2025-02-02 04:57:25,659:DEBUG:certbot._internal.main:certbot version: 1.6.0 2025-02-02 04:57:25,660:DEBUG:certbot._internal.main:Arguments: [] 2025-02-02 04:57:25,660:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2025-02-02 04:57:26,361:DEBUG:certbot._internal.log:Root logging level set at 20 2025-02-02 04:57:26,361:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2025-02-02 04:57:26,411:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x049E8870> and installer <certbot._internal.cli.cli_utils._Default object at 0x049E8870> 2025-02-02 04:57:26,453:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-02 04:57:26,674:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-02 04:57:26,698:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2025-02-02 04:57:26,704:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2025-02-02 04:57:26,713:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-02-02 04:57:26,716:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-02 04:57:26,754:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-02 04:57:26,950:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-02 04:57:26,951:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is signed by the certificate's issuer. 2025-02-02 04:57:26,952:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD 2025-02-02 04:57:26,956:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-02-02 04:57:26,960:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-02 04:57:27,004:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-02 04:57:27,197:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-02 04:57:27,199:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2025-02-02 04:57:27,199:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2025-02-02 04:57:27,203:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-02-02 04:57:27,207:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-02 04:57:27,244:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-02-02 04:57:27,444:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-02 04:57:27,446:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is signed by the certificate's issuer. 2025-02-02 04:57:27,446:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is: OCSPCertStatus.GOOD 2025-02-02 04:57:27,450:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-02-02 04:57:27,454:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-02 04:57:27,492:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-02 04:57:27,701:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-02 04:57:27,702:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert22.pem is signed by the certificate's issuer. 2025-02-02 04:57:27,703:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD 2025-02-02 04:57:27,707:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-02-02 04:57:27,712:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-02 04:57:27,757:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-02-02 04:57:27,948:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-02 04:57:27,949:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-02-02 04:57:27,950:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-02-02 04:57:27,955:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:13:49 UTC. 2025-02-02 04:57:27,955:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-02 04:57:27,955:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-02 04:57:27,960:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0445ED90> Prep: True 2025-02-02 04:57:27,962:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0445ED90> and installer None 2025-02-02 04:57:27,962:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-02 04:57:27,975:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2025-02-02 04:57:27,976:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-02 04:57:27,978:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-02 04:57:28,449:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-02 04:57:28,449:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:56:47 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "mQK2LVzOXUE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-02-02 04:57:28,450:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-02 04:57:36,056:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9043_key-certbot.pem 2025-02-02 04:57:43,245:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9041_csr-certbot.pem 2025-02-02 04:57:43,246:DEBUG:acme.client:Requesting fresh nonce 2025-02-02 04:57:43,246:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-02 04:57:43,402:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-02 04:57:43,402:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:57:02 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: hXNDuA8iFLUV-cCYYrgnHUNOvzx7osh7SN6_WGn8_WTLmz08zG8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-02 04:57:43,402:DEBUG:acme.client:Storing nonce: hXNDuA8iFLUV-cCYYrgnHUNOvzx7osh7SN6_WGn8_WTLmz08zG8 2025-02-02 04:57:43,403:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2025-02-02 04:57:43,409:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGlGTFVWLWNDWVlyZ25IVU5Pdnp4N29zaDdTTjZfV0duOF9XVExtejA4ekc4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "uoAa7puGk_02quVIDQVzTmS3JopfcrPkBavVd4aQz5_3uRa2dckT9bEbjgSP9ZNwlShOIY7NX7qyJqlP87gww7z31BOIQTZFfSFHEFZ92r-nkuGKTQdFua7DNeffIp4Zm529wSYY1RyZBM0K1Fh9omrhlW1lLsYUmAvZwSvAQJzpmsGsb6TFGEGNpwZC231Z-dNyTZXwwuzL1UAHQu2YHw3nMOKhTJp9KIeOv-N0a_WOCvBjeIAQcDuZ8LWtEHvGnwqcGGHkrybH12_QoEsdbXWQjY_gH038ipp-QwmUwhO1i957nNwco0bziA1U6TNWBtdXY6El4whmbthnZ3g4ZQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-02-02 04:57:43,592:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-02-02 04:57:43,593:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 02 Feb 2025 03:57:02 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603648845 Replay-Nonce: hXNDuA8itUWVTnVOd2PlIzSaObqkBsDuaKbKofhGK4UJb5M5d8Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:15:56Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613419375" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603648845" } 2025-02-02 04:57:43,593:DEBUG:acme.client:Storing nonce: hXNDuA8itUWVTnVOd2PlIzSaObqkBsDuaKbKofhGK4UJb5M5d8Y 2025-02-02 04:57:43,593:DEBUG:acme.client:JWS payload: b'' 2025-02-02 04:57:43,600:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613419375: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGl0VVdWVG5WT2QyUGxJelNhT2Jxa0JzRHVhS2JLb2ZoR0s0VUpiNU01ZDhZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM0MTkzNzUifQ", "signature": "P1PoM1eE2o4J4aJon2IMXPHPzEeitiBX0LkWfudWWtXHuxOt_hdfQ0G_8oR0Aaqy9WXitg8DTsGVP3ZHQ0yCeCwzlKx4FpIABykPioBAD_h_CDuK8mvqhy5KsaPAwY5-k-nx3ukaz7VwZFBowojTG5f8OpORaB7mi3dMAYXeqwLCKYgPfLPaKKwhKDEx6psnYHWB-sF_DhGKC8anCRs88RkSZrOnxVm8WLucJnNSuCep2DV3aCJw6dINwpUm8tuHvS54adc4ut9KyJhik9t6ylV-8r851dgZEwbJS9FiPkxO4TgWjWLKXUWpyTXJaK8WWK_Q1hAuqGbLiOyQ2iCIow", "payload": "" } 2025-02-02 04:57:43,761:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613419375 HTTP/1.1" 200 823 2025-02-02 04:57:43,762:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:57:02 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: hXNDuA8iRvYs35Z59jfbQCZhO2CHqfGWE0VzvKOtzZQI3XiWfuU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:15:56Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613419375/yJLmdw", "status": "pending", "token": "9EnXT6FT7rznT8ngp10HxQzCcXcgDHNCsRx5DOBACns" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613419375/T3sOUw", "status": "pending", "token": "9EnXT6FT7rznT8ngp10HxQzCcXcgDHNCsRx5DOBACns" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613419375/bahWuQ", "status": "pending", "token": "9EnXT6FT7rznT8ngp10HxQzCcXcgDHNCsRx5DOBACns" } ] } 2025-02-02 04:57:43,762:DEBUG:acme.client:Storing nonce: hXNDuA8iRvYs35Z59jfbQCZhO2CHqfGWE0VzvKOtzZQI3XiWfuU 2025-02-02 04:57:43,763:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-02 04:57:43,763:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2025-02-02 04:57:43,775:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-02 04:57:43,775:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-02 04:57:43,778:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-02 04:57:43,778:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-02 04:57:43,778:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-02 04:57:43,779:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-02 04:57:43,783:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-02 04:57:43,820:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-02 04:57:44,024:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-02 04:57:44,026:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2025-02-02 04:57:44,027:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2025-02-02 04:57:44,032:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:20 UTC. 2025-02-02 04:57:44,032:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-02 04:57:44,032:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-02 04:57:44,038:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04C73C90> Prep: True 2025-02-02 04:57:44,038:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04C73C90> and installer None 2025-02-02 04:57:44,038:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-02 04:57:44,047:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2025-02-02 04:57:44,048:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-02 04:57:44,049:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-02 04:57:44,522:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-02 04:57:44,523:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:57:03 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "A0JNS_Wyi64": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-02-02 04:57:44,523:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-02 04:57:51,724:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9044_key-certbot.pem 2025-02-02 04:57:58,559:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9042_csr-certbot.pem 2025-02-02 04:57:58,560:DEBUG:acme.client:Requesting fresh nonce 2025-02-02 04:57:58,560:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-02 04:57:58,718:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-02 04:57:58,720:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:57:17 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: aTttXYyyCewU3c_WQOI9my0r9teAsngY53aAwAHm-mjqHZh7l3s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-02 04:57:58,720:DEBUG:acme.client:Storing nonce: aTttXYyyCewU3c_WQOI9my0r9teAsngY53aAwAHm-mjqHZh7l3s 2025-02-02 04:57:58,720:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2025-02-02 04:57:58,726:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXlDZXdVM2NfV1FPSTlteTByOXRlQXNuZ1k1M2FBd0FIbS1tanFIWmg3bDNzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "VgjtLWKofdd6WuOULdR5_UZrphjeU0g2DIjyLvS0AizdvvjpOnpAJWrvRJ3lXzmUMqntU-Pjao_EVaBdUzeOLoqJIcgnnXwK9cbH7Xzem7OzYxSK9rUAGN4GJ_3ebYLfkBRdSbm6IkFmaC3qWPzq7HhHXvzeOutqzM4XdxIXE_FCqmAbeq5FdqXy2FIc2HbJ4Csyz2CB5WfI6T5xY72uutUKeRxYnPsGFp2VpwPNiGSj3CcZ8ejERXMEM230AXYOSDKC3GWytQ1o-Y75I0b3Xmh14cGcZTh_qs-fxIsWGRoTKRmMP1yxS9hrT8gBRzdam0ttjoVSfpA5ucPnG7U4dg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-02-02 04:57:58,911:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2025-02-02 04:57:58,912:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 02 Feb 2025 03:57:17 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603700365 Replay-Nonce: aTttXYyylzDf0TmPuUWNdOk-KDjJwgnJ6BmuTiUIBS_R2B_Ddzw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:16:10Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613495675" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603700365" } 2025-02-02 04:57:58,912:DEBUG:acme.client:Storing nonce: aTttXYyylzDf0TmPuUWNdOk-KDjJwgnJ6BmuTiUIBS_R2B_Ddzw 2025-02-02 04:57:58,912:DEBUG:acme.client:JWS payload: b'' 2025-02-02 04:57:58,928:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613495675: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXlsekRmMFRtUHVVV05kT2stS0RqSndnbko2Qm11VGlVSUJTX1IyQl9EZHp3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM0OTU2NzUifQ", "signature": "vkEaAlHHUib-9qR-0_vcnlSb34GQRoI2hHffLnH7gI_06O9qTfedxLfwUrhoee_BNnDeEGA57cianSa9NHv22pPVmu-Ri2EMcaBK1uvKbOFmEZi6V-dgjNYmwk9c_1ByKCYoS3lYplBI1WjSCKnF-dzctpyvaSInwigAXqDfd4Eh4htxDyTZoSDoXP-xt2_E-wnNzL3H_wwgBX1uAr9Twyjlgm0V66-bm6DJ5zpha5fGY56Gq998cxwhmJYb9qgEQsaD-woZTSPmynrpbYRb7LLgny0owdtZuB6pbu4pOZnUY9HOO8P80xSnDo1Dwiz4leQOirDGA9abkdCj3bGOGQ", "payload": "" } 2025-02-02 04:57:59,106:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613495675 HTTP/1.1" 200 827 2025-02-02 04:57:59,107:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:57:18 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: hXNDuA8i2mhyu_5d9UupjbIEsTEYHdtji2HjK7AvbbPBvhE0sLo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:16:10Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613495675/TKifNg", "status": "pending", "token": "-N4wWQFOkzSF8ZGn4EebknObkGtUQ-conbTGk8O9Reo" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613495675/OR7sGQ", "status": "pending", "token": "-N4wWQFOkzSF8ZGn4EebknObkGtUQ-conbTGk8O9Reo" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613495675/DpTZMg", "status": "pending", "token": "-N4wWQFOkzSF8ZGn4EebknObkGtUQ-conbTGk8O9Reo" } ] } 2025-02-02 04:57:59,107:DEBUG:acme.client:Storing nonce: hXNDuA8i2mhyu_5d9UupjbIEsTEYHdtji2HjK7AvbbPBvhE0sLo 2025-02-02 04:57:59,107:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-02 04:57:59,107:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2025-02-02 04:57:59,109:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-02 04:57:59,109:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-02 04:57:59,110:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-02 04:57:59,110:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-02 04:57:59,110:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-02 04:57:59,111:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-02 04:57:59,112:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-02 04:57:59,150:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-02 04:57:59,356:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-02 04:57:59,358:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is signed by the certificate's issuer. 2025-02-02 04:57:59,359:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is: OCSPCertStatus.GOOD 2025-02-02 04:57:59,362:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:51 UTC. 2025-02-02 04:57:59,362:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-02 04:57:59,363:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-02 04:57:59,369:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04C73190> Prep: True 2025-02-02 04:57:59,369:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04C73190> and installer None 2025-02-02 04:57:59,369:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-02 04:57:59,385:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2025-02-02 04:57:59,386:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-02 04:57:59,388:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-02 04:57:59,829:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-02 04:57:59,830:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:57:18 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Z4OvNUhBVbc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-02-02 04:57:59,830:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-02 04:58:06,671:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9045_key-certbot.pem 2025-02-02 04:58:13,366:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9043_csr-certbot.pem 2025-02-02 04:58:13,366:DEBUG:acme.client:Requesting fresh nonce 2025-02-02 04:58:13,366:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-02 04:58:13,517:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-02 04:58:13,517:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:57:32 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: UvlUZ57PQLzx4lKcVczDxKApbTIdsqduvUtVlqI8_f-me23OC4Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-02 04:58:13,518:DEBUG:acme.client:Storing nonce: UvlUZ57PQLzx4lKcVczDxKApbTIdsqduvUtVlqI8_f-me23OC4Y 2025-02-02 04:58:13,518:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2025-02-02 04:58:13,527:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVXZsVVo1N1BRTHp4NGxLY1ZjekR4S0FwYlRJZHNxZHV2VXRWbHFJOF9mLW1lMjNPQzRZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "x7yqMx5fpfypibaLswTwIcTyQtt-ejl16ApdLQfnRcQkCgouK7HGPhsr1MjJhPTOIQ8vWyJQsLvXJXaAbk3zEBqmRmOpKEzXVvu6jK8s9j6BQAWTrLrNTscSbYzf-Y0g5ehmQZuvWGUQwszAuuSOlPLS7GEWTGI2oCIgkt2z7zcamifcxCz-_C959N6E40mqIsmJeamPv5IKS1kgqMEAsL-Capr8apQcO0GbyGiQ-wrf_ZcwQ6ClmiBMVn9j2uxly1gY9RE5AimmkL89ay9zmzJXQ5n_ihHJgj5dwhVBtxFWF8MKVWwuC7B4uqw0FwWF8sEQW5X4xYKhYjmYq9ymiQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2025-02-02 04:58:13,716:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 353 2025-02-02 04:58:13,716:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 02 Feb 2025 03:57:32 GMT Content-Type: application/json Content-Length: 353 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603747715 Replay-Nonce: UvlUZ57PVnnRHceUoUSlnfIzsYVketZXeiF2Ell3jsSyyRmbby4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:16:23Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613569085" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603747715" } 2025-02-02 04:58:13,717:DEBUG:acme.client:Storing nonce: UvlUZ57PVnnRHceUoUSlnfIzsYVketZXeiF2Ell3jsSyyRmbby4 2025-02-02 04:58:13,717:DEBUG:acme.client:JWS payload: b'' 2025-02-02 04:58:13,722:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613569085: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVXZsVVo1N1BWbm5SSGNlVW9VU2xuZkl6c1lWa2V0WlhlaUYyRWxsM2pzU3l5Um1iYnk0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM1NjkwODUifQ", "signature": "PkH6n0OlA3BUxNr_7tQWo9RZIvCFHVzuGx7BQjVTK9wq3PQUfUf19yMwFouqwEuKXPfgXdICss7ur5THVn0BxbRjNAn8h1HflD4JNuEMJIk07LaMBiyl_fMqnV0Y76Btp1ENz4_Oo9T0zCruGYkjnxfql3RaaYjX9wwRoZ817AEdnIvpw6zoAr69mUzgG_L-28RZrDWayXR5QxEMDZoK0m5CIC5UHT7ym10t16PanfJBMD0cMmckrMmp0dbL8z2dgX3u__gACMwgjxG9PQOMHWW8vddQ3M3Zk0ysUIA2m1iq1CSXAA-ZkE8OcEuo-_-wCo3AQtI0_I7lQaxKZMitjQ", "payload": "" } 2025-02-02 04:58:13,876:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613569085 HTTP/1.1" 200 825 2025-02-02 04:58:13,878:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:57:32 GMT Content-Type: application/json Content-Length: 825 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: UvlUZ57PbsRav60hc13672lphSj_stzAIlvWyWjIlxb2c4WFeuk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:16:23Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613569085/_lVOeQ", "status": "pending", "token": "voycDLD6WaIuZqIiZii35bQ8xrl32oR994HNkskXaVM" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613569085/i556TQ", "status": "pending", "token": "voycDLD6WaIuZqIiZii35bQ8xrl32oR994HNkskXaVM" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613569085/67S_cA", "status": "pending", "token": "voycDLD6WaIuZqIiZii35bQ8xrl32oR994HNkskXaVM" } ] } 2025-02-02 04:58:13,878:DEBUG:acme.client:Storing nonce: UvlUZ57PbsRav60hc13672lphSj_stzAIlvWyWjIlxb2c4WFeuk 2025-02-02 04:58:13,879:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-02 04:58:13,879:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2025-02-02 04:58:13,880:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-02 04:58:13,880:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-02 04:58:13,881:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-02 04:58:13,881:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-02 04:58:13,881:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-02 04:58:13,882:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-02 04:58:13,883:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-02 04:58:13,939:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-02 04:58:14,145:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-02 04:58:14,147:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-02-02 04:58:14,147:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-02-02 04:58:14,152:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:13 UTC. 2025-02-02 04:58:14,152:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-02 04:58:14,152:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-02 04:58:14,158:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04C73050> Prep: True 2025-02-02 04:58:14,158:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04C73050> and installer None 2025-02-02 04:58:14,158:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-02 04:58:14,164:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2025-02-02 04:58:14,165:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-02 04:58:14,167:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-02 04:58:14,607:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-02 04:58:14,608:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:57:33 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "I3LLXBIKUo0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-02-02 04:58:14,608:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-02 04:58:21,772:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9046_key-certbot.pem 2025-02-02 04:58:28,567:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9044_csr-certbot.pem 2025-02-02 04:58:28,568:DEBUG:acme.client:Requesting fresh nonce 2025-02-02 04:58:28,568:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-02 04:58:28,715:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-02 04:58:28,716:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:57:47 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: TUC11O6XL4m8GFLuFjo-RTAqzUByEhKAZRTtBHF4ypQbSxM1dyE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-02 04:58:28,716:DEBUG:acme.client:Storing nonce: TUC11O6XL4m8GFLuFjo-RTAqzUByEhKAZRTtBHF4ypQbSxM1dyE 2025-02-02 04:58:28,716:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2025-02-02 04:58:28,722:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhMNG04R0ZMdUZqby1SVEFxelVCeUVoS0FaUlR0QkhGNHlwUWJTeE0xZHlFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "hSLA844FY95mW6AojRN2CSnY1kCo56TlR6FuPVlx8vNKG32jYSyFiQVmJSlNGq9ywx4cjvxZWEOpbZxYAaztRFT-H-gdp_J3qcy4Tk4rcehIfR30juDFXQVZOt8-sVGQmo_5pfyT4oXAcGvlKzNgYgjnUg0ZmsCWFMj7llqZZeUBnLIJZw94AUaj8sKkHomRH8L3lbYcYHT7oI6tL_TCcz_YJzAoxOFK1HZJoPm-OzQWmKJaSnNCNKtZQjQNE6iwF6Hc8jM6edTqk4Bav1eZOTUeJtSVzCXeN2kgPCsOfy5dU5h-IdCIzy3onkGszhBZSR5aqIhsxV5mj7P3Lz0fHQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-02-02 04:58:28,917:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 352 2025-02-02 04:58:28,919:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 02 Feb 2025 03:57:47 GMT Content-Type: application/json Content-Length: 352 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603792325 Replay-Nonce: TUC11O6XYxf3_xiqeqTun7XhFwWnKOciiR02QailCOC-x3K3l1A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:16:37Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613637565" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603792325" } 2025-02-02 04:58:28,919:DEBUG:acme.client:Storing nonce: TUC11O6XYxf3_xiqeqTun7XhFwWnKOciiR02QailCOC-x3K3l1A 2025-02-02 04:58:28,919:DEBUG:acme.client:JWS payload: b'' 2025-02-02 04:58:28,925:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613637565: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhZeGYzX3hpcWVxVHVuN1hoRndXbktPY2lpUjAyUWFpbENPQy14M0szbDFBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM2Mzc1NjUifQ", "signature": "naIy2SXweof274jeO-f-DUrd7A1qiAJDkGtqhrCYzSxsAMfYo-YJ4H17niCOhyDOPrGU9xhwHLUBuTepuy_QXZngZ-2HXjN3bMPLaPdKHVxCBx6qbGAnoMneys_aI82xllzKiBKtZKTbdahyHcWGpiDS9_03q_2uiuQiFc6w6Ypn_ph8uJomDARbCoRf7laUJAzTAYdHBcVGkPXF7Z90mhTw94varctOhgyLkrUECB7FBJbJaOR8_O49RiXTT7wpWGhI1pJGQZNdYSmaUwL-IRBujKXq5d5m6qxbVqgCPh3aY5aVaxSpbtXi7vwA9QYKFRT_C5MiZKF0FoSBsAeZOQ", "payload": "" } 2025-02-02 04:58:29,081:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613637565 HTTP/1.1" 200 824 2025-02-02 04:58:29,082:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:57:48 GMT Content-Type: application/json Content-Length: 824 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: UvlUZ57PmqOwx-P4IXAvyj6euJ8gSqwp-pzYWBXkqIM1QJnszH4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:16:37Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613637565/_4E6Mg", "status": "pending", "token": "koSUgsC_SD5VGbDQ3X2SLH_w9qYfJ8H3V8YT4kweWIk" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613637565/HkAMUw", "status": "pending", "token": "koSUgsC_SD5VGbDQ3X2SLH_w9qYfJ8H3V8YT4kweWIk" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613637565/5bZpJA", "status": "pending", "token": "koSUgsC_SD5VGbDQ3X2SLH_w9qYfJ8H3V8YT4kweWIk" } ] } 2025-02-02 04:58:29,082:DEBUG:acme.client:Storing nonce: UvlUZ57PmqOwx-P4IXAvyj6euJ8gSqwp-pzYWBXkqIM1QJnszH4 2025-02-02 04:58:29,085:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-02 04:58:29,086:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2025-02-02 04:58:29,087:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-02 04:58:29,087:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-02 04:58:29,088:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-02 04:58:29,088:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-02 04:58:29,088:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-02 04:58:29,089:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-02 04:58:29,090:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-02 04:58:29,137:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2025-02-02 04:58:29,138:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-02 04:58:29,138:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2025-02-02 04:58:29,146:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2025-02-02 04:58:29,148:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2025-02-02 04:58:29,148:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2025-02-02 04:58:29,149:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2025-02-02 04:58:29,149:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2025-02-02 04:58:29,151:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2025-02-02 04:58:29,197:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-02 04:58:29,416:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-02 04:58:29,417:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-02-02 04:58:29,418:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-02-02 04:58:29,423:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:35 UTC. 2025-02-02 04:58:29,424:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-02 04:58:29,424:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-02 04:58:29,429:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0436C650> Prep: True 2025-02-02 04:58:29,429:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0436C650> and installer None 2025-02-02 04:58:29,429:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-02 04:58:29,434:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2025-02-02 04:58:29,435:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-02 04:58:29,437:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-02 04:58:29,911:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-02 04:58:29,911:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:57:48 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "LGRuStxe9mM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-02-02 04:58:29,912:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-02 04:58:36,715:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9047_key-certbot.pem 2025-02-02 04:58:43,478:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9045_csr-certbot.pem 2025-02-02 04:58:43,480:DEBUG:acme.client:Requesting fresh nonce 2025-02-02 04:58:43,480:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-02 04:58:43,638:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-02 04:58:43,640:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:58:02 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: hXNDuA8iARpI6f9p5PqBYV3QbrOrqfYZx6xxANQmI-ehifVoVow X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-02 04:58:43,640:DEBUG:acme.client:Storing nonce: hXNDuA8iARpI6f9p5PqBYV3QbrOrqfYZx6xxANQmI-ehifVoVow 2025-02-02 04:58:43,640:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2025-02-02 04:58:43,646:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGlBUnBJNmY5cDVQcUJZVjNRYnJPcnFmWVp4Nnh4QU5RbUktZWhpZlZvVm93IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ojK7xp9uzDXpErbep_parV1zx3kxhIZ0YETNrzzytns1Io-LVcVpzkk3ndDT9UobZoXJJVMEMralr6EAW0L8T0TJ9Nl_YcaJfR8FGPq7iHojou88jT7kuD3DaeMLREs9SLBmiT4FEir9KQoGcIGXSSG1jiYyp-uAh_jOcYU3WnRHbiODH2liS6d92vVlLNDVn8iQbb0G7NnZkF2ZZBGf9O1mf0VAH0C0KHRBTeiLk-kpcjrEKlg1ETlCluicmBvlyAzIRdvTZj3QvYulaBs1JguGnH6dfGcmQVMHkcJ1DxpGd1GG9VnSqEV4cadx20BCUxWwVAwQ53uXgMf_cmTeug", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-02-02 04:58:43,837:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 357 2025-02-02 04:58:43,838:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 02 Feb 2025 03:58:02 GMT Content-Type: application/json Content-Length: 357 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603833745 Replay-Nonce: aTttXYyy9QOwQVVGUlvSl7zLEcZAbGav3RtSFmvfwZ0Zu2efDmk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:16:51Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613700475" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603833745" } 2025-02-02 04:58:43,838:DEBUG:acme.client:Storing nonce: aTttXYyy9QOwQVVGUlvSl7zLEcZAbGav3RtSFmvfwZ0Zu2efDmk 2025-02-02 04:58:43,838:DEBUG:acme.client:JWS payload: b'' 2025-02-02 04:58:43,844:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613700475: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXk5UU93UVZWR1VsdlNsN3pMRWNaQWJHYXYzUnRTRm12ZndaMFp1MmVmRG1rIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM3MDA0NzUifQ", "signature": "ufaNMFAGUDMXwqqvFsxxetPRTiW_U4LeB6Lyvj9oPKsDcdMwszEkKt2PI8rnpkY_Ueimk9tWAM3TvsnvaNuRE1wLTvjQ56wGCx0ymZKQienaxfgNua_c-ALSRVOD35dtRAYtokHFtZWyhPlQQtjPOMl85gZH2cvqZfH3x-te_9VipzbWP2DkWwqfCoBmGLcrYQ6aq4Mw01bWP3g6vVpCw5GJO0fPIdwMUF9qsa_MgsP44GPPJJivupjVxNbwRB0q7UMLzvWi2kZ58HyDXw_z0RdEa3mAEWID7jCD_yUV4c1at75BsJgSu7UtisFfg80lB37O2RF3ww6g6VoKP_VUHg", "payload": "" } 2025-02-02 04:58:44,007:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613700475 HTTP/1.1" 200 829 2025-02-02 04:58:44,008:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:58:02 GMT Content-Type: application/json Content-Length: 829 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: hXNDuA8ineE5IAc06GRb9l2-UeDYf8iLoHL8Ccc2gmg5YFi58C0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:16:51Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613700475/4GWkdQ", "status": "pending", "token": "_3T_C3yuCWV4XSeLeRXCPycDIQnwxDGf-AyaPY9XlxE" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613700475/jElvnA", "status": "pending", "token": "_3T_C3yuCWV4XSeLeRXCPycDIQnwxDGf-AyaPY9XlxE" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613700475/B2drkw", "status": "pending", "token": "_3T_C3yuCWV4XSeLeRXCPycDIQnwxDGf-AyaPY9XlxE" } ] } 2025-02-02 04:58:44,009:DEBUG:acme.client:Storing nonce: hXNDuA8ineE5IAc06GRb9l2-UeDYf8iLoHL8Ccc2gmg5YFi58C0 2025-02-02 04:58:44,010:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-02 04:58:44,010:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2025-02-02 04:58:44,011:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-02 04:58:44,011:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-02 04:58:44,012:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-02 04:58:44,012:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-02 04:58:44,012:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-02 04:58:44,013:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-02 04:58:44,014:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-02 04:58:44,065:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-02-02 04:58:44,271:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-02 04:58:44,272:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-02-02 04:58:44,273:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-02-02 04:58:44,278:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:05 UTC. 2025-02-02 04:58:44,278:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-02 04:58:44,278:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-02 04:58:44,283:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05152550> Prep: True 2025-02-02 04:58:44,283:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05152550> and installer None 2025-02-02 04:58:44,283:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-02 04:58:44,289:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2025-02-02 04:58:44,289:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-02 04:58:44,291:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-02 04:58:44,751:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-02 04:58:44,752:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:58:03 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "9axTrStE_24": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-02-02 04:58:44,753:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-02 04:58:52,149:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9048_key-certbot.pem 2025-02-02 04:58:58,909:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9046_csr-certbot.pem 2025-02-02 04:58:58,909:DEBUG:acme.client:Requesting fresh nonce 2025-02-02 04:58:58,910:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-02 04:58:59,065:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-02 04:58:59,066:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:58:18 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: hXNDuA8iRHBY_gQxiExitVc8u0zlMr-hb5Bbo2sxM1iPAF1cbRY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-02 04:58:59,066:DEBUG:acme.client:Storing nonce: hXNDuA8iRHBY_gQxiExitVc8u0zlMr-hb5Bbo2sxM1iPAF1cbRY 2025-02-02 04:58:59,067:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2025-02-02 04:58:59,073:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGlSSEJZX2dReGlFeGl0VmM4dTB6bE1yLWhiNUJibzJzeE0xaVBBRjFjYlJZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "hESHhxzYHVJt01cBOHAus0Qso2xJN07BSdrKQVYGBKBX8C90EDJ3PRLY2jMynR7FqxPxx6GMZtGRm5e04M6Hzh3L5Usk_fEPxwLpPpHiC1cBHX_165amBmpXK9piluXvpss2lB5WDM0WRfsS4sdwkhUFaNzCc9irrzLNo46aQ7HzEM5euowIwCkN3Ohcp2b5PH2Xe8B6vtEsbWQNiLPgYhFVFE0ytwq-w-GhEUBpsHer2GMKpnLVgXVVpRogsIb2l1AAZ6YlEOThEddSApk6TCOa5Ud3e6XYq22-9fT_9mP7xwaDCHcgMAIGlo030mYpVPzwGEmhSjt3SZ1TYaCr8w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2025-02-02 04:58:59,272:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356 2025-02-02 04:58:59,273:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 02 Feb 2025 03:58:18 GMT Content-Type: application/json Content-Length: 356 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603881465 Replay-Nonce: hXNDuA8iTNm8Ekeu4z8e2El_TmeTCPJUSFFZJBR91jGQWX3jG4c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:17:04Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613770605" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603881465" } 2025-02-02 04:58:59,273:DEBUG:acme.client:Storing nonce: hXNDuA8iTNm8Ekeu4z8e2El_TmeTCPJUSFFZJBR91jGQWX3jG4c 2025-02-02 04:58:59,274:DEBUG:acme.client:JWS payload: b'' 2025-02-02 04:58:59,280:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613770605: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGlUTm04RWtldTR6OGUyRWxfVG1lVENQSlVTRkZaSkJSOTFqR1FXWDNqRzRjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM3NzA2MDUifQ", "signature": "FPFr8vc6B0xTvZOvUbc5pOWisOXchCACasvbk17BGcCZaqcbIkz8nZS-UGDFR2dJ38CCm3d1l4T3f-jgGDGkUZGym51Tuit5HdNUaHbIXaTHDYVHKqKLwEL8eFsq8ZRlP-DZSob72ZvkQ8qP0MsKProgr8iQZpusGIO56H_O6VGcYv2FCebUuWghPHvVwklXwKSWy_jzDpOB7OOV2HkdKx83Wp858hav-ZJu8B1uU9WeIMFeMiM4dofsU3y1dQT8ANPJGogr7TjOfk0vHnYrDSKP94bmrKRVZH4xY29iZ6AoXiEOc9mWpnfwoQQtI1cmP5lljtDydBFF9rwpwOyTtw", "payload": "" } 2025-02-02 04:58:59,441:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613770605 HTTP/1.1" 200 828 2025-02-02 04:58:59,442:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:58:18 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: aTttXYyyqFdcmeVRSN_0oKknIVdANLMXH8MNi8QCNd_OTuGd7Fw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:17:04Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613770605/9nrvYA", "status": "pending", "token": "a_L9ZYSN7UCXXgi8qZoJiOQo70GFjG_W81I9wg8pLws" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613770605/F9o6HQ", "status": "pending", "token": "a_L9ZYSN7UCXXgi8qZoJiOQo70GFjG_W81I9wg8pLws" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613770605/QBtWUw", "status": "pending", "token": "a_L9ZYSN7UCXXgi8qZoJiOQo70GFjG_W81I9wg8pLws" } ] } 2025-02-02 04:58:59,442:DEBUG:acme.client:Storing nonce: aTttXYyyqFdcmeVRSN_0oKknIVdANLMXH8MNi8QCNd_OTuGd7Fw 2025-02-02 04:58:59,443:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-02 04:58:59,443:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2025-02-02 04:58:59,444:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-02 04:58:59,444:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-02 04:58:59,445:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-02 04:58:59,445:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-02 04:58:59,445:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-02 04:58:59,446:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-02 04:58:59,447:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-02 04:58:59,497:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-02 04:58:59,936:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-02 04:58:59,937:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2025-02-02 04:58:59,938:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2025-02-02 04:58:59,942:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:33 UTC. 2025-02-02 04:58:59,942:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-02 04:58:59,942:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-02 04:58:59,947:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04CEE850> Prep: True 2025-02-02 04:58:59,948:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04CEE850> and installer None 2025-02-02 04:58:59,948:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-02 04:58:59,964:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2025-02-02 04:58:59,965:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-02 04:58:59,968:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-02 04:59:00,438:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-02 04:59:00,439:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:58:19 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "5eS0hnP9C8w": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-02-02 04:59:00,439:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-02 04:59:07,407:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9049_key-certbot.pem 2025-02-02 04:59:14,129:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9047_csr-certbot.pem 2025-02-02 04:59:14,130:DEBUG:acme.client:Requesting fresh nonce 2025-02-02 04:59:14,130:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-02 04:59:14,288:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-02 04:59:14,288:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:58:33 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: hXNDuA8irq2t-PUNsYlXQm4XdbMX1zZjNxIwaf9UvD__ODrwBzk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-02 04:59:14,289:DEBUG:acme.client:Storing nonce: hXNDuA8irq2t-PUNsYlXQm4XdbMX1zZjNxIwaf9UvD__ODrwBzk 2025-02-02 04:59:14,289:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2025-02-02 04:59:14,295:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGlycTJ0LVBVTnNZbFhRbTRYZGJNWDF6WmpOeEl3YWY5VXZEX19PRHJ3QnprIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "FTd0sIDubSJapf1-oQgryeOQU1ELcw-BKdknVDFqmeYA9qPWTNF92X-hqmkeOYnXOWyPyl2kDT1SODBO5Axkcwh4g72iRCi62D6BVxAQ7Dr4CRidr8CE8wiQXQwVuYP4iQBfTxkANS2T7Adoib_tGkAwBuaLm621e3DYZ1jUtLwY4abfnm_0-AaLwpk7g9i6tChCpnNxw57FJm1P-UcUMVF6e19SAlQ9XTZswUc5zc0GHR5O1fQuahzARzSx-6xqIVm3cI2uDvvka2i1ErWTv3zqxdvi6FLqhKhKkxc6owICHIefS4HrGzQqB-gQ_02zO31FY2SYbwO4bAQVrn-HnQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-02-02 04:59:14,468:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2025-02-02 04:59:14,469:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 02 Feb 2025 03:58:33 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603934575 Replay-Nonce: aTttXYyyv-cJbRFXIJz46BSVIGnnaG8vKIKjaE_Lzu6RYnNc7wY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:17:18Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613854905" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603934575" } 2025-02-02 04:59:14,469:DEBUG:acme.client:Storing nonce: aTttXYyyv-cJbRFXIJz46BSVIGnnaG8vKIKjaE_Lzu6RYnNc7wY 2025-02-02 04:59:14,470:DEBUG:acme.client:JWS payload: b'' 2025-02-02 04:59:14,476:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613854905: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXl2LWNKYlJGWElKejQ2QlNWSUdubmFHOHZLSUtqYUVfTHp1NlJZbk5jN3dZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM4NTQ5MDUifQ", "signature": "iz3EGNk6OFs3Nmvj1Jaz3A8gUN1VfLCs2k5hzaZe16gtcEtJ9Mz4v8BCzK8IVbOBHVSR43WotNAr8Nab156gzfleDFZTGAFPYTlwoiAhXb1Nl9B_CgQINVg31_jgzECorK67UM7A5l8jjNaNgy2TFp2dkvmyt3VrYV1Fpxs3cKdqlu6bODXrH_aTBOUwxfBlv-GAxyuu4WWezxAJAxq2L_fHah4Us_YVY_D4p_AtIzRsj9AxezEC6yMwnJmi5fYNj9zFv7vpv5miRfaPamA3q2R_VqLucdSDJIp-o8yhTP1kx9Nzu8xCqNK4U2zKNjxp45CD0pgHLfsAshgId6Afxg", "payload": "" } 2025-02-02 04:59:14,641:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613854905 HTTP/1.1" 200 827 2025-02-02 04:59:14,642:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:58:33 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: hXNDuA8iaw4aQ7AAmDSzee1p5hSGfHqH0qbmdHSczlJCjEF3r1k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:17:18Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613854905/7RtzaQ", "status": "pending", "token": "IK7vYZaRda0VTDtKKQsecohpYPhsEngjBQ1X3SBv7HQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613854905/bMnPCg", "status": "pending", "token": "IK7vYZaRda0VTDtKKQsecohpYPhsEngjBQ1X3SBv7HQ" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613854905/ke1eMQ", "status": "pending", "token": "IK7vYZaRda0VTDtKKQsecohpYPhsEngjBQ1X3SBv7HQ" } ] } 2025-02-02 04:59:14,642:DEBUG:acme.client:Storing nonce: hXNDuA8iaw4aQ7AAmDSzee1p5hSGfHqH0qbmdHSczlJCjEF3r1k 2025-02-02 04:59:14,642:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-02 04:59:14,643:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2025-02-02 04:59:14,643:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-02 04:59:14,644:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-02 04:59:14,645:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-02 04:59:14,645:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-02 04:59:14,645:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-02 04:59:14,645:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-02 04:59:14,646:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-02 04:59:14,689:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-02-02 04:59:14,905:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-02 04:59:14,906:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2025-02-02 04:59:14,907:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2025-02-02 04:59:14,912:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:54 UTC. 2025-02-02 04:59:14,912:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-02 04:59:14,912:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-02 04:59:14,918:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04457170> Prep: True 2025-02-02 04:59:14,918:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04457170> and installer None 2025-02-02 04:59:14,919:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-02 04:59:14,923:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2025-02-02 04:59:14,924:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-02 04:59:14,926:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-02 04:59:15,387:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-02 04:59:15,388:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:58:34 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "XZ1WomkWHdg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-02-02 04:59:15,388:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-02 04:59:22,522:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9050_key-certbot.pem 2025-02-02 04:59:29,247:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9048_csr-certbot.pem 2025-02-02 04:59:29,247:DEBUG:acme.client:Requesting fresh nonce 2025-02-02 04:59:29,247:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-02 04:59:29,403:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-02 04:59:29,404:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:58:48 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: hXNDuA8ivJccbbf34kjnD9etVeTL4xoe6B0mkHOsJINpPfHhLsk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-02 04:59:29,404:DEBUG:acme.client:Storing nonce: hXNDuA8ivJccbbf34kjnD9etVeTL4xoe6B0mkHOsJINpPfHhLsk 2025-02-02 04:59:29,404:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2025-02-02 04:59:29,410:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGl2SmNjYmJmMzRram5EOWV0VmVUTDR4b2U2QjBta0hPc0pJTnBQZkhoTHNrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "b7zFIyLd0dmCmNwajVv81a7qhQe4MPZALFP4PWEqVC6DQ8_g4sk0CmxG8_AN9ulKQ_7D8D5M1I7jpPKGxest2w_vSW6E23OrffPC4Q2LQj_DkHIlEso615Ty_Xc5UccEHmS5M5B0oBh8NcolE1khdZQv02EgL6ecHzRiGLQ9CAk8Twiej4htIA3OW2b6ddjUwvjWeyjsoRc2VI0BLsiJCGbr78zDSByTZGahu__mi4NK0XTvy6802_7iNKCfZQtgurGs6QOcFwfgTg1l3cao_2PWF0LG3IxObHmZnOKgNKF75JdZJRPO1DR65mg4BIIkfxj6T1hJAgEtoP2HISTrNg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-02-02 04:59:29,590:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-02-02 04:59:29,591:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 02 Feb 2025 03:58:48 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603978585 Replay-Nonce: aTttXYyyTP6fFkwGUKApsJdsnL82B5h44BmxkG8lxbieQ6u_KKU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:17:32Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613923815" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603978585" } 2025-02-02 04:59:29,591:DEBUG:acme.client:Storing nonce: aTttXYyyTP6fFkwGUKApsJdsnL82B5h44BmxkG8lxbieQ6u_KKU 2025-02-02 04:59:29,592:DEBUG:acme.client:JWS payload: b'' 2025-02-02 04:59:29,598:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613923815: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXlUUDZmRmt3R1VLQXBzSmRzbkw4MkI1aDQ0Qm14a0c4bHhiaWVRNnVfS0tVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM5MjM4MTUifQ", "signature": "lDJjFSv0uY-OI3ot833sigh4zVTjbm6MI9M8xlBaaboFzgyLuiQmG30OR2j-Bfiouh_vXO2_R3hnN-MLALjlmjrP-PhA7hFJtm46TBB4YTwwFjUqmdUKi9F6AETzeTXx_lYGovN2aoqR2z8vFJTN-kWJuKAuh2I0wM4XM7_jTcutqIJXU8eN4PlO4m37_DYpqOT33BBoo_Yz5ImVBIt7ryf23cyr0hct5yi72OFsUSqeaiaUV4VerdgsA7haep6zkCz6_TeMaUMb5umJFCxR4ck8LItAHDBe1ybNPVJ355PSVjAMwCOWtLBo1AxekGWan9r1rTd1h908znR2sbyvKA", "payload": "" } 2025-02-02 04:59:29,758:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613923815 HTTP/1.1" 200 823 2025-02-02 04:59:29,758:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:58:48 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: hXNDuA8itD0WB1h3FKhaBKqTXKnaNEj4ng0eRWQK8hCZTpYOJH8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:17:32Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613923815/wvLngQ", "status": "pending", "token": "m7yyxIJSFIemVfF7rkix7A6ntmc25SA7QMkT0Knl1qI" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613923815/t9VvUw", "status": "pending", "token": "m7yyxIJSFIemVfF7rkix7A6ntmc25SA7QMkT0Knl1qI" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613923815/wNRiHQ", "status": "pending", "token": "m7yyxIJSFIemVfF7rkix7A6ntmc25SA7QMkT0Knl1qI" } ] } 2025-02-02 04:59:29,758:DEBUG:acme.client:Storing nonce: hXNDuA8itD0WB1h3FKhaBKqTXKnaNEj4ng0eRWQK8hCZTpYOJH8 2025-02-02 04:59:29,759:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-02 04:59:29,759:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2025-02-02 04:59:29,760:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-02 04:59:29,760:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-02 04:59:29,761:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-02 04:59:29,761:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-02 04:59:29,761:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-02 04:59:29,761:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-02 04:59:29,762:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-02 04:59:29,811:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-02 04:59:30,022:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-02 04:59:30,023:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-02-02 04:59:30,024:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-02-02 04:59:30,029:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:15 UTC. 2025-02-02 04:59:30,030:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-02 04:59:30,030:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-02 04:59:30,036:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0445ED90> Prep: True 2025-02-02 04:59:30,037:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0445ED90> and installer None 2025-02-02 04:59:30,037:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-02 04:59:30,041:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2025-02-02 04:59:30,042:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-02 04:59:30,044:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-02 04:59:30,484:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-02 04:59:30,485:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:58:49 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "YAVtsDJxvNM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-02-02 04:59:30,485:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-02 04:59:37,630:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9051_key-certbot.pem 2025-02-02 04:59:44,327:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9049_csr-certbot.pem 2025-02-02 04:59:44,327:DEBUG:acme.client:Requesting fresh nonce 2025-02-02 04:59:44,327:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-02 04:59:44,478:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-02 04:59:44,479:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:59:03 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: UvlUZ57P50ToLGsoAkUnXWIh0QgmrvXQvg1QrP-ZMNhxFo_40Fw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-02 04:59:44,479:DEBUG:acme.client:Storing nonce: UvlUZ57P50ToLGsoAkUnXWIh0QgmrvXQvg1QrP-ZMNhxFo_40Fw 2025-02-02 04:59:44,480:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2025-02-02 04:59:44,489:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVXZsVVo1N1A1MFRvTEdzb0FrVW5YV0loMFFnbXJ2WFF2ZzFRclAtWk1OaHhGb180MEZ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "P2AEDJyqQ8p4iAqH69SndWMnIfiQo_Ch3YIz2B42SQHrNq2t8UKd0LaVfLcSR9THYyeCJpocTAJsuGhFpCPRX-I3A6k3t2tPn8cQzQlzSDX4LcazsAYyyAfx7DUmmZvzkbepUKoSvhuh-rE44WKsCkuf6E5vzP515bvv3l3EoUJpuoeqw5F0s6yhf9_LUuQYjdb8icLrNytzaxzpdBm12WFJfUA1fsNe4cVGNDoI-JFf9cEgn6ZSCMEjMC_42y3GO5RqDpllJ-ZWsVjstfgaJ8T97hn-XbLNa-nkHgMU-z3fGuxy4S9cdq1-0zU4BxRpq1mXrqtuTQ7dXyfigpPoGg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-02-02 04:59:44,690:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-02-02 04:59:44,690:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 02 Feb 2025 03:59:03 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349604024205 Replay-Nonce: TUC11O6XLRtABCzSd9JbZO27Y0f5bUXwhY3RuKVEIhRfCRoPvfc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:17:46Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613992955" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349604024205" } 2025-02-02 04:59:44,690:DEBUG:acme.client:Storing nonce: TUC11O6XLRtABCzSd9JbZO27Y0f5bUXwhY3RuKVEIhRfCRoPvfc 2025-02-02 04:59:44,691:DEBUG:acme.client:JWS payload: b'' 2025-02-02 04:59:44,697:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613992955: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhMUnRBQkN6U2Q5SmJaTzI3WTBmNWJVWHdoWTNSdUtWRUloUmZDUm9QdmZjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM5OTI5NTUifQ", "signature": "EZQt0d2fbpBU6eNg7GhzpgCJ0aVDDRDMTmRXuh_NDGAPkvsny4M7t2xZurPWgFho35ZgtkIQGT83iDnZnMyqd6vBNmqqBMYvdoLdIhHVIrutAea_b4AnNR9JIkat_O-tevg-WG965RCHMGKCIevH5W39fVJXqjKozZckLonGWv4G9hz7WDvGYrwGscbU7dYMG02QClNVHAayWYwZeaoK2DC01EnOAzTlqFIZk_84oeqA0o98_qxjYszjCHYCoz_QlaUK662k3FqU7IrbTn9nq_uxrViM7bs6ypfSKQOm_Z2bLbiK2cvkEQplu2IaqAKZHRgUkXD8g4m7QFthiQDmlw", "payload": "" } 2025-02-02 04:59:44,864:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613992955 HTTP/1.1" 200 823 2025-02-02 04:59:44,865:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:59:03 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: TUC11O6Xsa_VTuRFIFqt5nOWStCmLqvr1OugCjgDbBy6i4GabtI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:17:46Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613992955/Sy2Pkg", "status": "pending", "token": "6MJOC_tlqp2eo7XHm1FAxeHMF3eocZ9KkmW5bas3nAw" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613992955/xSdP2A", "status": "pending", "token": "6MJOC_tlqp2eo7XHm1FAxeHMF3eocZ9KkmW5bas3nAw" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613992955/G_4bSw", "status": "pending", "token": "6MJOC_tlqp2eo7XHm1FAxeHMF3eocZ9KkmW5bas3nAw" } ] } 2025-02-02 04:59:44,865:DEBUG:acme.client:Storing nonce: TUC11O6Xsa_VTuRFIFqt5nOWStCmLqvr1OugCjgDbBy6i4GabtI 2025-02-02 04:59:44,866:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-02 04:59:44,866:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2025-02-02 04:59:44,867:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-02 04:59:44,867:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-02 04:59:44,868:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-02 04:59:44,868:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-02 04:59:44,869:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-02 04:59:44,870:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-02 04:59:44,871:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-02 04:59:44,918:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-02-02 04:59:45,124:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-02 04:59:45,125:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2025-02-02 04:59:45,127:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2025-02-02 04:59:45,131:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:38 UTC. 2025-02-02 04:59:45,131:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-02 04:59:45,131:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-02 04:59:45,136:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0436CFB0> Prep: True 2025-02-02 04:59:45,137:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0436CFB0> and installer None 2025-02-02 04:59:45,137:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-02 04:59:45,142:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2025-02-02 04:59:45,143:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-02 04:59:45,145:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-02 04:59:45,583:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-02 04:59:45,584:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:59:04 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "QXLc3bZWtJ4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-02-02 04:59:45,584:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-02 04:59:52,673:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9052_key-certbot.pem 2025-02-02 04:59:59,444:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9050_csr-certbot.pem 2025-02-02 04:59:59,445:DEBUG:acme.client:Requesting fresh nonce 2025-02-02 04:59:59,445:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-02 04:59:59,593:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-02 04:59:59,594:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:59:18 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: TUC11O6XQrgZpnv3OWyvmVBu-6ORX8cf9Cq7XbYdnE7T0Y0Amlc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-02 04:59:59,594:DEBUG:acme.client:Storing nonce: TUC11O6XQrgZpnv3OWyvmVBu-6ORX8cf9Cq7XbYdnE7T0Y0Amlc 2025-02-02 04:59:59,594:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2025-02-02 04:59:59,601:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhRcmdacG52M09XeXZtVkJ1LTZPUlg4Y2Y5Q3E3WGJZZG5FN1QwWTBBbWxjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "gOHaIpU92MrIcYosk5L0XmtSU54wMmZvmsb71_2X4UgrNPsmSCyuUMr811jg19xu_NiU3erGjdeEUh8uLz9_-WmMUDWlgwv9rw12u5jitRf7jzVCuVCRiZyfc0SZaRH0i-5ZHPBW0_BAIgPg6O7i7a5POillDiobAYVJyGzgQzvsM-0kGuoZmGQafNyBzMwK9ritoKw5aGgPlkle9IDmOq4CenDyxdg0z9uvfTqjMjXfmtdmmqTSdnDaOxGtg9cmp6fmnF6bVucqoHLipQBOiLl-5hnt5uh2nE7oi_eFJDDrQVq24dVsHBTl7yVAIY2ozEkaYXimNKffuona2NIS0w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-02-02 04:59:59,774:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-02-02 04:59:59,774:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 02 Feb 2025 03:59:18 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349604068465 Replay-Nonce: TUC11O6XsETatH5a6qksuUC-XkbmiKpFvNQvFVH-qHBDDk_Je64 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:18:00Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468614059925" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349604068465" } 2025-02-02 04:59:59,775:DEBUG:acme.client:Storing nonce: TUC11O6XsETatH5a6qksuUC-XkbmiKpFvNQvFVH-qHBDDk_Je64 2025-02-02 04:59:59,775:DEBUG:acme.client:JWS payload: b'' 2025-02-02 04:59:59,780:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468614059925: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhzRVRhdEg1YTZxa3N1VUMtWGtibWlLcEZ2TlF2RlZILXFIQkREa19KZTY0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTQwNTk5MjUifQ", "signature": "UhJQBuO3Z76FW2DBpnD4CnJ9tImiP_kiaUQxyXhgY-gMi4dh0Ui4Zdj3ZFl-NPPHqfr_TQMNgz1ZHdPKZlQbjF-rz_dJKtgJA2K1fYKuBbH6MufXglkDnm6dgY99drfDK7tDET4PuGbFPPbG5XRm-ivYbSxZsuHqq1biXs0wsQmceu48mhSDtAlb-kouQ8gwRBfx-WCiH7yZ6egjYj0ZiU7Q9ZGYgShdPoBDGQ71Lvz8t-qLthYtslVbRu5e9oBvBzDJX7t2ddlMsGL-4Joi3_DUsQ266U4QWBZIn_lDoDl194HtIbdNCPXNRckjmbg3ExSOUuv86ibsIknQO-fzvA", "payload": "" } 2025-02-02 04:59:59,946:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468614059925 HTTP/1.1" 200 823 2025-02-02 04:59:59,947:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 02 Feb 2025 03:59:18 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: UvlUZ57PMcisuk9eTKOORbOpRHbsvW02nPDZrPC9fDmjE_Mp3DQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:18:00Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468614059925/B9cGNQ", "status": "pending", "token": "wxzPthxA_2D1WM9MuMnylOPR_2v6PcertENLY_gigks" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468614059925/YrgyBQ", "status": "pending", "token": "wxzPthxA_2D1WM9MuMnylOPR_2v6PcertENLY_gigks" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468614059925/f-K6ug", "status": "pending", "token": "wxzPthxA_2D1WM9MuMnylOPR_2v6PcertENLY_gigks" } ] } 2025-02-02 04:59:59,947:DEBUG:acme.client:Storing nonce: UvlUZ57PMcisuk9eTKOORbOpRHbsvW02nPDZrPC9fDmjE_Mp3DQ 2025-02-02 04:59:59,948:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-02 04:59:59,948:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2025-02-02 04:59:59,948:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-02 04:59:59,949:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-02 04:59:59,949:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-02 04:59:59,950:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-02 04:59:59,950:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-02 04:59:59,950:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-02 04:59:59,951:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-02 04:59:59,952:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2025-02-02 04:59:59,952:ERROR:certbot._internal.renewal: C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2025-02-02 04:59:59,963:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module> sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 11 renew failure(s), 0 parse failure(s) 2025-02-02 04:59:59,965:ERROR:certbot._internal.log:11 renew failure(s), 0 parse failure(s)