2024-02-07 22:09:25,562:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-02-07 22:09:25,562:DEBUG:certbot._internal.main:Arguments: [] 2024-02-07 22:09:25,562:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-02-07 22:09:26,332:DEBUG:certbot._internal.log:Root logging level set at 20 2024-02-07 22:09:26,332:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-02-07 22:09:26,384:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-02-07 22:09:26,425:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-07 22:09:26,677:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-07 22:09:26,691:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is signed by the certificate's issuer. 2024-02-07 22:09:26,699:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is: OCSPCertStatus.GOOD 2024-02-07 22:09:26,712:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:15 UTC. 2024-02-07 22:09:26,712:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-07 22:09:26,712:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-07 22:09:26,718:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-07 22:09:26,718:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-07 22:09:26,719:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-07 22:09:26,725:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-07 22:09:26,725:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-07 22:09:26,728:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-07 22:09:27,209:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-07 22:09:27,210:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:09:27 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "vGaQE2KepYE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-02-07 22:09:27,210:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-07 22:09:31,596:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7428_key-certbot.pem 2024-02-07 22:09:35,427:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7426_csr-certbot.pem 2024-02-07 22:09:35,427:DEBUG:acme.client:Requesting fresh nonce 2024-02-07 22:09:35,427:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-07 22:09:35,579:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-07 22:09:35,580:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:09:35 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA7MB_rjdzPS1RhOKKsQUaH_kdYCS84Fsu7foDGpOyzPp0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-07 22:09:35,580:DEBUG:acme.client:Storing nonce: 3l89SrA7MB_rjdzPS1RhOKKsQUaH_kdYCS84Fsu7foDGpOyzPp0 2024-02-07 22:09:35,580:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-02-07 22:09:35,587:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdNQl9yamR6UFMxUmhPS0tzUVVhSF9rZFlDUzg0RnN1N2ZvREdwT3l6UHAwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "x3WCfkcNh-YO-2eMb-DIVc77S1466D3kAS6k2vJW1fJlwC-gGjfc9VtNPALrKadPsp8Ld4i989KIGU0hj-GtRJqbe6GeyvoeXAASb0QObdoS4jSjAgC7EoaqD0pMDL1LOKIYyzA5mjVhiE5KhOJY_YEWiYr_VQ10P3vxnbalDUS5uflCQ8Dy6Wix_J_YTylF5G0yK5r5Ykt0T2YdwzOkJDVyIGzSSgUP8F6s9Jd7W2uQGAUUMd_ZGWmPzEtjgh6e1BXqsLmFa74Xrelm7ncFJyqFnmZyCBMpq_lWRkmuzvWbwh_4KqsFbEWVIFKUM0yDZpDSE4SH8YXWv--daKg97A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-07 22:09:35,754:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-02-07 22:09:35,755:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 07 Feb 2024 21:09:35 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308706407 Replay-Nonce: 5IXlosaqvu9lC_PuWbwtaCCd54oxtKh9y1XbeEI5OpWr4_4-8cE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:25:24Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820152497" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308706407" } 2024-02-07 22:09:35,755:DEBUG:acme.client:Storing nonce: 5IXlosaqvu9lC_PuWbwtaCCd54oxtKh9y1XbeEI5OpWr4_4-8cE 2024-02-07 22:09:35,756:DEBUG:acme.client:JWS payload: b'' 2024-02-07 22:09:35,768:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820152497: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXF2dTlsQ19QdVdid3RhQ0NkNTRveHRLaDl5MVhiZUVJNU9wV3I0XzQtOGNFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAxNTI0OTcifQ", "signature": "XGj2K0UAy9wtvAydqIwNSext07llv6CtbkFOarcytLuTmn601wX76cTURvmKBbnkMg0-ncmsmslo4-RwVP2-DRUVplLTPQvt8hXV6PAoh_S_utfj0jFv7jSG9ToO2FgbsogU5A3vYeGiow9BYk07CDumMF1KvCO9WbpAgEp74SyEIj6xsuWEf4mIlRQEP8rYv1xraB7OS429h2dUooP5y4pJ7eCTNYeBj_D7ShLbwoNwh-cp8Da1KWn1ka1lPN2xkHWLXuxNPavt9kMiD5ybLRgkjj6joYh9yunSlIfbIQkbjwhJTRRffigQX_4Ggy3egD0FVJtnzKSzJ5ihfCnRNQ", "payload": "" } 2024-02-07 22:09:35,976:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820152497 HTTP/1.1" 200 810 2024-02-07 22:09:35,978:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:09:35 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaqeoSGbggRXfasADYk1HaRgGR9fJKYo_Nx858mrdpv2kE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:25:24Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/GeKDkA", "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/sBY_pA", "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/dU31hg", "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI" } ] } 2024-02-07 22:09:35,978:DEBUG:acme.client:Storing nonce: 5IXlosaqeoSGbggRXfasADYk1HaRgGR9fJKYo_Nx858mrdpv2kE 2024-02-07 22:09:35,979:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-07 22:09:35,980:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-02-07 22:09:35,980:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-07 22:09:35,981:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-07 22:09:35,983:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-07 22:09:35,984:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-07 22:09:35,984:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-07 22:09:35,984:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-07 22:09:35,988:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-07 22:09:36,026:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-07 22:09:36,285:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-07 22:09:36,288:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-07 22:09:36,290:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-07 22:09:36,296:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:32 UTC. 2024-02-07 22:09:36,296:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-07 22:09:36,297:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-07 22:09:36,301:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-07 22:09:36,301:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-07 22:09:36,301:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-07 22:09:36,320:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-07 22:09:36,321:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-07 22:09:36,325:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-07 22:09:36,770:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-07 22:09:36,771:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:09:36 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "mocSP9q7hEk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-07 22:09:36,772:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-07 22:09:40,639:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7429_key-certbot.pem 2024-02-07 22:09:44,474:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7427_csr-certbot.pem 2024-02-07 22:09:44,475:DEBUG:acme.client:Requesting fresh nonce 2024-02-07 22:09:44,475:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-07 22:09:44,648:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-07 22:09:44,649:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:09:44 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaqTvO0o4beRswXlEHdwuAwO-o9SeVqW_aAvi8DHecw1Xs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-07 22:09:44,650:DEBUG:acme.client:Storing nonce: 5IXlosaqTvO0o4beRswXlEHdwuAwO-o9SeVqW_aAvi8DHecw1Xs 2024-02-07 22:09:44,650:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-02-07 22:09:44,664:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFUdk8wbzRiZVJzd1hsRUhkd3VBd08tbzlTZVZxV19hQXZpOERIZWN3MVhzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "qTFfpSizuxXkPXovkZRwsS6Xe88LosCW3Z4Pf3FRsxRbfoDkGYzbPXc0modMmBSzkB14Jj8zi3xVpVUuUcJcxI0fe6Sgjr1Pq524GBOn9jJVlb107EQR9rMybCaBIooqxj5SAMNqLytPrfz-YK9xj2J5EBNIcYjEiSdFw3zWej6s4o0v8U1EtonQSGXB4znglzw0jguJY8h7z_rcaXszWDYY11inG4ZaNZ9dHuD1wTCeZXm5i_FupkFT9GCS9aqTsShfUxk6FTI2uqNl05pyX5JLhJwqzDPec2s3gNHL5iqQ6-evA6SR-785o-kLwl3K6rT1LQjedBMW9rYlMNsaww", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-07 22:09:44,831:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-02-07 22:09:44,832:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 07 Feb 2024 21:09:44 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308730387 Replay-Nonce: 5IXlosaqNu_Hnosh0K0x72MZ13ssK2FfYSkeecvRwe4TS8b4oz4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:25:33Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820188867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308730387" } 2024-02-07 22:09:44,833:DEBUG:acme.client:Storing nonce: 5IXlosaqNu_Hnosh0K0x72MZ13ssK2FfYSkeecvRwe4TS8b4oz4 2024-02-07 22:09:44,833:DEBUG:acme.client:JWS payload: b'' 2024-02-07 22:09:44,845:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820188867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFOdV9Ibm9zaDBLMHg3Mk1aMTNzc0syRmZZU2tlZWN2UndlNFRTOGI0b3o0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAxODg4NjcifQ", "signature": "D0gA8EQFjTd4DXFH3btO8VIbDOm7Yd51ZLaa9pqzdTcJ8-SLXDSf4mo354W9KvWKz1l86p0LVMVCytC2NbU7s6tnRA4MXtOMKoWth9C8XMnIH8fPC-0Skzob0yG3MyBkaPq0PXjUooRrthqtWoDSqmbFPySkPUPEKkIHSFQzME59XfdKFN3_mW212yUEsGQgYnR7PjUFRU5ry-Mq1MfZZ1vekkp-Qmjo0kz6GL3M0av5qWiJBfM9Sp-uO1JNzPFUD_RwyS7uL92wlULtLeZVKjvxSOZbWhNXlrmYpfi39k2SeTDfZKca5mMqkfWHQAEwHQ6YXWOvOlS1kHBwfxV1bw", "payload": "" } 2024-02-07 22:09:45,034:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820188867 HTTP/1.1" 200 804 2024-02-07 22:09:45,035:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:09:44 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaqprVAQqBKwY3-gSwbSRXOCoYgmCLCV0ZIPkcGtnn0HJ0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:25:33Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/Yq7npQ", "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/OkyE8g", "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/IRVMDw", "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU" } ] } 2024-02-07 22:09:45,036:DEBUG:acme.client:Storing nonce: 5IXlosaqprVAQqBKwY3-gSwbSRXOCoYgmCLCV0ZIPkcGtnn0HJ0 2024-02-07 22:09:45,037:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-07 22:09:45,037:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-02-07 22:09:45,038:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-07 22:09:45,039:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-07 22:09:45,040:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-07 22:09:45,040:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-07 22:09:45,040:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-07 22:09:45,040:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-07 22:09:45,041:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-07 22:09:45,091:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-07 22:09:45,309:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-07 22:09:45,311:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-07 22:09:45,313:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-07 22:09:45,322:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:49 UTC. 2024-02-07 22:09:45,323:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-07 22:09:45,323:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-07 22:09:45,329:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-07 22:09:45,329:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-07 22:09:45,329:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-07 22:09:45,333:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-07 22:09:45,334:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-07 22:09:45,336:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-07 22:09:45,886:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-07 22:09:45,887:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:09:45 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "AEIvbhkL44g": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-07 22:09:45,888:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-07 22:09:49,725:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7430_key-certbot.pem 2024-02-07 22:09:53,593:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7428_csr-certbot.pem 2024-02-07 22:09:53,593:DEBUG:acme.client:Requesting fresh nonce 2024-02-07 22:09:53,593:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-07 22:09:53,775:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-07 22:09:53,776:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:09:53 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2ksh1KUsg8Cd_MhnQfrfuMErDUHWTaDecbNUSjRGhkAtk3zpE_E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-07 22:09:53,777:DEBUG:acme.client:Storing nonce: 2ksh1KUsg8Cd_MhnQfrfuMErDUHWTaDecbNUSjRGhkAtk3zpE_E 2024-02-07 22:09:53,777:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-02-07 22:09:53,787:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNnOENkX01oblFmcmZ1TUVyRFVIV1RhRGVjYk5VU2pSR2hrQXRrM3pwRV9FIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "mafWBtVIafal76xfdFXvr9EDkTj9unExKWTobwiHT9xCtriBCpuVHrVbf4YfGURksjce8aD3Ls9NvM9oQFZ8MtYJ3yMaEi6KhunyvaX7230_pu1SJ6Hs4IdLCZ4F1Au5SwR4K4ngRCaoISyT4xpGG2eZqO5MCaXvWhPTS1rn4wVzl_bFx4ujArLaiF0oSee8VXm5Lmbi75014s5q3k1rcvJoWdvJwg-KVu5ygeNPRYq_4y4Rt0TXZEzfmww3G6KN0BprUHIvCQDv2vz9fE3DPN6OWlgp1T14R2ro2m1NVSTp1WLFrbbV0eum1kD4g8NtquVd9uLIH2GOfIHcbawcMg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-07 22:09:54,005:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-02-07 22:09:54,007:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 07 Feb 2024 21:09:53 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308754257 Replay-Nonce: kRyagOpUFApuMN-V28e3JgnL7IaH7eHlW2hPjaG-XfvXQ6vLKh0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:25:42Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820220907" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308754257" } 2024-02-07 22:09:54,007:DEBUG:acme.client:Storing nonce: kRyagOpUFApuMN-V28e3JgnL7IaH7eHlW2hPjaG-XfvXQ6vLKh0 2024-02-07 22:09:54,008:DEBUG:acme.client:JWS payload: b'' 2024-02-07 22:09:54,015:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820220907: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVGQXB1TU4tVjI4ZTNKZ25MN0lhSDdlSGxXMmhQamFHLVhmdlhRNnZMS2gwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyMjA5MDcifQ", "signature": "kpoGmQHgdahoQG2em323JeLjrMH_b8borrmHHt2lMa501JkRnRPE0_1r3OxOU0zTrJDy39XHoFP0HqKUAgGTfgdBSbcC2uA3kKJ9rt3w12xHYduy7lHfkfb7mLx2iUemMi14ZDfa1PrsdPpH9D6zC2uZ4ba8mhQv2BtUhlOyFb1rP2AfC4eEnmYtDg7FrF32E_RxcWxGIqsoinQwWN7D2c9x3ySWJ9eHfuPxvOCKAXDk6QUX2JInG1dGsntczHSmtfQWWn4UYiH5LQMmkuL1GhXtnCUqnQMk-b_Y2bs03oeF9sFHvMRPk_DA1p7LWGB6vOuGFvSYh8junF8_kst74g", "payload": "" } 2024-02-07 22:09:54,203:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820220907 HTTP/1.1" 200 807 2024-02-07 22:09:54,204:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:09:53 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2ksh1KUsMFUH2Sv0aclx1TrRpPEv1QUcznwnbewoUOLu11TlgtQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:25:42Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/vlhqAg", "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/p9n_vg", "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/ul63Zg", "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA" } ] } 2024-02-07 22:09:54,204:DEBUG:acme.client:Storing nonce: 2ksh1KUsMFUH2Sv0aclx1TrRpPEv1QUcznwnbewoUOLu11TlgtQ 2024-02-07 22:09:54,205:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-07 22:09:54,206:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-02-07 22:09:54,206:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-07 22:09:54,207:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-07 22:09:54,208:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-07 22:09:54,208:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-07 22:09:54,209:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-07 22:09:54,209:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-07 22:09:54,211:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-07 22:09:54,254:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-07 22:09:54,479:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-07 22:09:54,482:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-07 22:09:54,483:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-07 22:09:54,490:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:03 UTC. 2024-02-07 22:09:54,490:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-07 22:09:54,491:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-07 22:09:54,495:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-07 22:09:54,495:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-07 22:09:54,495:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-07 22:09:54,513:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-07 22:09:54,515:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-07 22:09:54,518:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-07 22:09:54,975:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-07 22:09:54,977:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:09:54 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "MVfoz4cv81A": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-07 22:09:54,977:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-07 22:09:59,230:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7431_key-certbot.pem 2024-02-07 22:10:02,959:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7429_csr-certbot.pem 2024-02-07 22:10:02,959:DEBUG:acme.client:Requesting fresh nonce 2024-02-07 22:10:02,959:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-07 22:10:03,109:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-07 22:10:03,109:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:10:02 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaqlSSrHESiq7AB_DtOKppP32xL_i-hZ030vsMUtWBa6mU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-07 22:10:03,109:DEBUG:acme.client:Storing nonce: 5IXlosaqlSSrHESiq7AB_DtOKppP32xL_i-hZ030vsMUtWBa6mU 2024-02-07 22:10:03,110:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-02-07 22:10:03,116:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFsU1NySEVTaXE3QUJfRHRPS3BwUDMyeExfaS1oWjAzMHZzTVV0V0JhNm1VIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "rULsLnxllVrgNtvk7kT0r1IXrNkPSOX1F1AxI5d59ZCVRqdIvdEhwIC13FRJjZbIGKdE__fWUtyslbSZj26VUzuuHnupFlLtJnIPW45aVtcYjsRlWj1q16Z8pWrBJ9aChSGR-gN3pkXYqGedDw1SpV4d7c0ehi4Eb5ScFr5c_NwLr_IXIn-LqUnn3paABw1cl9mPxo-2MkSVzVQqbvc29RqUEHWKOwI0Vi4u4b_Fpq0LmFu2bT8Zov2_86XKDSBmAVKAzVXnW333mALz5nXKf-ySe-Pc1b-0IsWLsZfgxzVnJfsvlzbGA1oPu0u_UwvIsT2ak4wRM-jdtC9993APRw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-07 22:10:03,344:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-02-07 22:10:03,345:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 07 Feb 2024 21:10:03 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308777647 Replay-Nonce: 5IXlosaq-MdSodILvGFBuYZ9Ghc6xMkDCDMRONCrsmAdEGui2Dg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:25:50Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820252177" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308777647" } 2024-02-07 22:10:03,345:DEBUG:acme.client:Storing nonce: 5IXlosaq-MdSodILvGFBuYZ9Ghc6xMkDCDMRONCrsmAdEGui2Dg 2024-02-07 22:10:03,346:DEBUG:acme.client:JWS payload: b'' 2024-02-07 22:10:03,352:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820252177: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXEtTWRTb2RJTHZHRkJ1WVo5R2hjNnhNa0RDRE1ST05DcnNtQWRFR3VpMkRnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyNTIxNzcifQ", "signature": "klG7xj-LKm_EeI3d8RS1f5bd3zwFb-OcaCdHEgd_VGzurNbHHwEfO95qQE0eRb_SGQEDasIWp0Ns2OJDBxMYeiMOxQMEvibPTPJbhxaXVx8j7WxY0N9QGp48o_nIe2CiF1rMh0MlBAvJmywBr4ZRIm5YVD2nCsuB9tKJNXlYrsfy_PkL3p4wmVTJDM2uTBffFtPaP8rquh9Yj1m1qKAPF2LOSi-FnjaMTvnKkKWHDXjTdSrAY_u2gITBsWyt2cgCfIUnaImS1FSSmiArszmCsXMitRIScyq_JUu2QtM4IcDIZFJqa_ktr3XNL6KnhVZqzb2JvLZXrj5GtOyuHVXSMw", "payload": "" } 2024-02-07 22:10:03,563:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820252177 HTTP/1.1" 200 801 2024-02-07 22:10:03,565:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:10:03 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA7-Uj7X362QQOZqthFG7obJvk36XIzk1XDOsSFCkbwsgo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:25:50Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/WXsY4w", "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/ZwqjFA", "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/HVTsug", "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8" } ] } 2024-02-07 22:10:03,565:DEBUG:acme.client:Storing nonce: 3l89SrA7-Uj7X362QQOZqthFG7obJvk36XIzk1XDOsSFCkbwsgo 2024-02-07 22:10:03,567:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-07 22:10:03,567:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-02-07 22:10:03,568:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-07 22:10:03,568:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-07 22:10:03,569:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-07 22:10:03,570:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-07 22:10:03,570:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-07 22:10:03,571:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-07 22:10:03,572:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-07 22:10:03,622:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-07 22:10:03,855:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-07 22:10:03,856:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-07 22:10:03,857:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-07 22:10:03,862:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:20 UTC. 2024-02-07 22:10:03,862:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-07 22:10:03,863:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-07 22:10:03,868:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-07 22:10:03,868:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-07 22:10:03,868:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-07 22:10:03,872:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-07 22:10:03,873:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-07 22:10:03,875:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-07 22:10:04,409:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-07 22:10:04,411:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:10:04 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "M692ceYSHBU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-07 22:10:04,412:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-07 22:10:08,460:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7432_key-certbot.pem 2024-02-07 22:10:12,327:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7430_csr-certbot.pem 2024-02-07 22:10:12,327:DEBUG:acme.client:Requesting fresh nonce 2024-02-07 22:10:12,327:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-07 22:10:12,507:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-07 22:10:12,509:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:10:12 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2ksh1KUsflnMg0_l_g_pDQ-BydE1APa9eCpHBpe9un7abVdNX0g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-07 22:10:12,509:DEBUG:acme.client:Storing nonce: 2ksh1KUsflnMg0_l_g_pDQ-BydE1APa9eCpHBpe9un7abVdNX0g 2024-02-07 22:10:12,510:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-02-07 22:10:12,521:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNmbG5NZzBfbF9nX3BEUS1CeWRFMUFQYTllQ3BIQnBlOXVuN2FiVmROWDBnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "hKEBtsW1VmOtZgsDoRZVbGmrtl-KvnZVywP8to22rGsXwzlMQ2h9N6TYSnIC0yP3Bc1Z3hxf-2_lZhttxPPpwS-EjXyqWt7KuVse69USETekU_XkL8BGPJOUTcNXx1TDdRn1it2hYiWwiNZbfky68IpnXAAcgc8X_DXgRRdHo9DEkF2IA1Y0-ruX9YPpiEvAz46cL176vP9C7_pe3xey8hwNdyXr1XaqFe0yumtIAY2ruUEcFlHSX2dA1v3m-0H1s97Ur77uZBvYHM2szqpcoWKW380PSuiIGBXZxNGvcfWUkezxvesSxXUI-vKHURbeESB9pgEqIzGWOOJ8Q2WlhQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-07 22:10:12,786:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-07 22:10:12,787:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 07 Feb 2024 21:10:12 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308800947 Replay-Nonce: kRyagOpUajjPE1TSjEVmWFZtgqyqvzdDVN0PZ26l-Bx71kMVM50 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:25:59Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820285857" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308800947" } 2024-02-07 22:10:12,787:DEBUG:acme.client:Storing nonce: kRyagOpUajjPE1TSjEVmWFZtgqyqvzdDVN0PZ26l-Bx71kMVM50 2024-02-07 22:10:12,787:DEBUG:acme.client:JWS payload: b'' 2024-02-07 22:10:12,794:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820285857: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVhampQRTFUU2pFVm1XRlp0Z3F5cXZ6ZERWTjBQWjI2bC1CeDcxa01WTTUwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyODU4NTcifQ", "signature": "rOeoqiokiHn9ROZXr24BokMYQVvzZfdwDRF63-8P3mwFMqTvQqKf4A7ixLPwAhC5VasRy9U-8ncBJoY9SIEEoVDyVfROcDTAAAIhjXBprlOhXob34Yuh3wM7Y5JD4271wbwjVPod0iXc2zf6SP2YmrOhoocW8os1P5E5hyiCuJM7qD_337yhLxXG9xUm8N4-9sqtRuaJHf4bDmHba-tDJTm4WzKXD_6y37AODyebm7SgPiOwLyjBrqwmriuSkMoVCtEOyuX4CRAvrNNQfPL_VdPiAJt5QqAxrbyMZk1dVDr0GsxmlRNgAXjQ1fsoenyrXcDs359e8D1B8Fl0ypec8w", "payload": "" } 2024-02-07 22:10:12,988:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820285857 HTTP/1.1" 200 805 2024-02-07 22:10:12,989:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:10:12 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2ksh1KUs-zE-1CDtUdyORJJ7m_4u3X2AcWxt1TAGZRFXkDRP3Pg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:25:59Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/6M2-8w", "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/NyT6VQ", "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/Wxujog", "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I" } ] } 2024-02-07 22:10:12,990:DEBUG:acme.client:Storing nonce: 2ksh1KUs-zE-1CDtUdyORJJ7m_4u3X2AcWxt1TAGZRFXkDRP3Pg 2024-02-07 22:10:12,991:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-07 22:10:12,992:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-02-07 22:10:12,992:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-07 22:10:12,993:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-07 22:10:12,994:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-07 22:10:12,995:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-07 22:10:12,995:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-07 22:10:12,996:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-07 22:10:12,998:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-07 22:10:13,045:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-07 22:10:13,252:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-07 22:10:13,254:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-07 22:10:13,255:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-07 22:10:13,260:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:36 UTC. 2024-02-07 22:10:13,260:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-07 22:10:13,261:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-07 22:10:13,266:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-07 22:10:13,266:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-07 22:10:13,267:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-07 22:10:13,283:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-07 22:10:13,285:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-07 22:10:13,286:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-07 22:10:13,755:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-07 22:10:13,756:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:10:13 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "WACrOg9aQRQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-07 22:10:13,757:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-07 22:10:17,869:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7433_key-certbot.pem 2024-02-07 22:10:21,706:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7431_csr-certbot.pem 2024-02-07 22:10:21,706:DEBUG:acme.client:Requesting fresh nonce 2024-02-07 22:10:21,706:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-07 22:10:21,871:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-07 22:10:21,872:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:10:21 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA74n-M8CxbBPF02hma7wsCz3nIKo2ng0_dpl8t47Ux-G0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-07 22:10:21,872:DEBUG:acme.client:Storing nonce: 3l89SrA74n-M8CxbBPF02hma7wsCz3nIKo2ng0_dpl8t47Ux-G0 2024-02-07 22:10:21,872:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-02-07 22:10:21,881:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTc0bi1NOEN4YkJQRjAyaG1hN3dzQ3ozbklLbzJuZzBfZHBsOHQ0N1V4LUcwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "FtA9ANRDSktAWCbMHBy9EpsSh6FYrr-b5CEVZuRno5rqfkaQ-QJlaz2xXel16BI_3pFiVqOsbBqBmX4VFN-bQhPmAWBfugI0gilMfymGJ9Bu0NtFM1jE7svk72vJ1GEQdmvaJ6LKnEg9NFlGIXll3RkJ_r3xf1mvrhsbaNoQHemmEItkPe1RamFkQD267SaQJQSXOCCsqZqRpS15GU2_8McmvPgBTgLXzqa-ibwKf-tTnIFT1rJwQg8kjSzdN-zbhxyV2_VuITMjqCxJuLkgIE7raBfsLtY6NycgwG7odjSoR23yY0iKM_2lfzASQKFOgQAbRQIbVK8OPfvbRt6wsQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-07 22:10:22,160:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-02-07 22:10:22,161:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 07 Feb 2024 21:10:21 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308831767 Replay-Nonce: 3l89SrA7f91gsAaZGYyVlfELPoVjwyYA_FS1vVN8eOsTQTCNFH4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:08Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820328137" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308831767" } 2024-02-07 22:10:22,162:DEBUG:acme.client:Storing nonce: 3l89SrA7f91gsAaZGYyVlfELPoVjwyYA_FS1vVN8eOsTQTCNFH4 2024-02-07 22:10:22,162:DEBUG:acme.client:JWS payload: b'' 2024-02-07 22:10:22,169:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820328137: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdmOTFnc0FhWkdZeVZsZkVMUG9Wand5WUFfRlMxdlZOOGVPc1RRVENORkg0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAzMjgxMzcifQ", "signature": "nBztZXIqbDsJutfr3EUSaN2hBBJ8G9Dp1PRjmQFkgJviGhXKKZRq5SEip20s_uH448UAt0L70ZazEpPcIOjBOFqEsMELBeuM2GvKKQL6-Yx7WgQQPxdYYXIUzTC5ZrYsDhyM2a7w9z9OQNGPfoIjvFFyUpJwuudD704dM4f02R9U7SQLYl9XyBaoOQ9sPvC8BJQfet-bxYefs5hUMINDjfBG9nz8SbRqLdD1e4mD9qrvvSCqtFljKT9UiU4IMS5u50JjYYteFX42-dJOLD6l0uA0wdsX8-kRh-XQbbnwzATjq_N_c9vRm5ZROu-Ml2GNw2nNqZSyQTJmUND0vih5Pw", "payload": "" } 2024-02-07 22:10:22,339:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820328137 HTTP/1.1" 200 809 2024-02-07 22:10:22,341:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:10:22 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA77gzmlLQwjrp3tFQ9riP-qIEtWp-vmR9IkwvqCqoK80s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:08Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/EQtjAQ", "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/KonEuA", "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/buqaYg", "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM" } ] } 2024-02-07 22:10:22,341:DEBUG:acme.client:Storing nonce: 3l89SrA77gzmlLQwjrp3tFQ9riP-qIEtWp-vmR9IkwvqCqoK80s 2024-02-07 22:10:22,342:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-07 22:10:22,343:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-02-07 22:10:22,344:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-07 22:10:22,345:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-07 22:10:22,345:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-07 22:10:22,346:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-07 22:10:22,346:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-07 22:10:22,346:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-07 22:10:22,347:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-07 22:10:22,391:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-07 22:10:22,625:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-07 22:10:22,626:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-07 22:10:22,628:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-07 22:10:22,632:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:50 UTC. 2024-02-07 22:10:22,632:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-07 22:10:22,633:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-07 22:10:22,637:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-07 22:10:22,637:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-07 22:10:22,637:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-07 22:10:22,641:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-07 22:10:22,642:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-07 22:10:22,643:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-07 22:10:23,181:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-07 22:10:23,182:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:10:22 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "uGYwm49dL38": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-02-07 22:10:23,183:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-07 22:10:27,404:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7434_key-certbot.pem 2024-02-07 22:10:31,096:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7432_csr-certbot.pem 2024-02-07 22:10:31,097:DEBUG:acme.client:Requesting fresh nonce 2024-02-07 22:10:31,097:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-07 22:10:31,274:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-07 22:10:31,275:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:10:31 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2ksh1KUsQDh8bHPkojoq5NgGLMY9wMB8pad02gR0b4WWoO6Rkh4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-07 22:10:31,275:DEBUG:acme.client:Storing nonce: 2ksh1KUsQDh8bHPkojoq5NgGLMY9wMB8pad02gR0b4WWoO6Rkh4 2024-02-07 22:10:31,275:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-02-07 22:10:31,282:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNRRGg4YkhQa29qb3E1TmdHTE1ZOXdNQjhwYWQwMmdSMGI0V1dvTzZSa2g0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "qOokRwreeOl-KGt1UNby9msUUf587dAx3NT4Fv9t84BBty9bT4_o7xfaVPQizBPo1VlQf-taqY00IGG8Nct8SEvpDqTAEEjpf7QUhEQlwJaKLh7t8572fqklDjWojsr_rSpF2iSzyQvM2wWiYB9wNAY72mxgityIPXPVk23SXgT-EnZr_4CHU4zV259alYmFNvBVWZP3U9s0v47lwtvHGyt3CYzX96FNnHudulWkc5Zsf0aUyWVDVyJDgLFlIF4r0xJVhcx_GR5SES1ETQn3p101VFGBx_VYGGuvPoBOZAKlCJJd2J1QFJ-HEgN8iSGKQvkHSns0LaK1bW2dSzvnSw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-07 22:10:31,472:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-02-07 22:10:31,473:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 07 Feb 2024 21:10:31 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308858697 Replay-Nonce: 2ksh1KUsDdWoAIYT1y6XIjkwVb-iSIPMgy62iqPmd2WZlmZx80g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:17Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820367847" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308858697" } 2024-02-07 22:10:31,474:DEBUG:acme.client:Storing nonce: 2ksh1KUsDdWoAIYT1y6XIjkwVb-iSIPMgy62iqPmd2WZlmZx80g 2024-02-07 22:10:31,474:DEBUG:acme.client:JWS payload: b'' 2024-02-07 22:10:31,482:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820367847: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNEZFdvQUlZVDF5NlhJamt3VmItaVNJUE1neTYyaXFQbWQyV1psbVp4ODBnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAzNjc4NDcifQ", "signature": "vSrNlv_N-RWI24mIYdNL79mUlzihj2rsGC9D7PkG187q_f012EvPRnJSJTxQkyWmuyI6XmWbPRwYBIeBEBvzuB5hVKucDSc8v7zia44Uk6Jflr8IbiIoiufk1N7ZLKh8Tmu55nxpV6TaD-1DfUtR3NjFX004a2b163b3SGkX5yGbGmWgHBCAA1B9y_GMb2gwSdd2_tqfwe_UUntEl8O5MyMgt5u3DNfko0yAUtMHcWzZ1F7OnCbyciGscfdSeZ3M9UB0XVOmXx4KNbeJDSXlcnYPRBjGYO9JtWXyxfNDNE_gRL9pNC7QMQuAiex-FQG6R8NEGYc_ByQuhT-p_wWxCw", "payload": "" } 2024-02-07 22:10:31,664:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820367847 HTTP/1.1" 200 806 2024-02-07 22:10:31,665:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:10:31 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: kRyagOpUP-T_ceXiZGt5DlUXoLMCsr9weCmOJBTFD8vWwJR0-Co X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:17Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/666fkA", "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/UVRmBQ", "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/SNClog", "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM" } ] } 2024-02-07 22:10:31,666:DEBUG:acme.client:Storing nonce: kRyagOpUP-T_ceXiZGt5DlUXoLMCsr9weCmOJBTFD8vWwJR0-Co 2024-02-07 22:10:31,667:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-07 22:10:31,667:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-02-07 22:10:31,668:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-07 22:10:31,669:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-07 22:10:31,670:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-07 22:10:31,671:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-07 22:10:31,671:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-07 22:10:31,672:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-07 22:10:31,674:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-07 22:10:31,711:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-02-07 22:10:31,711:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-07 22:10:31,711:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-02-07 22:10:31,718:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-02-07 22:10:31,720:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-02-07 22:10:31,720:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-02-07 22:10:31,720:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-02-07 22:10:31,721:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-02-07 22:10:31,722:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-02-07 22:10:31,756:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-07 22:10:31,974:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-07 22:10:31,976:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-07 22:10:31,978:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-07 22:10:31,986:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:07 UTC. 2024-02-07 22:10:31,987:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-07 22:10:31,987:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-07 22:10:31,993:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-07 22:10:31,993:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-07 22:10:31,993:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-07 22:10:31,997:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-07 22:10:31,998:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-07 22:10:32,000:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-07 22:10:32,459:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-07 22:10:32,460:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:10:32 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "68HZn3akgRY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-07 22:10:32,461:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-07 22:10:36,540:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7435_key-certbot.pem 2024-02-07 22:10:40,498:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7433_csr-certbot.pem 2024-02-07 22:10:40,499:DEBUG:acme.client:Requesting fresh nonce 2024-02-07 22:10:40,499:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-07 22:10:40,649:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-07 22:10:40,651:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:10:40 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaqTBYXG5rsIUN3f9GiV-oidM2jYJ1bEL4-9twoNqXgXkU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-07 22:10:40,651:DEBUG:acme.client:Storing nonce: 5IXlosaqTBYXG5rsIUN3f9GiV-oidM2jYJ1bEL4-9twoNqXgXkU 2024-02-07 22:10:40,652:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-02-07 22:10:40,661:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFUQllYRzVyc0lVTjNmOUdpVi1vaWRNMmpZSjFiRUw0LTl0d29OcVhnWGtVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "CkzAEMKCCPOvH2QeviFa7wV462YcVInEUx4TdoQcls61hOyN-cc6qGfPaZetXFgdmd3WYDjxqzqAcrBOD_vt7JIm1OzrLANKqTXfzqFdaGmYQHwk-bCxD2muDwz8ucMEsvppAi2j6E1heRt1i1K2LzADq5qC5itTlkTD9V9f-1F6wfiLoscIyI8pPk6v7cAScP5q_UVIBwtEqJEghYM36UaHyoBGh7BUYbV8Am3lZGrM_TFAAmnESP6aVpgn7eUytGKQpdZUHsd8bSWFiL3DSoNie1y_STEFN2Brh3q0YXNE-cz-TluE5Sd9bGjP7GuANK3QbHbj8xH8Dcpu0MWpPw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-07 22:10:40,844:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-02-07 22:10:40,845:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 07 Feb 2024 21:10:40 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308883057 Replay-Nonce: 5IXlosaqtOvJSoARwvtBpGOL4bwDoJLgpvYkj18zp_inLMZ3uhU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:25Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820404667" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308883057" } 2024-02-07 22:10:40,845:DEBUG:acme.client:Storing nonce: 5IXlosaqtOvJSoARwvtBpGOL4bwDoJLgpvYkj18zp_inLMZ3uhU 2024-02-07 22:10:40,846:DEBUG:acme.client:JWS payload: b'' 2024-02-07 22:10:40,853:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820404667: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXF0T3ZKU29BUnd2dEJwR09MNGJ3RG9KTGdwdllrajE4enBfaW5MTVozdWhVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0MDQ2NjcifQ", "signature": "I6dwzjlH2WdfI1dhjWk79m7XAU_X5AVOhNxr8kmQ4Y4ZDOp5Te85jkGGgkePsQG2JnzJvF3ReYnBr5nNBOIvwj754m5SMIIKgksT8Z_B1pTVxgDoirDYAlCt8CN72BSZvR6yXX7ogcT0fsL4xW-c-UFOE7Db1-AHQOXXhLySzWa4XTc58Bd1SfJXO3Qjh0bZS3pP4AkziB71l6J3I5hYU8Y2No-UbCb0XGar9tDZ_ABYonmN2JoyZSoorauI4WcweF8EhhmPRe6nGyDxzIB9VFYJTibBC6MxpG-LWeY7ZfTwJ1aGcuY5dHWOVoemjujJwVn_qGmbgJ6b0ynrsq3-7w", "payload": "" } 2024-02-07 22:10:41,014:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820404667 HTTP/1.1" 200 811 2024-02-07 22:10:41,015:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:10:40 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA7zk_d4GQYFvgfXj8u2tVm1rfw1k3pgDcpzn6JLSDNC3M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:25Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/g54rZQ", "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/4yZXyw", "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/bXegoA", "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08" } ] } 2024-02-07 22:10:41,016:DEBUG:acme.client:Storing nonce: 3l89SrA7zk_d4GQYFvgfXj8u2tVm1rfw1k3pgDcpzn6JLSDNC3M 2024-02-07 22:10:41,017:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-07 22:10:41,017:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-02-07 22:10:41,018:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-07 22:10:41,019:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-07 22:10:41,020:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-07 22:10:41,021:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-07 22:10:41,021:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-07 22:10:41,022:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-07 22:10:41,024:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-07 22:10:41,083:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-07 22:10:41,357:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-07 22:10:41,359:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-07 22:10:41,361:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-07 22:10:41,366:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:31 UTC. 2024-02-07 22:10:41,366:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-07 22:10:41,366:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-07 22:10:41,371:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-07 22:10:41,371:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-07 22:10:41,371:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-07 22:10:41,380:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-07 22:10:41,381:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-07 22:10:41,382:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-07 22:10:41,845:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-07 22:10:41,846:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:10:41 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "VXhFgAeYI_c": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-07 22:10:41,847:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-07 22:10:45,996:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7436_key-certbot.pem 2024-02-07 22:10:49,872:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7434_csr-certbot.pem 2024-02-07 22:10:49,873:DEBUG:acme.client:Requesting fresh nonce 2024-02-07 22:10:49,873:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-07 22:10:50,031:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-07 22:10:50,032:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:10:49 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA7RvuZqMddhCxDIll37rfzc7gB1Hxye1yShgiG3iIG7EQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-07 22:10:50,032:DEBUG:acme.client:Storing nonce: 3l89SrA7RvuZqMddhCxDIll37rfzc7gB1Hxye1yShgiG3iIG7EQ 2024-02-07 22:10:50,038:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-02-07 22:10:50,050:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdSdnVacU1kZGhDeERJbGwzN3JmemM3Z0IxSHh5ZTF5U2hnaUczaUlHN0VRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "u-W5_J8tlDCI1Bu3F8Swwl6kNaXWIRVwk9G5iUZs6cHp06Vu8fIGgJgBVqOnc9eUtEkqersiZ45mZUSvlazrscBGJ1x0tLHaxqIgFpwZLjTXhzq0JfO_6bc011PsPGP81FnHtQB9IOSW7Ky_WsiyI6si4L3LzUGSS8rkVrkn4sHsavJF9p3EP8KR7qz6Pd68O64Pb19XKr333IQtJECeA-eW1WIxobkK9otRfpqrV0NNFEBG5AfJb4AEfx81KJnYJWPFyPuZ11gMd3koJufJizJXMQI4KUMTEeK2w5dH2yX-K9z9T_K99Y2IKKYNI34PhwKuqN-2fwjHCYlFmtIn3g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-07 22:10:50,222:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-02-07 22:10:50,223:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 07 Feb 2024 21:10:50 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308906667 Replay-Nonce: 3l89SrA78OAUI9LUMT-VNkkxC4U2g0CX_JjFt0x8QOXLUdDkmGE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:34Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820438127" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308906667" } 2024-02-07 22:10:50,223:DEBUG:acme.client:Storing nonce: 3l89SrA78OAUI9LUMT-VNkkxC4U2g0CX_JjFt0x8QOXLUdDkmGE 2024-02-07 22:10:50,224:DEBUG:acme.client:JWS payload: b'' 2024-02-07 22:10:50,233:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820438127: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTc4T0FVSTlMVU1ULVZOa2t4QzRVMmcwQ1hfSmpGdDB4OFFPWExVZERrbUdFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0MzgxMjcifQ", "signature": "vWrqOkgC_t2gNR4oQqmgdGzf6sW0KVMyzmPGfx031dSljOftymTABLO6NFgeoGH7_o6IWHylH1h4V5BwvWPXZBs43_J7KnjxTOHrathGJ77DiRVhkPy7QM-6RYPOqeZ0fgYtE-AAYBEoLaqvz40H7qk4ysYpM-3toeBYrO0L1fA1X6MdkW3zBOXwS5ov3sI1__MBp_NqlCxeg5Z2r_jvICDTpC7RA61vobWOuOTL4-QBz1W6VJG2y-9otvddZZBKhnzLnVXLKTvcWIn7krHSq66EQ899CxB45FWmiHEtT7SUpbpdxlKxhetmBQDp4HO8k-HC5Qr8JoOogLxOLyOqnw", "payload": "" } 2024-02-07 22:10:50,413:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820438127 HTTP/1.1" 200 810 2024-02-07 22:10:50,415:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:10:50 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaq4thLP4PlHan0AsUG5uIlRtFZSc7JlpGs9oqYunr6e_Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:34Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/rIGBzA", "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/SWtTfQ", "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/R74bXA", "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs" } ] } 2024-02-07 22:10:50,415:DEBUG:acme.client:Storing nonce: 5IXlosaq4thLP4PlHan0AsUG5uIlRtFZSc7JlpGs9oqYunr6e_Q 2024-02-07 22:10:50,416:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-07 22:10:50,417:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-02-07 22:10:50,418:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-07 22:10:50,418:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-07 22:10:50,420:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-07 22:10:50,420:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-07 22:10:50,421:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-07 22:10:50,421:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-07 22:10:50,423:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-07 22:10:50,469:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-07 22:10:50,727:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-07 22:10:50,729:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-02-07 22:10:50,731:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-02-07 22:10:50,739:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:09 UTC. 2024-02-07 22:10:50,739:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-07 22:10:50,740:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-07 22:10:50,744:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-07 22:10:50,744:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-07 22:10:50,744:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-07 22:10:50,748:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-07 22:10:50,749:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-07 22:10:50,751:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-07 22:10:51,337:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-07 22:10:51,338:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:10:51 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "d-K3WiSgI-c": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-07 22:10:51,338:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-07 22:10:55,258:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7437_key-certbot.pem 2024-02-07 22:10:58,956:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7435_csr-certbot.pem 2024-02-07 22:10:58,956:DEBUG:acme.client:Requesting fresh nonce 2024-02-07 22:10:58,956:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-07 22:10:59,134:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-07 22:10:59,134:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:10:58 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2ksh1KUsmKhChdhtrtzaFcMfsfMmiCtSv7KqRow3CHU8YhVFp3E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-07 22:10:59,134:DEBUG:acme.client:Storing nonce: 2ksh1KUsmKhChdhtrtzaFcMfsfMmiCtSv7KqRow3CHU8YhVFp3E 2024-02-07 22:10:59,135:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-02-07 22:10:59,140:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNtS2hDaGRodHJ0emFGY01mc2ZNbWlDdFN2N0txUm93M0NIVThZaFZGcDNFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "A5LPlw8j7_42qFcLJ8HFdnL38T8Ufjr8s8_eFYFUBg23dVwXMTzg17GodZT9pS96YqPpV63AK81lz3kdo7eSmYyv7UG0_ORr956UXecS0aPiutTqSy0Q6wBbzuDM-Qkc88qjTbijlVDGs8GjNGwkpRXR9UCUaFrOy5gLw3gVN5_Fwc-7xwoYtsyfHLrILzHWtYXsR8LETCsjYBEgE1s74Rw9Mrfb_07YmIPbt5ftVBnBCi91nUtnaJzIvjSg8by1vnYn9y47kuab4SNRqzOFgPhDxC9PHRa4DELZSkvSE1YGDt6Ew52rXDEOQNIt1ylidjoGG_fufK8KEzBGZFOCJA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-07 22:10:59,326:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-02-07 22:10:59,327:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 07 Feb 2024 21:10:59 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308929257 Replay-Nonce: kRyagOpUUX6AkHIlE0dl-Q-9KjATGDrM5njr43iktVs1qM7RvVo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:43Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820469197" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308929257" } 2024-02-07 22:10:59,328:DEBUG:acme.client:Storing nonce: kRyagOpUUX6AkHIlE0dl-Q-9KjATGDrM5njr43iktVs1qM7RvVo 2024-02-07 22:10:59,328:DEBUG:acme.client:JWS payload: b'' 2024-02-07 22:10:59,337:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820469197: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVVWDZBa0hJbEUwZGwtUS05S2pBVEdEck01bmpyNDNpa3RWczFxTTdSdlZvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0NjkxOTcifQ", "signature": "Kt-PKGwi8q3W0h1vlSqXTkMTDQRY3w_JVhIFp0UTQFm54FOrSuSFAtdOQvZbBD-u67W-Wqzh2Ifbx98-_UUf5-9Q9RAIGNpcp1duyuXPQz3rXDmCuBTtB-FvVVApMXD2UfIwHJoXtRe83o44EBFS2jRcxIg7QFzD8CmhK6RhcAhUcWlWjHj6VoDKQG8dxl-U72WZJCcMmD_uQfQIBw1MkE2AoHW1pnzBIKxNjup6FwTrxG0ANrDAJEeW5SUjBs-YTJUM9r-AJS3mip2n40bjzODURVx1ci4UMu9ad483XxRDIzOQv6EDCli3SS4gIkOzMmoz-43FM6hTnmqzdYZMkQ", "payload": "" } 2024-02-07 22:10:59,518:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820469197 HTTP/1.1" 200 809 2024-02-07 22:10:59,519:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:10:59 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2ksh1KUsoD0pS6JMMfJU3qRqcdvSpOLrMntl3JpZNAEYIVECW8E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:43Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/PqKyzA", "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/nQMx2Q", "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/ZJc1Yg", "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0" } ] } 2024-02-07 22:10:59,519:DEBUG:acme.client:Storing nonce: 2ksh1KUsoD0pS6JMMfJU3qRqcdvSpOLrMntl3JpZNAEYIVECW8E 2024-02-07 22:10:59,520:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-07 22:10:59,520:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-02-07 22:10:59,521:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-07 22:10:59,521:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-07 22:10:59,521:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-07 22:10:59,521:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-07 22:10:59,522:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-07 22:10:59,522:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-07 22:10:59,523:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-07 22:10:59,574:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-07 22:10:59,770:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-07 22:10:59,773:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is signed by the certificate's issuer. 2024-02-07 22:10:59,775:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD 2024-02-07 22:10:59,785:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:26 UTC. 2024-02-07 22:10:59,785:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-07 22:10:59,785:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-07 22:10:59,791:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-07 22:10:59,792:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-07 22:10:59,792:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-07 22:10:59,796:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-07 22:10:59,797:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-07 22:10:59,799:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-07 22:11:00,263:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-07 22:11:00,264:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:11:00 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "DoogVyrTxe4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-07 22:11:00,265:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-07 22:11:04,633:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7438_key-certbot.pem 2024-02-07 22:11:08,417:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7436_csr-certbot.pem 2024-02-07 22:11:08,418:DEBUG:acme.client:Requesting fresh nonce 2024-02-07 22:11:08,418:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-07 22:11:08,573:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-07 22:11:08,574:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:11:08 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaqg6q_S-yv4ddF_FE27wAc3ayaDBm-ik77_iuyOddD1lo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-07 22:11:08,575:DEBUG:acme.client:Storing nonce: 5IXlosaqg6q_S-yv4ddF_FE27wAc3ayaDBm-ik77_iuyOddD1lo 2024-02-07 22:11:08,575:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-02-07 22:11:08,587:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFnNnFfUy15djRkZEZfRkUyN3dBYzNheWFEQm0taWs3N19pdXlPZGREMWxvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "A1bLc91dA6URCFHOCerVaQ-XgJuN1loe2xa2TmBXx4aDUVVDddnRO8YI0abSLB01Xh0i0ACzWZB1gP4DJV0QWky-GD8EB-vhT6MGX5ojsFhHOi3sKfCNKvL3oe1FeeDOJfAPqmxEwb7jfeZOhC7vdVzomwxBnMp56WErPvcnipuMYokZA9aL4sEwAX18EcfMkuy0uy33UFCIhGL4OQM2NOaDk3Z51aAqSlra399XLukueH8EGiyse--iALadI9wcpP9NAawK8qJ7_gRaFD3KR-b1BO9ipZmKz8hIbA1vr-iqp4Vsjlpx6-5IGfY7KzAymFA8fRhHwKseNWlCTJSajw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-07 22:11:08,759:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-07 22:11:08,760:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 07 Feb 2024 21:11:08 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308951787 Replay-Nonce: 3l89SrA7TVXPrE5Y1wo_uFtkvUyWYRsef_8AHnPlydkqrnbmRbY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:52Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820501457" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308951787" } 2024-02-07 22:11:08,760:DEBUG:acme.client:Storing nonce: 3l89SrA7TVXPrE5Y1wo_uFtkvUyWYRsef_8AHnPlydkqrnbmRbY 2024-02-07 22:11:08,761:DEBUG:acme.client:JWS payload: b'' 2024-02-07 22:11:08,771:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820501457: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdUVlhQckU1WTF3b191RnRrdlV5V1lSc2VmXzhBSG5QbHlka3FybmJtUmJZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1MDE0NTcifQ", "signature": "nYVH_tTRTGwYbxhiUVSsVJmC3Mjdq8K1-90iZZeI91Ma6nBpvt6U9vjd8P16LMV_rVJgIBPj0fklDLm5X1mpaT6lckxKUNjYdzexkx37Yoon0RN0TmYJkd6dwbXxFIH_YQNnryJ9axoUCKoU7K14HWXYWeveghukymkSH53kqWw93uqWDKDBmmXZoa4EclE_g16oVTrFdxKSao06qkao8AEXOooDzN5KditsUX5e2vEL4o02y07AT2mIGCCfewuuS9cnd7RhnV_WYUObb9vWdRzZd8KvXqJ6wr5BLKyuSWRV9jlEvSqNAnSvu3psSymIBv4kDR1-jMQ0clfSnSVPHw", "payload": "" } 2024-02-07 22:11:08,937:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820501457 HTTP/1.1" 200 805 2024-02-07 22:11:08,938:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:11:08 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA7BC6gCEWFOSqQDWPsAjmT-7atTyuLH29vddlbwXFF2R4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:52Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/nfOlPQ", "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/ptX2uw", "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/u4UgEQ", "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw" } ] } 2024-02-07 22:11:08,939:DEBUG:acme.client:Storing nonce: 3l89SrA7BC6gCEWFOSqQDWPsAjmT-7atTyuLH29vddlbwXFF2R4 2024-02-07 22:11:08,940:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-07 22:11:08,940:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-02-07 22:11:08,941:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-07 22:11:08,942:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-07 22:11:08,943:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-07 22:11:08,944:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-07 22:11:08,944:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-07 22:11:08,944:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-07 22:11:08,947:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-07 22:11:09,006:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-07 22:11:09,184:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-07 22:11:09,186:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-07 22:11:09,188:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-07 22:11:09,193:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:43 UTC. 2024-02-07 22:11:09,193:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-07 22:11:09,193:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-07 22:11:09,200:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-07 22:11:09,201:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-07 22:11:09,201:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-07 22:11:09,206:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-07 22:11:09,206:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-07 22:11:09,208:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-07 22:11:09,759:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-07 22:11:09,760:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:11:09 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "X5qd062cYDU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-07 22:11:09,761:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-07 22:11:14,255:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7439_key-certbot.pem 2024-02-07 22:11:18,212:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7437_csr-certbot.pem 2024-02-07 22:11:18,213:DEBUG:acme.client:Requesting fresh nonce 2024-02-07 22:11:18,213:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-07 22:11:18,394:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-07 22:11:18,396:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:11:18 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: kRyagOpUkUUAsSiZQmJIkavo5fHYgGtFAzBILUmHLmIlySheYMk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-07 22:11:18,396:DEBUG:acme.client:Storing nonce: kRyagOpUkUUAsSiZQmJIkavo5fHYgGtFAzBILUmHLmIlySheYMk 2024-02-07 22:11:18,397:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-02-07 22:11:18,405:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVrVVVBc1NpWlFtSklrYXZvNWZIWWdHdEZBekJJTFVtSExtSWx5U2hlWU1rIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "odNw8ibc7_Tr50z7JeDzBai5ds6sWjFcaR5mjI709jms-Gu2nJd2v9IQAcGfzZpV34DSUx4GRrVozrnxkCUUJecNYPthaAoyBdGCTzdWeaJx9XSXrCCMOKxJWFUgnmlOh3IvsNRnQ9MSPKg7OZQwffNA_HxGBNHsAQ3zJM0erpNNuui2gtQcR9SHTVPvgudl0IywcFHQbuQ6SbP8VAb216uSBIEOPMWEVfN_kKwm-32nNz83rlcmUk4TVRIuOfxz6f6htlVVhMMBHK365fBQCk2pcXC47f3PlR2rLQ8BC_wx0PE0cM8ziJYCFiZtYqnHtQxfq0ZhfPgzKDquM7zOdw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-07 22:11:18,596:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-07 22:11:18,597:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 07 Feb 2024 21:11:18 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308975127 Replay-Nonce: 2ksh1KUsWSQfSKBGfb14MG0-SoP3q_dkAhYQa6y_fVT03LOxF-A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:27:01Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820533737" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308975127" } 2024-02-07 22:11:18,597:DEBUG:acme.client:Storing nonce: 2ksh1KUsWSQfSKBGfb14MG0-SoP3q_dkAhYQa6y_fVT03LOxF-A 2024-02-07 22:11:18,597:DEBUG:acme.client:JWS payload: b'' 2024-02-07 22:11:18,605:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820533737: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNXU1FmU0tCR2ZiMTRNRzAtU29QM3FfZGtBaFlRYTZ5X2ZWVDAzTE94Ri1BIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1MzM3MzcifQ", "signature": "sG9oWqESuNAEPCsgC8m1Q54cNgk-NKFuYyTzFAV2m-4FWW-Uzd1PGeN0MsdvJkm4rJTRD009yWozU5yCGp0sVM0IHISq8oKFbTkxtf8PQUvXgCVcPn7whcrLJjVwYf0KzsAKkOLjF89nKw12YVMTjLQJ-VWQier8WyGLnkV85tfz3E3BTt10GG2ddKVsj_IWYwl1YKXHhkQj63u1CzTNbW3zxyqILyICOZWwlFMsEMRuW7f2jgMHEsAfD3R-F4bpbaLBL_V7Cc5Lkzwd6_xpa-gpQWKJTxuR99YCVVbOPl2H2IAmXN676Bq6PgBiUJdk-C31i1Me6Kq99LmWaSsccg", "payload": "" } 2024-02-07 22:11:18,792:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820533737 HTTP/1.1" 200 805 2024-02-07 22:11:18,793:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:11:18 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2ksh1KUsYctUR_CjrpddnalY9FqoUqaLrRFvj_YseP9l8D49fiY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:27:01Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/u7lnsw", "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/kawHqw", "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/Xsywzg", "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs" } ] } 2024-02-07 22:11:18,794:DEBUG:acme.client:Storing nonce: 2ksh1KUsYctUR_CjrpddnalY9FqoUqaLrRFvj_YseP9l8D49fiY 2024-02-07 22:11:18,796:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-07 22:11:18,796:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-02-07 22:11:18,797:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-07 22:11:18,798:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-07 22:11:18,799:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-07 22:11:18,799:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-07 22:11:18,800:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-07 22:11:18,800:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-07 22:11:18,802:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-07 22:11:18,848:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-07 22:11:19,086:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-07 22:11:19,088:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-07 22:11:19,089:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-07 22:11:19,093:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:40:02 UTC. 2024-02-07 22:11:19,093:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-07 22:11:19,094:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-07 22:11:19,103:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-07 22:11:19,104:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-07 22:11:19,104:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-07 22:11:19,120:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-07 22:11:19,121:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-07 22:11:19,123:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-07 22:11:19,668:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-07 22:11:19,669:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:11:19 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "lWOlayYkUzI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-07 22:11:19,669:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-07 22:11:23,524:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7440_key-certbot.pem 2024-02-07 22:11:27,272:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7438_csr-certbot.pem 2024-02-07 22:11:27,273:DEBUG:acme.client:Requesting fresh nonce 2024-02-07 22:11:27,273:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-07 22:11:27,454:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-07 22:11:27,455:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:11:27 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: kRyagOpUWAm9Uf_sS9BSueZtQdnf_s8za0kMowmF9Gpyd7Buxi8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-07 22:11:27,455:DEBUG:acme.client:Storing nonce: kRyagOpUWAm9Uf_sS9BSueZtQdnf_s8za0kMowmF9Gpyd7Buxi8 2024-02-07 22:11:27,456:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-02-07 22:11:27,463:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVXQW05VWZfc1M5QlN1ZVp0UWRuZl9zOHphMGtNb3dtRjlHcHlkN0J1eGk4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "QlGA-ZoSn6nPUPKMX-4I5nAbsEtD0-9BnAHeC5LKgAORqIWRjgm2iv5U4fju83mCEPb-9zeYr-K9dzxhoIxc_39zmoHXMPtboCUbMmYQJPUAyss1kTdS-nPQySNPGPgTAEzElzaNTCqGh9IP5hA_yumWYwhNIsYqyx0Oy_ickStMvf7YLRSUIhcOLWJz9dAhMujm_cPX_myqWsAjdSc2njZZuo2yuvQ6u7aqdJiSjGP4zG9Vz37eu-xlRRsEY3_O0cCUKlQ-17nZc4iVVRPj8pycUu9_b-NelzaCN8ouz4xyhf-k2pUygsl1OdGnfl44F-NdMFPIm64rTd2LGMRs5A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-07 22:11:27,659:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-07 22:11:27,660:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 07 Feb 2024 21:11:27 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241309008647 Replay-Nonce: 2ksh1KUsxZDKj_YsPNlVln7hTTGy5NJtrMSHl0fGfmrSwb0EJJo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:27:10Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820580167" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241309008647" } 2024-02-07 22:11:27,661:DEBUG:acme.client:Storing nonce: 2ksh1KUsxZDKj_YsPNlVln7hTTGy5NJtrMSHl0fGfmrSwb0EJJo 2024-02-07 22:11:27,661:DEBUG:acme.client:JWS payload: b'' 2024-02-07 22:11:27,668:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820580167: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXN4WkRLal9Zc1BObFZsbjdoVFRHeTVOSnRyTVNIbDBmR2ZtclN3YjBFSkpvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1ODAxNjcifQ", "signature": "Caevii7uLAJX9bVTGjZOi8zb307pxHfNMF1Qp_QPgaQWJa9YzQlq8TNVqxPtiNeKhrAR_G6CcUaFH6qFF3kieCUaIAuHVVMYH7Kzy-9j2QQV5qkjcqr-Rvtfe3zxpzFSWt3JdIVbqIqsGS6XXoXjdfCAIzSHDK7YxPe2V2CbAC9KB0M10cD7WSRg0tkzIqekOOFSrv1kiQpZuB1yxK2Q2eIuoyZPJ_uh5jtbx7riNxHDORSF0UDWgiX_GJijPrq-9tbZ_UPZDOz7nBnGj2ufOBbfVYhKDH-OQLo_b-Tf8TogNS3wn6BMElEISkYsQk-nV-F77S7FehrZpafTOD2ZMQ", "payload": "" } 2024-02-07 22:11:27,854:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820580167 HTTP/1.1" 200 805 2024-02-07 22:11:27,855:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 07 Feb 2024 21:11:27 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: kRyagOpUqUMjHxgzTy45fKmhLKrfY-inkDCFuIudatkm_Trl_EY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:27:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/yNgMJw", "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/JW2Bpw", "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/iioLug", "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc" } ] } 2024-02-07 22:11:27,855:DEBUG:acme.client:Storing nonce: kRyagOpUqUMjHxgzTy45fKmhLKrfY-inkDCFuIudatkm_Trl_EY 2024-02-07 22:11:27,856:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-07 22:11:27,857:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-02-07 22:11:27,858:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-07 22:11:27,858:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-07 22:11:27,860:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-07 22:11:27,860:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-07 22:11:27,860:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-07 22:11:27,861:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-07 22:11:27,863:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-07 22:11:27,863:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-02-07 22:11:27,864:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-02-07 22:11:27,875:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-02-07 22:11:27,877:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)