ink X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:25:42Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/vlhqAg", "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/p9n_vg", "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/ul63Zg", "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA" } ] } 2024-02-09 02:51:51,403:DEBUG:acme.client:Storing nonce: HpY91-Gp9Puz85yaWpbDjC2DU6ft4aMfsxarzdCHkFm26a34Ink 2024-02-09 02:51:51,404:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-09 02:51:51,405:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-02-09 02:51:51,405:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-09 02:51:51,406:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-09 02:51:51,406:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-09 02:51:51,406:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-09 02:51:51,407:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-09 02:51:51,407:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-09 02:51:51,408:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-09 02:51:51,447:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-09 02:51:51,568:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-09 02:51:51,570:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-09 02:51:51,571:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-09 02:51:51,575:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:03 UTC. 2024-02-09 02:51:51,575:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-09 02:51:51,576:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-09 02:51:51,580:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-09 02:51:51,580:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-09 02:51:51,581:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-09 02:51:51,585:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-09 02:51:51,586:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-09 02:51:51,587:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-09 02:51:52,120:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-09 02:51:52,120:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:51:53 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "FA8pLueNEyQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-09 02:51:52,121:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-09 02:51:56,219:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7470_key-certbot.pem 2024-02-09 02:51:59,988:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7468_csr-certbot.pem 2024-02-09 02:51:59,988:DEBUG:acme.client:Requesting fresh nonce 2024-02-09 02:51:59,989:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-09 02:52:00,167:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-09 02:52:00,168:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:52:01 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GpTGmjtitugxSOnJYtS9EARt9wM--xSzvTXf3OOvaXwfY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-09 02:52:00,169:DEBUG:acme.client:Storing nonce: HpY91-GpTGmjtitugxSOnJYtS9EARt9wM--xSzvTXf3OOvaXwfY 2024-02-09 02:52:00,169:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-02-09 02:52:00,181:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BUR21qdGl0dWd4U09uSll0UzlFQVJ0OXdNLS14U3p2VFhmM09PdmFYd2ZZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "jkEnffLWrtZty8sUWyLCGX6P6qsRP7KztUJssl_RtPqsvv5WPLD8S0T7kbOBWmtCuGQB6vK0DaJa2BViE_Lm-V1u9o_NnOoCICcDylFBK33hT2XTpebDSy99kkbV9yoVF74Zx2aUcpYxSy3gjSggMKGLUIj6mMxy3RIJtibDaJH3DlBVso5siWkAoVYVSfc10iANbwG7AvcNmRSeiEjVvTSAlknnoH2DEsBTLMRxSn-j-BPGbqhHmGxJqy4Mt_jsCi3wVKvmKO-s-d-ZMFGyt_logAT3OjxoTO_nrF8QFJFw_GaKSt0qXIJFGF1VvRhyvaUr35yyGeP4KYFWIEblCg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-09 02:52:00,370:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-02-09 02:52:00,371:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 09 Feb 2024 01:52:01 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308777647 Replay-Nonce: HpY91-Gp_5zz5sHmYLnvsQgA6SUbbSgpWvoNL5FhIMobf0NqVlA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:25:50Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820252177" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308777647" } 2024-02-09 02:52:00,372:DEBUG:acme.client:Storing nonce: HpY91-Gp_5zz5sHmYLnvsQgA6SUbbSgpWvoNL5FhIMobf0NqVlA 2024-02-09 02:52:00,372:DEBUG:acme.client:JWS payload: b'' 2024-02-09 02:52:00,379:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820252177: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BfNXp6NXNIbVlMbnZzUWdBNlNVYmJTZ3BXdm9OTDVGaElNb2JmME5xVmxBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyNTIxNzcifQ", "signature": "I8zkXAY0ixMW0ra_zAgn2PBWWt3a1PjRKDlzsNp1BBJsd2jVuuU23fTxR0r8cRgJdYxioDrPxS5wPDinrU50YpbApdoIMRN0dFktTy5X4lOoGpJmTW4AHt5niGe9PwGWjw_kGbbKgFnxsMohWQya-BkgIMC6V5oHCU2vkCoJVscDmNkPV-yW-rRYctUYddsrsBwWy6EHIUBf-brn-ohYhUIqy_rALX8ry9JQg6vp2tf_stb37Ec9D5tGCMQg2JcYB4WzY88d9t4C2mz37HotlAeSMjH_SzJNRmRMB7YSwvIzFMBVV3clzotd8xRxdCT7j47xKQvHAsInKqqxmIqU3w", "payload": "" } 2024-02-09 02:52:00,561:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820252177 HTTP/1.1" 200 801 2024-02-09 02:52:00,561:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:52:02 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 63lPIS7zq4sSO7P-JFGs3Fl7jIIMmeU8F7ANFulmoTnTe6GWsd4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:25:50Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/WXsY4w", "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/ZwqjFA", "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/HVTsug", "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8" } ] } 2024-02-09 02:52:00,562:DEBUG:acme.client:Storing nonce: 63lPIS7zq4sSO7P-JFGs3Fl7jIIMmeU8F7ANFulmoTnTe6GWsd4 2024-02-09 02:52:00,562:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-09 02:52:00,562:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-02-09 02:52:00,563:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-09 02:52:00,563:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-09 02:52:00,563:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-09 02:52:00,564:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-09 02:52:00,564:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-09 02:52:00,564:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-09 02:52:00,565:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-09 02:52:00,605:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-09 02:52:00,867:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-09 02:52:00,869:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-09 02:52:00,869:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-09 02:52:00,873:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:20 UTC. 2024-02-09 02:52:00,874:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-09 02:52:00,874:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-09 02:52:00,881:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-09 02:52:00,881:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-09 02:52:00,882:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-09 02:52:00,897:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-09 02:52:00,898:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-09 02:52:00,899:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-09 02:52:01,428:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-09 02:52:01,428:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:52:03 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "UyiLKHkJrTU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-09 02:52:01,429:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-09 02:52:05,578:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7471_key-certbot.pem 2024-02-09 02:52:09,529:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7469_csr-certbot.pem 2024-02-09 02:52:09,529:DEBUG:acme.client:Requesting fresh nonce 2024-02-09 02:52:09,529:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-09 02:52:09,706:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-09 02:52:09,706:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:52:11 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 63lPIS7zKQbwzj7KTkrjzbfBAg5ZO-wHreso8q6Qt1SUITPFtW0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-09 02:52:09,707:DEBUG:acme.client:Storing nonce: 63lPIS7zKQbwzj7KTkrjzbfBAg5ZO-wHreso8q6Qt1SUITPFtW0 2024-02-09 02:52:09,707:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-02-09 02:52:09,714:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3pLUWJ3emo3S1Rrcmp6YmZCQWc1Wk8td0hyZXNvOHE2UXQxU1VJVFBGdFcwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "C8UtahlTk8606H_ghMaDZoDF-7eGnIfKIp4dyRlu2jx1Mo4qD-ai8xyh3DLiD9SBjS9V5-aumSoheAcMEkLWD7QTBmAGyuy3JaxfeNYZaMZtFvYxIaNsL5OlMit_s5SLUwplCizkKYpaPwCsg6DPKN_GAavg0_Tp43EKLtFamugXBezqS1rGj3i6NuQYsNXUEhVzWJrzyAHx5HX7m69idoeMrxqibxZx8XIHHRv9dUm-VvpwGF2PPeDLu4PPdjsNC-lyQbM4MxLCGL56wos2xjwCZDINPC2me3B0nMn7vVOt670q-waoWIzfA9ZvLhiAcQBlB368s9D1I9QZzeCioQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-09 02:52:09,903:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-09 02:52:09,904:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 09 Feb 2024 01:52:11 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308800947 Replay-Nonce: 63lPIS7zMJ1no1_EeRlpA9VPAWCZOnljFEVa647pYQJxHRWit2A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:25:59Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820285857" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308800947" } 2024-02-09 02:52:09,904:DEBUG:acme.client:Storing nonce: 63lPIS7zMJ1no1_EeRlpA9VPAWCZOnljFEVa647pYQJxHRWit2A 2024-02-09 02:52:09,904:DEBUG:acme.client:JWS payload: b'' 2024-02-09 02:52:09,909:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820285857: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3pNSjFubzFfRWVSbHBBOVZQQVdDWk9ubGpGRVZhNjQ3cFlRSnhIUldpdDJBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyODU4NTcifQ", "signature": "QZ_1wvegyOfSxMCdZMB4C_CnpT_myUaN3FmVbxdp1DjPjmovL9xaFIz5T0mk3M0Yc47mvF1bUIEpvSLZhwcSx7TYBHozSY27BEJaMZ9S5DGX1ajCO3xnYsI_Nu8IERQd027AwhkgfWc8CZsLELur4j04sM4AyutFTX6farjcZBgt7tEq9xsyNCk1k_w3ZL35P8TKfDD_rLxSTMlyJKID83xrmudPv9X-GvZUBsqwafXiVK3g2EJs1EFbCcQ-61R1RbvEOmQBG8hFVN5LMlmB_e_sMw6fwg7uWmb3xeCuko4XZmASk7lhZAMxgqYZIyul3uNA3alww1FGsTK3-hf0XA", "payload": "" } 2024-02-09 02:52:10,093:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820285857 HTTP/1.1" 200 805 2024-02-09 02:52:10,094:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:52:11 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GprF8GYrrWOCzmfLCJSkqKwsYkffFAdKbZsnOIXNH1NL0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:25:59Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/6M2-8w", "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/NyT6VQ", "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/Wxujog", "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I" } ] } 2024-02-09 02:52:10,094:DEBUG:acme.client:Storing nonce: HpY91-GprF8GYrrWOCzmfLCJSkqKwsYkffFAdKbZsnOIXNH1NL0 2024-02-09 02:52:10,095:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-09 02:52:10,095:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-02-09 02:52:10,096:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-09 02:52:10,096:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-09 02:52:10,098:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-09 02:52:10,098:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-09 02:52:10,098:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-09 02:52:10,099:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-09 02:52:10,100:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-09 02:52:10,139:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-09 02:52:10,435:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-09 02:52:10,437:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-09 02:52:10,438:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-09 02:52:10,442:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:36 UTC. 2024-02-09 02:52:10,442:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-09 02:52:10,442:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-09 02:52:10,447:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-09 02:52:10,447:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-09 02:52:10,447:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-09 02:52:10,463:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-09 02:52:10,463:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-09 02:52:10,465:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-09 02:52:10,998:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-09 02:52:10,998:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:52:12 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "nfHhTWDS5oQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-09 02:52:10,999:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-09 02:52:15,057:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7472_key-certbot.pem 2024-02-09 02:52:19,135:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7470_csr-certbot.pem 2024-02-09 02:52:19,135:DEBUG:acme.client:Requesting fresh nonce 2024-02-09 02:52:19,136:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-09 02:52:19,313:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-09 02:52:19,314:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:52:20 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GpgWRmwc9QLZbuhsTNS4i1tvrz905iFn7fYjwYP_t2-Wc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-09 02:52:19,314:DEBUG:acme.client:Storing nonce: HpY91-GpgWRmwc9QLZbuhsTNS4i1tvrz905iFn7fYjwYP_t2-Wc 2024-02-09 02:52:19,314:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-02-09 02:52:19,321:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BnV1Jtd2M5UUxaYnVoc1ROUzRpMXR2cno5MDVpRm43Zllqd1lQX3QyLVdjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "E7j6UK-Y2mhpuM2DMMwvt_cjMFjhEXSMqU7jUTE-pN9yfau5wgbQV5NYxFMNCh4PbmA0xgoogfZiYKkfEJR10mTrLZhGVAMwUMQnXUtdTnxIRAmBk49hVfV0XQP-_zaEsuNt-s9f5fUcN0C9EhKF2X1m_9_-Cugoup4_-4vr1FUrDJhtCF0e_LRyVIZGbNv27ffsP5DN4u_YaNMQRIk372MNw5hOVcGYc6HCgFWHklNVdfTWpU6pajQHC8chroeI0DvGQHLpM-BXaMnnWcoe9U7yIQeu_qhh0hnUwhVaa7h6__LTjnzlgInCsXZerQTL8L3rZbmfiI2ObLY8kbhCsw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-09 02:52:19,510:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-02-09 02:52:19,511:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 09 Feb 2024 01:52:21 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308831767 Replay-Nonce: HpY91-GpWCiiXc-5MW-l1wMspnEna55Sf--5iAkc1PFCM7PlL9k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:08Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820328137" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308831767" } 2024-02-09 02:52:19,511:DEBUG:acme.client:Storing nonce: HpY91-GpWCiiXc-5MW-l1wMspnEna55Sf--5iAkc1PFCM7PlL9k 2024-02-09 02:52:19,511:DEBUG:acme.client:JWS payload: b'' 2024-02-09 02:52:19,517:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820328137: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BXQ2lpWGMtNU1XLWwxd01zcG5FbmE1NVNmLS01aUFrYzFQRkNNN1BsTDlrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAzMjgxMzcifQ", "signature": "pNMbG63ezKl_7Yb3WwRLO2DgnxrX-rdzRzeQg3yovc0YhyTz7Nca9kpTx9KQpGuy7vZEiFDQPOqqoONgGXe49CTJU-H4_pNB5oj2ZnhWtzm2Uh2P9WLDfWHArJzJ47yY9_QHUYDiWwVgy5t9-6O2zNQWYcDiSzhtBEEG_oX6_FgqqFD2OzXfv_Z4Wyr7aDR-A3qDmRx_Xw8Ml1tAheTGLC9qvSE0lhsWruLyB8n8SMSlDrVslSej-a-rdkHHCAZQq5_SKkz8ArUzy-Zj1y6Wy4cIMDo3mWBzkKmtc4LO4bFZTuPF9XcuUVdmAJHgThwYfOraj4wIVVswBpH91GnroQ", "payload": "" } 2024-02-09 02:52:19,699:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820328137 HTTP/1.1" 200 809 2024-02-09 02:52:19,700:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:52:21 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-Gp0wIeRLwbCBKPpOkLOAqAKpe6Tlo6qbUbDdUsrKpHEU8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:08Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/EQtjAQ", "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/KonEuA", "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/buqaYg", "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM" } ] } 2024-02-09 02:52:19,700:DEBUG:acme.client:Storing nonce: HpY91-Gp0wIeRLwbCBKPpOkLOAqAKpe6Tlo6qbUbDdUsrKpHEU8 2024-02-09 02:52:19,700:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-09 02:52:19,701:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-02-09 02:52:19,701:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-09 02:52:19,702:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-09 02:52:19,702:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-09 02:52:19,703:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-09 02:52:19,703:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-09 02:52:19,703:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-09 02:52:19,704:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-09 02:52:19,752:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-09 02:52:19,944:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-09 02:52:19,945:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-09 02:52:19,946:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-09 02:52:19,950:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:50 UTC. 2024-02-09 02:52:19,950:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-09 02:52:19,950:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-09 02:52:19,956:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-09 02:52:19,956:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-09 02:52:19,956:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-09 02:52:19,984:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-09 02:52:19,985:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-09 02:52:19,988:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-09 02:52:20,440:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-09 02:52:20,441:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:52:22 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "nJtEtE4eMr0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-09 02:52:20,441:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-09 02:52:24,992:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7473_key-certbot.pem 2024-02-09 02:52:29,018:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7471_csr-certbot.pem 2024-02-09 02:52:29,019:DEBUG:acme.client:Requesting fresh nonce 2024-02-09 02:52:29,019:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-09 02:52:29,169:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-09 02:52:29,170:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:52:30 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 6HUcA-o5k7P-WAr-k4fIZ-kU0DS37uM2aaSEhAlOr39XbAP3vS8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-09 02:52:29,171:DEBUG:acme.client:Storing nonce: 6HUcA-o5k7P-WAr-k4fIZ-kU0DS37uM2aaSEhAlOr39XbAP3vS8 2024-02-09 02:52:29,171:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-02-09 02:52:29,179:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVrN1AtV0FyLWs0ZklaLWtVMERTMzd1TTJhYVNFaEFsT3IzOVhiQVAzdlM4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "U10S-LDMs-2ojyLsImAncdOTObEQIhpFmSJKCQTTVb5l5rwjciQ3c3ZI5wOQEmCdChr4yWuPpVnsFcDyc1nFGW6s01eBZxqnmgeQPDUJt52St96OZJFgjnUIGj7nXDdtFg4L1jo_5vVksYeLeKVj1G72z2QRRpjif9QhfxFxdp20UYXqFfUcVdiIXOPsFZNf8iCyEq0d_DZuYS7pwSq3uJsvWjbixzpy8XEZLhH0MaxMOLZqg26zCaV6aivGh4fgWY2otOW5TnWxsI-KSeanXKdZ5LeI6Q6B3eeL1WuHK9Pi8Lu1xAzN4_eSHTLnKk4Vk2TJ4z-fAaPKp216UUHz8Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-09 02:52:29,428:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-02-09 02:52:29,428:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 09 Feb 2024 01:52:31 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308858697 Replay-Nonce: 6HUcA-o5huVW7PWaQ9hhKxH3uvir697BsLFU4c4DU_QxdifUBrI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:17Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820367847" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308858697" } 2024-02-09 02:52:29,429:DEBUG:acme.client:Storing nonce: 6HUcA-o5huVW7PWaQ9hhKxH3uvir697BsLFU4c4DU_QxdifUBrI 2024-02-09 02:52:29,429:DEBUG:acme.client:JWS payload: b'' 2024-02-09 02:52:29,434:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820367847: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNkhVY0EtbzVodVZXN1BXYVE5aGhLeEgzdXZpcjY5N0JzTEZVNGM0RFVfUXhkaWZVQnJJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAzNjc4NDcifQ", "signature": "qLn7JyVuG_PMT6j23rSHuFjCaBkvVYIYeoGdH0gg7vTKaEl3AmDSOZtnaGMy5SSWxRe-s89AJLIiSJB8AMpEJElVFIYKrlP6ZY4STUgT7hM8Ir9HUt-k6QfL3vl90VtPj0u7g3U-Ikp6OMU52yV8-CygG2Mnjbwj0mIzezPGbp-LlcJeHGcdsI8fNrMqZjQKnhBso6XJ7QmjmGVqIVk5dwum_iNiA_PqrL5Ypsi5iBVJby9aDW8mSaNbUiGZlnS-5xT2I7D-B-1b4aOelND2guX7kOiWS8b9jHYlohVr_KMMVGywLJRVgH4ee3-HG5r4qOWQWtcXkpZSGiALHPxADw", "payload": "" } 2024-02-09 02:52:29,635:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820367847 HTTP/1.1" 200 806 2024-02-09 02:52:29,636:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:52:31 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HWHXB1ulz9BrauYPk1gOgVCSlchRTbY08AKXKRvkIpT8Wh0BCPQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:17Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/666fkA", "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/UVRmBQ", "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/SNClog", "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM" } ] } 2024-02-09 02:52:29,636:DEBUG:acme.client:Storing nonce: HWHXB1ulz9BrauYPk1gOgVCSlchRTbY08AKXKRvkIpT8Wh0BCPQ 2024-02-09 02:52:29,637:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-09 02:52:29,637:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-02-09 02:52:29,638:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-09 02:52:29,638:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-09 02:52:29,639:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-09 02:52:29,639:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-09 02:52:29,639:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-09 02:52:29,639:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-09 02:52:29,641:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-09 02:52:29,691:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-02-09 02:52:29,691:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-09 02:52:29,692:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-02-09 02:52:29,700:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-02-09 02:52:29,702:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-02-09 02:52:29,702:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-02-09 02:52:29,703:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-02-09 02:52:29,703:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-02-09 02:52:29,705:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-02-09 02:52:29,742:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-09 02:52:29,981:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-09 02:52:29,982:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-09 02:52:29,983:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-09 02:52:29,987:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:07 UTC. 2024-02-09 02:52:29,987:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-09 02:52:29,987:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-09 02:52:29,992:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-09 02:52:29,992:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-09 02:52:29,992:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-09 02:52:30,008:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-09 02:52:30,009:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-09 02:52:30,010:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-09 02:52:30,553:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-09 02:52:30,553:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:52:32 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "4Kl5Amrvp4c": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-09 02:52:30,554:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-09 02:52:34,870:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7474_key-certbot.pem 2024-02-09 02:52:39,332:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7472_csr-certbot.pem 2024-02-09 02:52:39,332:DEBUG:acme.client:Requesting fresh nonce 2024-02-09 02:52:39,333:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-09 02:52:39,515:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-09 02:52:39,516:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:52:41 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 63lPIS7zh9M3_QWNpnYHdCNtHF8aY3rmagqSoeWFaifD73O6MyM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-09 02:52:39,516:DEBUG:acme.client:Storing nonce: 63lPIS7zh9M3_QWNpnYHdCNtHF8aY3rmagqSoeWFaifD73O6MyM 2024-02-09 02:52:39,516:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-02-09 02:52:39,522:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3poOU0zX1FXTnBuWUhkQ050SEY4YVkzcm1hZ3FTb2VXRmFpZkQ3M082TXlNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "FSyaG0d4CSx4pdrx2mCHmwJXTHAeHmvfTr6McyvV0Pep4UGO8YOGWtEbukZLK6xNVvZBwaJDrZhbWYpAlFp8Ui6pEIQfHiXjOzkY4Bbb0JeI0_TnGSjb_mqDcZMDJemZTYBNGZJ4CWpGRbwjrdrVdIZYT1I8MZhvx2jf0dVr7KL_7sZEGWxkTs3merUU9LQVIpugyJC1c0BKHAM5WDHP9QcKOb-QXR29c73b4QJi4m9GKZ2LCKC1TYNJrqX9t-2meH0y2Qi7ISD-vFcyRjfvPiaKVDmm0i3HQkuZrMXl7bwpwwix664CF5ZUqSjZu9wxrvh8V0mqxYESDRMB0drpRA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-09 02:52:39,715:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-02-09 02:52:39,716:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 09 Feb 2024 01:52:41 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308883057 Replay-Nonce: 63lPIS7zR8l_iNFceZg97Klk4JYHzdCK0Vzv_eA9l8PwHiNVsW4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:25Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820404667" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308883057" } 2024-02-09 02:52:39,716:DEBUG:acme.client:Storing nonce: 63lPIS7zR8l_iNFceZg97Klk4JYHzdCK0Vzv_eA9l8PwHiNVsW4 2024-02-09 02:52:39,716:DEBUG:acme.client:JWS payload: b'' 2024-02-09 02:52:39,722:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820404667: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3pSOGxfaU5GY2VaZzk3S2xrNEpZSHpkQ0swVnp2X2VBOWw4UHdIaU5Wc1c0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0MDQ2NjcifQ", "signature": "Rb5MvNGq9Kk_tVqEPqA2dD6NTt8SOZSGL4GqOSSDQOW93xUEE9Y3769r07a_S0Ozk4Ez4XTD0O8ynBToa62HRrKyLo-aheQNAYWovOUi360ijNHk0RLA6fPZMQoVmP6ixtQyzFOBnskPmzhYhiTJIKlyGvEKpEucd8pickWj0Y147UUXX8rEPmKGt3odn78_d9kI98PDLPLDMIYdk1RZOMEb6HGIPv2fyP-KZ4TvBtS2ADQsculQ_O3RL3bQmgjAJrX6mJkaQ9oq-KCu_pvUlIctVwFEK20RMcbZGiDGDtMvzzaxL8jcEfuXTGhN4R-s-z2QpE2hhbLKpgzZc2l28A", "payload": "" } 2024-02-09 02:52:39,911:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820404667 HTTP/1.1" 200 811 2024-02-09 02:52:39,912:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:52:41 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GpTWIUlDFtyKPSaQSy5ewAHEGAp3aRz2M-Vo92xVaaXl4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:25Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/g54rZQ", "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/4yZXyw", "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/bXegoA", "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08" } ] } 2024-02-09 02:52:39,912:DEBUG:acme.client:Storing nonce: HpY91-GpTWIUlDFtyKPSaQSy5ewAHEGAp3aRz2M-Vo92xVaaXl4 2024-02-09 02:52:39,912:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-09 02:52:39,913:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-02-09 02:52:39,913:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-09 02:52:39,913:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-09 02:52:39,914:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-09 02:52:39,914:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-09 02:52:39,914:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-09 02:52:39,915:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-09 02:52:39,916:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-09 02:52:39,964:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-09 02:52:40,226:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-09 02:52:40,228:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-09 02:52:40,228:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-09 02:52:40,234:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:31 UTC. 2024-02-09 02:52:40,234:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-09 02:52:40,234:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-09 02:52:40,239:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-09 02:52:40,239:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-09 02:52:40,239:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-09 02:52:40,255:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-09 02:52:40,255:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-09 02:52:40,257:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-09 02:52:40,791:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-09 02:52:40,792:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:52:42 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "cbx1jEURwRk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-09 02:52:40,793:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-09 02:52:46,324:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7475_key-certbot.pem 2024-02-09 02:52:50,976:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7473_csr-certbot.pem 2024-02-09 02:52:50,976:DEBUG:acme.client:Requesting fresh nonce 2024-02-09 02:52:50,976:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-09 02:52:51,155:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-09 02:52:51,156:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:52:52 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-Gp_reUQQnL9tZIhZyGBKdn9P9rKZTkRD-BR5CJczUUw00 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-09 02:52:51,156:DEBUG:acme.client:Storing nonce: HpY91-Gp_reUQQnL9tZIhZyGBKdn9P9rKZTkRD-BR5CJczUUw00 2024-02-09 02:52:51,159:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-02-09 02:52:51,165:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BfcmVVUVFuTDl0WkloWnlHQktkbjlQOXJLWlRrUkQtQlI1Q0pjelVVdzAwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "JCZVZRXOORNn5khwkHGBlkjFBUU4Ryfr5ys89b_8ShqDjXfLllb6Ta5vhkuNIDDvHNqQHDcgP5uv4YhuhBSz53Wid9xv3VqWoUmQfMZKpv5TeLSIPo90sPg0vXpK3UcCRGndJFZ8mqSO4B78OziGkIC4idmqBaBzjeZjYwBERq_pPwnrQ9T_RitBzCR9S7MVpBin6tHxi8gITQycQeudZDa64UInuSBet0jbahKvgVsDkAMOHj-k-Qcjwkm4eL1RXCFuLkh4GSHaFXWspa5nrV2G7haepS9HSpfdiH-Uzu2de6jlX4368nIh2qdl-JLDGKTS1Opgy0EVRMYMQfuwyw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-09 02:52:51,356:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-02-09 02:52:51,358:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 09 Feb 2024 01:52:52 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308906667 Replay-Nonce: 63lPIS7zwqhgFd-ixK9jziCh5MrbK7vhovN80gE10VLBS9F0yQQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:34Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820438127" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308906667" } 2024-02-09 02:52:51,358:DEBUG:acme.client:Storing nonce: 63lPIS7zwqhgFd-ixK9jziCh5MrbK7vhovN80gE10VLBS9F0yQQ 2024-02-09 02:52:51,359:DEBUG:acme.client:JWS payload: b'' 2024-02-09 02:52:51,366:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820438127: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3p3cWhnRmQtaXhLOWp6aUNoNU1yYks3dmhvdk44MGdFMTBWTEJTOUYweVFRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0MzgxMjcifQ", "signature": "xvqjAFX8-pbAItdkwDO6DDi224cjOmfuo9HvzUb1A72ls9Lcs10PlQnLgPYGHMsc-rEVjqrLtoahLZ_VGgbppNxmnpmPxjmEzqx70W7fAfwmcLIUpI_Hu9A-uz-ixXmIED2kNA608Mm915uVHjKD5fsmMwtpX9dCuCH2E-oaAjj0ma8IuhtNwwQaQ52h5-ZAlhV4FMn_b1S7AtWRbJb0wy3PYIdvaZepe8PG33rKVq3PMilQOgkyJf5x3y2HUJarEjIGOGvLVGUTRIdncwYIpDWODewHC__OVBB7w7gLgrwilN7btGlL1wrXTV7XtZj2Z9f0PXGhJfL3Csjw9A7tYQ", "payload": "" } 2024-02-09 02:52:51,548:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820438127 HTTP/1.1" 200 810 2024-02-09 02:52:51,548:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:52:53 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GptfcG8datQiF_FsnDRBAvOOXK9VFFeY0odiThXi_j4yI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:34Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/rIGBzA", "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/SWtTfQ", "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/R74bXA", "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs" } ] } 2024-02-09 02:52:51,549:DEBUG:acme.client:Storing nonce: HpY91-GptfcG8datQiF_FsnDRBAvOOXK9VFFeY0odiThXi_j4yI 2024-02-09 02:52:51,549:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-09 02:52:51,549:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-02-09 02:52:51,550:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-09 02:52:51,550:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-09 02:52:51,551:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-09 02:52:51,551:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-09 02:52:51,551:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-09 02:52:51,552:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-09 02:52:51,553:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-09 02:52:51,590:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-09 02:52:51,911:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-09 02:52:51,912:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-02-09 02:52:51,913:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-02-09 02:52:51,917:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:09 UTC. 2024-02-09 02:52:51,917:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-09 02:52:51,918:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-09 02:52:51,924:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-09 02:52:51,924:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-09 02:52:51,924:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-09 02:52:51,929:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-09 02:52:51,930:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-09 02:52:51,932:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-09 02:52:52,466:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-09 02:52:52,467:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:52:54 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "01riArm_jbM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-09 02:52:52,467:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-09 02:52:56,946:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7476_key-certbot.pem 2024-02-09 02:53:01,279:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7474_csr-certbot.pem 2024-02-09 02:53:01,279:DEBUG:acme.client:Requesting fresh nonce 2024-02-09 02:53:01,279:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-09 02:53:01,459:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-09 02:53:01,460:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:53:03 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GpZz5UFGJhBEyDQhDIeq7-RhVpltzEBjRXBAUhrTZpSFo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-09 02:53:01,460:DEBUG:acme.client:Storing nonce: HpY91-GpZz5UFGJhBEyDQhDIeq7-RhVpltzEBjRXBAUhrTZpSFo 2024-02-09 02:53:01,461:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-02-09 02:53:01,468:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BaejVVRkdKaEJFeURRaERJZXE3LVJoVnBsdHpFQmpSWEJBVWhyVFpwU0ZvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "JUx30sBlrDTC0ZTkwUq2vLbyAxx8E5yev6AZB0EA4RZHrmHkkmoYk1_pon5Qm_CWmz2M64PVA-xnzc-Hn9EXa5o5Z5FF4FHp0_bLDlPbG9m3kmD4U1UDt8IFeVs6IBGj2FGdJYS2pIqpk8J8FkgCV4egkB4U2_5a5Y7e273ajoiwI5PMUAIjSPzB83zwwLisvw0PFStKGbt50DweFdIkOaIfVHeU9ESvbMyg9mOaVbVDY0CwxJiYT-R6LLeGJ59TmN1vIxoIZZvIOnHJTu3tiscuBqoRv6NOLr55j08wRWlGtogKubH9SQvkG_FkvSEvhKcctiTt6uksD1AxfABzsw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-09 02:53:01,727:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-02-09 02:53:01,728:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 09 Feb 2024 01:53:03 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308929257 Replay-Nonce: HpY91-Gp-c0sBzHFknjkTITJF69VmGLeXAM7q5CKTPg6x3GDJcU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:43Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820469197" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308929257" } 2024-02-09 02:53:01,728:DEBUG:acme.client:Storing nonce: HpY91-Gp-c0sBzHFknjkTITJF69VmGLeXAM7q5CKTPg6x3GDJcU 2024-02-09 02:53:01,728:DEBUG:acme.client:JWS payload: b'' 2024-02-09 02:53:01,733:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820469197: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3AtYzBzQnpIRmtuamtUSVRKRjY5Vm1HTGVYQU03cTVDS1RQZzZ4M0dESmNVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0NjkxOTcifQ", "signature": "dRsp4utB81TFt1dM_VchhzyQUpI7dsp4EruDYCgyn0_CFlzfOXYEDCLabhtqEYjV2lPW-7Ag_TPMO0EucR19lBNbzP-wWRCC8xKfgsA98EjxGwbJyhHuvspF7T7lYlPzpYGQkO0GGhLalSBSoAIxNVl1W2VQocuAtF8zJHfHYB0Y6N7xwPhskWkobCl_blOLKMh5XoHbazQLyKVVVZkdC2hPJ17O4LDG-kKnd9NUDC05NnGUaRJkbEvHmxA_cRHLVJijz_Lpsmo0Qyj1LveY0q2DVJXnqs4Sva9y5ZV4rr91her6-HyO47OOpuZoOBSdC0zL4laeRFqObT0nIk7JiQ", "payload": "" } 2024-02-09 02:53:01,913:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820469197 HTTP/1.1" 200 809 2024-02-09 02:53:01,915:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:53:03 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-Gp2sohzKWma6dQF6XodpNzKmeFh6pOglkUJDv9ESPobWE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:43Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/PqKyzA", "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/nQMx2Q", "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/ZJc1Yg", "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0" } ] } 2024-02-09 02:53:01,915:DEBUG:acme.client:Storing nonce: HpY91-Gp2sohzKWma6dQF6XodpNzKmeFh6pOglkUJDv9ESPobWE 2024-02-09 02:53:01,916:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-09 02:53:01,917:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-02-09 02:53:01,918:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-09 02:53:01,918:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-09 02:53:01,920:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-09 02:53:01,921:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-09 02:53:01,921:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-09 02:53:01,922:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-09 02:53:01,923:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-09 02:53:01,971:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-09 02:53:02,235:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-09 02:53:02,236:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is signed by the certificate's issuer. 2024-02-09 02:53:02,237:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD 2024-02-09 02:53:02,242:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:26 UTC. 2024-02-09 02:53:02,242:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-09 02:53:02,242:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-09 02:53:02,247:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-09 02:53:02,247:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-09 02:53:02,247:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-09 02:53:02,253:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-09 02:53:02,253:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-09 02:53:02,255:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-09 02:53:02,785:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-09 02:53:02,786:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:53:04 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "VbdEWarfQTs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-09 02:53:02,786:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-09 02:53:07,210:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7477_key-certbot.pem 2024-02-09 02:53:11,522:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7475_csr-certbot.pem 2024-02-09 02:53:11,522:DEBUG:acme.client:Requesting fresh nonce 2024-02-09 02:53:11,522:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-09 02:53:11,704:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-09 02:53:11,705:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:53:13 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 63lPIS7zq54QLXwhm4PzySDDr-gcfTZEhm-m3UJMtt7yMaMhyJs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-09 02:53:11,705:DEBUG:acme.client:Storing nonce: 63lPIS7zq54QLXwhm4PzySDDr-gcfTZEhm-m3UJMtt7yMaMhyJs 2024-02-09 02:53:11,705:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-02-09 02:53:11,711:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3pxNTRRTFh3aG00UHp5U0REci1nY2ZUWkVobS1tM1VKTXR0N3lNYU1oeUpzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "XL6g8NwYivLMuU0V7IoBtGXPDS7ivEK1IG-v8p4m6Uwgp9bbTCeydw8K98WbT4yPWxWdRXts1yGQfUt5Zy8Oe519lbc7xANTpME0ovw2o4XJ58a3QhgvR5aqCZls1BIONFa3dkLtHYGKZ4MqX2dC2FyK7Qex5gySnb_t5wuhlyjcA_z15uuj2UNW0MoYjt9zcVzorGpAD47QoU34l1ve7euYbt_4LQBPEH6rDdgP4zRUR6ytyPD0M1fBSR1HGhl0yJcl5fopXy7D0avJyQZgY9IVYh_s3mH0Cu7fpuq-iTOvYxD5rcDozL9AESKUHbWmOI7QJv6KKKU200LJMTaMrA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-09 02:53:11,981:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-09 02:53:11,982:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 09 Feb 2024 01:53:13 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308951787 Replay-Nonce: 63lPIS7zcxC3qlTNqtm-F2bZkokcxTcJzN3tY_7pkkFhhfKM-YM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:52Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820501457" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308951787" } 2024-02-09 02:53:11,982:DEBUG:acme.client:Storing nonce: 63lPIS7zcxC3qlTNqtm-F2bZkokcxTcJzN3tY_7pkkFhhfKM-YM 2024-02-09 02:53:11,983:DEBUG:acme.client:JWS payload: b'' 2024-02-09 02:53:11,994:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820501457: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3pjeEMzcWxUTnF0bS1GMmJaa29rY3hUY0p6TjN0WV83cGtrRmhoZktNLVlNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1MDE0NTcifQ", "signature": "aYfgjk0DvADGhDPxDexMFj2Ly8QmYedYOqMf9uEYWSmWIi5TUxmhECSWmIJteMS9y-R-yGJa7jTAdZ60rkf6x5YrQELVXrbHIuFF5k6p52aFID0iERy3jFNaA_AkupDMUx-_WDGPCmnt8021rCvlby6ioiKPQMRSEwyQ0hl6Tem8jyBgHqhgW5SU2Et34qWtcAfqom6vZjsMMV-TfSBwODOEnB3xL8VWaHtaAvy5EajBCb5JzMfif4SjKh96JIdELjf7aK8lG7DZNj4I1cW0Leq_2OZS6BAACYDp_hsTCW6U-D74fOxJeuECA6rAUyrWyujC2OWR0wpVUcQNgvz84Q", "payload": "" } 2024-02-09 02:53:12,178:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820501457 HTTP/1.1" 200 805 2024-02-09 02:53:12,179:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:53:13 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 63lPIS7zN4PzfgMJE9CcvUeMYs7z7WgYU38o7z4vpketWeIUbGo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:52Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/nfOlPQ", "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/ptX2uw", "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/u4UgEQ", "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw" } ] } 2024-02-09 02:53:12,180:DEBUG:acme.client:Storing nonce: 63lPIS7zN4PzfgMJE9CcvUeMYs7z7WgYU38o7z4vpketWeIUbGo 2024-02-09 02:53:12,181:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-09 02:53:12,182:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-02-09 02:53:12,182:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-09 02:53:12,183:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-09 02:53:12,183:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-09 02:53:12,184:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-09 02:53:12,184:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-09 02:53:12,185:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-09 02:53:12,187:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-09 02:53:12,247:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-09 02:53:12,437:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-09 02:53:12,438:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-09 02:53:12,439:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-09 02:53:12,443:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:43 UTC. 2024-02-09 02:53:12,443:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-09 02:53:12,443:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-09 02:53:12,448:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-09 02:53:12,448:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-09 02:53:12,448:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-09 02:53:12,453:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-09 02:53:12,454:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-09 02:53:12,455:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-09 02:53:13,001:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-09 02:53:13,002:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:53:14 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "87D_xgltKR4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-09 02:53:13,002:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-09 02:53:17,437:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7478_key-certbot.pem 2024-02-09 02:53:21,680:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7476_csr-certbot.pem 2024-02-09 02:53:21,680:DEBUG:acme.client:Requesting fresh nonce 2024-02-09 02:53:21,680:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-09 02:53:21,861:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-09 02:53:21,862:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:53:23 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 63lPIS7z4HoqP8bU6jPRom45XrhzE-VYlMdtS3CWEavCTAiOKq4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-09 02:53:21,862:DEBUG:acme.client:Storing nonce: 63lPIS7z4HoqP8bU6jPRom45XrhzE-VYlMdtS3CWEavCTAiOKq4 2024-02-09 02:53:21,862:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-02-09 02:53:21,870:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3o0SG9xUDhiVTZqUFJvbTQ1WHJoekUtVllsTWR0UzNDV0VhdkNUQWlPS3E0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "DthTziEVQo1rN9alVM6AiacVw5FymIFfHDJn4nMUwQbNX1CRQQFFkKuwW2rCZefMIRiXT-JQ7BlsLc74EcUtyJyeLMH_xIMinIoAjn0rR9TJxnuOXmNCRUEtTRzgOHrduOM5enRFc47lU28ZnEqusWKmvamFAl-hXmcy3I83GriSQgzH9KespXKBzk0FTqvqpRfS6fTyKXI8kJSvhTWDL04Y1KC3yF3Jft0aZX31twC4JYGbygDyzTW_6QKlNb_UAUvYvCuapd_ZL2Z0gh8KKpfH80nJgQuuljXVEWfsnIXWlIzIkXjAkoMGnen2LibfA5RV-IsgAOsflMzY2iuxsQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-09 02:53:22,061:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-09 02:53:22,062:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 09 Feb 2024 01:53:23 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308975127 Replay-Nonce: 63lPIS7zU4hu85ZqoOXYHjdznEBdwMD3dIgAM8-HEzvoY5JsPaE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:27:01Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820533737" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308975127" } 2024-02-09 02:53:22,062:DEBUG:acme.client:Storing nonce: 63lPIS7zU4hu85ZqoOXYHjdznEBdwMD3dIgAM8-HEzvoY5JsPaE 2024-02-09 02:53:22,063:DEBUG:acme.client:JWS payload: b'' 2024-02-09 02:53:22,070:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820533737: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNjNsUElTN3pVNGh1ODVacW9PWFlIamR6bkVCZHdNRDNkSWdBTTgtSEV6dm9ZNUpzUGFFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1MzM3MzcifQ", "signature": "TSMaBkuh0Y2hqiR4x63msn1C7bdvln9B6TL8QwM2SDza1rO7OHPC3c3ZbX6ktClBu_RE_tWeetWG-b_Ia9GbvISvu07L94MThTzlTjlbF59zjiCXRrl_ImAw7ZwE2wf6-5l7bBQeUf3Yncx4p6fOhGl8gMiCE6Fdqo5C26r7-H8CPinMh5NzBMKo-NlCW5lae1TyILtpnrxwoq1vPGqxWTDi9h1t_U-58LCJsEy-b7cfkysvC7tWgWmSz87eqMfu5M4nxamb8UQANfrbQ-MpbnNsh6Tw6kJ-ejgBx3DX-Z_X3g9P_eRJHzrN6SSp4PNDZ8r_SD5yFLsfZhSTckQN7Q", "payload": "" } 2024-02-09 02:53:22,257:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820533737 HTTP/1.1" 200 805 2024-02-09 02:53:22,258:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:53:23 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 63lPIS7zxwEKgixkdOGrB-gaX2IUG4lwaQfiPC3ofJ1SGpwD4sk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:27:01Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/u7lnsw", "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/kawHqw", "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/Xsywzg", "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs" } ] } 2024-02-09 02:53:22,258:DEBUG:acme.client:Storing nonce: 63lPIS7zxwEKgixkdOGrB-gaX2IUG4lwaQfiPC3ofJ1SGpwD4sk 2024-02-09 02:53:22,259:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-09 02:53:22,260:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-02-09 02:53:22,261:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-09 02:53:22,261:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-09 02:53:22,262:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-09 02:53:22,262:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-09 02:53:22,262:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-09 02:53:22,263:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-09 02:53:22,265:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-09 02:53:22,307:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-09 02:53:22,367:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-09 02:53:22,369:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-09 02:53:22,371:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-09 02:53:22,379:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:40:02 UTC. 2024-02-09 02:53:22,380:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-09 02:53:22,380:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-09 02:53:22,392:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-09 02:53:22,392:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-09 02:53:22,392:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-09 02:53:22,400:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-09 02:53:22,401:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-09 02:53:22,404:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-09 02:53:22,948:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-09 02:53:22,948:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:53:24 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "2w4IgUIpNQs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-09 02:53:22,949:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-09 02:53:27,363:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7479_key-certbot.pem 2024-02-09 02:53:31,561:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7477_csr-certbot.pem 2024-02-09 02:53:31,562:DEBUG:acme.client:Requesting fresh nonce 2024-02-09 02:53:31,562:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-09 02:53:31,743:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-09 02:53:31,744:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:53:33 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GpkD1lTDNKsB7Sju6ye0ln_gN6idNlbYl7PC83ffjKx9M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-09 02:53:31,744:DEBUG:acme.client:Storing nonce: HpY91-GpkD1lTDNKsB7Sju6ye0ln_gN6idNlbYl7PC83ffjKx9M 2024-02-09 02:53:31,744:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-02-09 02:53:31,750:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BrRDFsVEROS3NCN1NqdTZ5ZTBsbl9nTjZpZE5sYllsN1BDODNmZmpLeDlNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "wetR-nJCXyWMZDJUlYcTTk2AnFCS4KHJLsFgOeAO1SnXUfY6Al2D57mAD3bFyX367qPc0Osncs1oXOKcyh7aMxFiKzbY1rIWI9-QHDAN40yFJFMpMzr6XdvDp305SfqI4dnSAeK2y-0ZMq8AvfWKa3qwt7bSTTP3owU9bflk6x_0SScV4cmRKujuffFqk4Ll7pkjSaxVJtOgiMHknESjJPvlOOY2zf-eniWdkKkhd6KurhBKycAGigwhKgwvJWEL-Y6CghtEABZZxi0ASvqiM0nAQZ5wYRy4U1QBaeGcKQn1NZnNVrvtCqiKr3T5aB36QDRrVbXUs3Mx4-I2ZROgAg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-09 02:53:31,943:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-09 02:53:31,945:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 09 Feb 2024 01:53:33 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241309008647 Replay-Nonce: HpY91-GpPgHWbry7wakrdHTYNdEweCG0ruetExCmlagER4J-yk8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:27:10Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820580167" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241309008647" } 2024-02-09 02:53:31,945:DEBUG:acme.client:Storing nonce: HpY91-GpPgHWbry7wakrdHTYNdEweCG0ruetExCmlagER4J-yk8 2024-02-09 02:53:31,946:DEBUG:acme.client:JWS payload: b'' 2024-02-09 02:53:31,954:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820580167: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiSHBZOTEtR3BQZ0hXYnJ5N3dha3JkSFRZTmRFd2VDRzBydWV0RXhDbWxhZ0VSNEoteWs4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1ODAxNjcifQ", "signature": "Evi50BOKtuCGsUYud6HlulDd3QLsQoQjfwpAQ_s-m9v37QOxKCLFUD4lhpL5SzCwgeP9XPPv-L1HCcyZzFyf9D47nB7JP_7v1cgSCXW3n_KrCzoiPhidctT5WgdFNxtYsyyeFDZRwhTgz5ORPysDHiDwJ20JxPucE6ckWNtvjl55qGRH2DLN8IcVTQnOWdiPOBVE9MGX4Q2IqnZi_TJDp3xAUNGrTqe37dDsuyHhHqhd6GwZ6yJ6Z8kpuL5Za8fGV2QlRUI-iyZSShF-lF1VjEnh3W_pnHxy9xID7QL2uDiY8xK8i8o00OyVG8LlwfH0eDHWFqszxdWYe_t31OzMOA", "payload": "" } 2024-02-09 02:53:32,139:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820580167 HTTP/1.1" 200 805 2024-02-09 02:53:32,139:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 09 Feb 2024 01:53:33 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: HpY91-GpviYQ5wEgZ7PMrfqasa3UtWeprwZApvn_aqvVMIerIsM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:27:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/yNgMJw", "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/JW2Bpw", "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/iioLug", "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc" } ] } 2024-02-09 02:53:32,139:DEBUG:acme.client:Storing nonce: HpY91-GpviYQ5wEgZ7PMrfqasa3UtWeprwZApvn_aqvVMIerIsM 2024-02-09 02:53:32,140:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-09 02:53:32,141:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-02-09 02:53:32,141:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-09 02:53:32,141:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-09 02:53:32,142:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-09 02:53:32,142:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-09 02:53:32,142:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-09 02:53:32,143:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-09 02:53:32,144:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-09 02:53:32,144:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-02-09 02:53:32,144:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-02-09 02:53:32,156:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-02-09 02:53:32,158:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)