2024-02-05 21:29:06,163:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-02-05 21:29:06,163:DEBUG:certbot._internal.main:Arguments: [] 2024-02-05 21:29:06,164:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-02-05 21:29:07,035:DEBUG:certbot._internal.log:Root logging level set at 20 2024-02-05 21:29:07,035:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-02-05 21:29:07,072:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-02-05 21:29:07,113:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-05 21:29:07,398:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-05 21:29:07,410:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is signed by the certificate's issuer. 2024-02-05 21:29:07,414:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is: OCSPCertStatus.GOOD 2024-02-05 21:29:07,420:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:15 UTC. 2024-02-05 21:29:07,420:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-05 21:29:07,421:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-05 21:29:07,425:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-05 21:29:07,426:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-05 21:29:07,426:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-05 21:29:07,432:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-05 21:29:07,433:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-05 21:29:07,435:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-05 21:29:07,930:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-05 21:29:07,930:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:29:01 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "7OQ7QiG15Mg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-05 21:29:07,931:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-05 21:29:12,430:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7389_key-certbot.pem 2024-02-05 21:29:16,611:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7387_csr-certbot.pem 2024-02-05 21:29:16,612:DEBUG:acme.client:Requesting fresh nonce 2024-02-05 21:29:16,612:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-05 21:29:16,768:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-05 21:29:16,768:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:29:10 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA71CQTouoVpX2U7C3e0d_2AsnKcqn_RGMajN9cFxhxgOE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-05 21:29:16,769:DEBUG:acme.client:Storing nonce: 3l89SrA71CQTouoVpX2U7C3e0d_2AsnKcqn_RGMajN9cFxhxgOE 2024-02-05 21:29:16,769:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-02-05 21:29:16,774:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTcxQ1FUb3VvVnBYMlU3QzNlMGRfMkFzbktjcW5fUkdNYWpOOWNGeGh4Z09FIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "qufMsNYA41pdWaX4QPLP7-7kUi5bCf4AawLG5sGxPbP1vGdWcIBAb-uqOVc7U8TMitfal0k2gbU22zErQ9eWz5HhscizOh1HmI0vrTY41SYILfe5nuDu2jKjDOLiQZZcrj_BYgSwlnjbfFPQRkeq4YISNThcoYhL3xs7uVCW_q0Q3O8ZsDwiiMKXcVY7R02GKADjt733ywAfLVNyFWtAlA_-eDn9SnRTDApyiDkCkVS0Gn88Z2D2ATcdQpI4yHowvyAFME1GSCsyrAwtlU0sXk2tar6yzHJsLC0-YVWkysdUOQmD9je9MFbYBQFYS4W-DGvlin3T4-FrHC04DPP8aA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-05 21:29:16,941:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-02-05 21:29:16,942:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 05 Feb 2024 20:29:10 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308706407 Replay-Nonce: 3l89SrA7Lp0VFowf6q5bw3vJcsR3Nq9vFxXS0Ufd1vyGXErf29Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:25:24Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820152497" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308706407" } 2024-02-05 21:29:16,942:DEBUG:acme.client:Storing nonce: 3l89SrA7Lp0VFowf6q5bw3vJcsR3Nq9vFxXS0Ufd1vyGXErf29Y 2024-02-05 21:29:16,942:DEBUG:acme.client:JWS payload: b'' 2024-02-05 21:29:16,948:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820152497: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdMcDBWRm93ZjZxNWJ3M3ZKY3NSM05xOXZGeFhTMFVmZDF2eUdYRXJmMjlZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAxNTI0OTcifQ", "signature": "qMlCuBzmmb8yb-P7eh4idYxF7Rr5BX4qXx74wSPuK6biX5fwmUivnI2BmbIeKNOb0ZzyJ4UlOEA0a66k7L0tv2JDW8mxTcrwM2kxigzrbMHMvCzjSydu77uvMxgRDvEcHD9JpcbKfUBDbSm5jDpx4Jb0otOigB5xaMmvqad61hXjMSDv3LOJane32ebqBLN-Y83NjoZV_Yj3TqlpQg0UggWY8u1g_cf0c9FjRnqcivNhV8CqJSuu_4OV9VrUZ0pJcaZrqnEUqlLVkAlRYujf84v-qRPtpPlYUluTbcnXtliWFZl0lu1yanBn8kG9y2kPKHWkswpMs64B-DLr8R90bw", "payload": "" } 2024-02-05 21:29:17,114:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820152497 HTTP/1.1" 200 810 2024-02-05 21:29:17,114:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:29:10 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA7mpzG84G_PxhKGzpV5ytu0RALzmPNZ-vykTHi4D3cfes X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:25:24Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/GeKDkA", "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/sBY_pA", "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/dU31hg", "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI" } ] } 2024-02-05 21:29:17,115:DEBUG:acme.client:Storing nonce: 3l89SrA7mpzG84G_PxhKGzpV5ytu0RALzmPNZ-vykTHi4D3cfes 2024-02-05 21:29:17,115:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-05 21:29:17,116:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-02-05 21:29:17,116:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-05 21:29:17,117:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-05 21:29:17,120:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-05 21:29:17,120:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-05 21:29:17,121:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-05 21:29:17,121:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-05 21:29:17,126:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-05 21:29:17,164:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-05 21:29:17,451:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-05 21:29:17,451:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-05 21:29:17,452:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-05 21:29:17,456:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:32 UTC. 2024-02-05 21:29:17,457:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-05 21:29:17,457:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-05 21:29:17,462:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-05 21:29:17,462:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-05 21:29:17,462:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-05 21:29:17,466:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-05 21:29:17,467:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-05 21:29:17,469:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-05 21:29:17,932:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-05 21:29:17,933:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:29:11 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "KRsqmzGVBQE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-05 21:29:17,933:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-05 21:29:21,774:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7390_key-certbot.pem 2024-02-05 21:29:25,354:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7388_csr-certbot.pem 2024-02-05 21:29:25,355:DEBUG:acme.client:Requesting fresh nonce 2024-02-05 21:29:25,355:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-05 21:29:25,510:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-05 21:29:25,511:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:29:19 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA7F1gdfQafURBOE8Pu8R1FafPnP8mnNRyPLjj56tRhO-g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-05 21:29:25,511:DEBUG:acme.client:Storing nonce: 3l89SrA7F1gdfQafURBOE8Pu8R1FafPnP8mnNRyPLjj56tRhO-g 2024-02-05 21:29:25,511:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-02-05 21:29:25,517:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdGMWdkZlFhZlVSQk9FOFB1OFIxRmFmUG5QOG1uTlJ5UExqajU2dFJoTy1nIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "IDvf-OJbV2DMjcgNeBRMLQZ8USVGe9_lSkxC9INURRtcXrmnuNtQRDP8hxWxqQ78Ss80Up1D8jbwZmzNxl1j8XVMV9sk9xoMzR1mdkaDk_B-F6RqeBzQZ7ngg6arCV-ibv5YksxOdFiMe8BHgf62HViJUrCxBUaAWUnHPjbHMhX4Sma8KLL9VnBjwftj2CZDkkjGXNr1CnuPEM9hgWalYlfGDO3vj19LZhdaQmEtQgjCtFgy44iEP3EsrM4-zuiZBiXBj-VyWknuYzSaL_Gc4BUjsDPgXPtz5mudfC6w9hTQRYqSjRaMgaZOG9Uz0IM5-HH8KRGhd9anbws-P05MhA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-05 21:29:25,711:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-02-05 21:29:25,712:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 05 Feb 2024 20:29:19 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308730387 Replay-Nonce: 5IXlosaqssr7wzCCkFQTjiX0J5BnxDk-M7zamaa5-9QmzOLrM7U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:25:33Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820188867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308730387" } 2024-02-05 21:29:25,713:DEBUG:acme.client:Storing nonce: 5IXlosaqssr7wzCCkFQTjiX0J5BnxDk-M7zamaa5-9QmzOLrM7U 2024-02-05 21:29:25,713:DEBUG:acme.client:JWS payload: b'' 2024-02-05 21:29:25,723:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820188867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFzc3I3d3pDQ2tGUVRqaVgwSjVCbnhEay1NN3phbWFhNS05UW16T0xyTTdVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAxODg4NjcifQ", "signature": "aoPKuQ8yCNN_e_b9kry6rdLTGfcrUJz_X-OHY1tF5-Wp0AsUfKfqgRSRUE11jMWpXpriOD8bytruHT_ryMZdQN5MoWDyPyyiQhqUPGNQ6PKhSApQkxDdw3fDpeZnwVG0sHsIDkc2QE6RVicve8T1bhFQtDAF0Iw2uZw0ecHbZoliUMoP22ceALy-T87NebzdiF5QCayinMT3YaGQdw2eZQxzLGQ1NxBea3ZAARCE1TqBUju9i8XdXIBPggsEmQuIpOFjx7XBvUDOUoZD4UE_kPgO4m_U7TUprYtfIbJs5mXzx7MaQiYPideSMSFmk9RMkzXxzeD9iPoryM5XTvEweg", "payload": "" } 2024-02-05 21:29:25,887:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820188867 HTTP/1.1" 200 804 2024-02-05 21:29:25,888:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:29:19 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaqPdPJ3t0dM28P1CFWbPPQp6vSeyD7Qc7wM_aKMjNLjlU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:25:33Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/Yq7npQ", "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/OkyE8g", "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/IRVMDw", "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU" } ] } 2024-02-05 21:29:25,888:DEBUG:acme.client:Storing nonce: 5IXlosaqPdPJ3t0dM28P1CFWbPPQp6vSeyD7Qc7wM_aKMjNLjlU 2024-02-05 21:29:25,888:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-05 21:29:25,889:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-02-05 21:29:25,889:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-05 21:29:25,889:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-05 21:29:25,890:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-05 21:29:25,890:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-05 21:29:25,890:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-05 21:29:25,891:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-05 21:29:25,892:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-05 21:29:25,942:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-05 21:29:26,182:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-05 21:29:26,184:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-05 21:29:26,186:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-05 21:29:26,190:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:49 UTC. 2024-02-05 21:29:26,191:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-05 21:29:26,191:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-05 21:29:26,195:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-05 21:29:26,195:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-05 21:29:26,195:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-05 21:29:26,200:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-05 21:29:26,201:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-05 21:29:26,203:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-05 21:29:26,735:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-05 21:29:26,736:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:29:20 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "QJNRlUGse5A": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-05 21:29:26,736:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-05 21:29:30,823:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7391_key-certbot.pem 2024-02-05 21:29:34,400:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7389_csr-certbot.pem 2024-02-05 21:29:34,401:DEBUG:acme.client:Requesting fresh nonce 2024-02-05 21:29:34,401:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-05 21:29:34,578:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-05 21:29:34,579:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:29:28 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: kRyagOpUvLn9iiWmVKkiDSkBFNIy4cAC47wLwMl21RfLzKaQOpM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-05 21:29:34,579:DEBUG:acme.client:Storing nonce: kRyagOpUvLn9iiWmVKkiDSkBFNIy4cAC47wLwMl21RfLzKaQOpM 2024-02-05 21:29:34,579:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-02-05 21:29:34,585:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFV2TG45aWlXbVZLa2lEU2tCRk5JeTRjQUM0N3dMd01sMjFSZkx6S2FRT3BNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "yeLj7Bf1LDwLAmOA5d008jsWWu8fUimZVDGElffIDEiR2_pd7zTb8bm9VYaObWzmp2n9fQPosHJrvRIqRj3HiH56q5yKqKDbIvSZlokjo7J2YVZOi_akR67rDCKObjecnlldCQ0NQmXoCsLmQz26D3fKtgAADdrO80P0HoaKRJCu-41L34-Zh8UN6DNGQkuHQ9SWOMkjMhx06XMw4nuP88P3IhKZg6c1yVVxjBNRSYM7quqP72iUVTfXdEUUwOp-WRiMrHiqzY98jIXtbP7YI6Q2AL8jYRu3h7E-tL6b4XIj--u8SKGcOsp1bjbzdpyiv0yB9eIZ3ZHOe1RigNEs_A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-05 21:29:34,774:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-02-05 21:29:34,775:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 05 Feb 2024 20:29:28 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308754257 Replay-Nonce: kRyagOpUBbnQ9CdHb49Bti8saefO2XDgA6ryKxxRYdjNgy4bZjs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:25:42Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820220907" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308754257" } 2024-02-05 21:29:34,776:DEBUG:acme.client:Storing nonce: kRyagOpUBbnQ9CdHb49Bti8saefO2XDgA6ryKxxRYdjNgy4bZjs 2024-02-05 21:29:34,776:DEBUG:acme.client:JWS payload: b'' 2024-02-05 21:29:34,783:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820220907: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVCYm5ROUNkSGI0OUJ0aThzYWVmTzJYRGdBNnJ5S3h4Ullkak5neTRiWmpzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyMjA5MDcifQ", "signature": "E8LtaoFJgKpHTIMEEkDKOu1M4NzjzjklpOzDXtxiubne0l2jc4pVOCz1c3LKnNiuTdosYzH3x-FN8eIk-YuRhgh0fJAZg5ZgyslEshpFY_QsmETt8nf3MYDlxK7n27D2pqSgCZ2xQX8itHbvfLSaXkgYckDpZZDmVMXyBqLlYuRqt_YKDS1wj4eLG4BdrwxFPsEw3PKfm4i-UmdmGAo7tAWjihrpcOMEJ-_fTKOAeKWlJirkpV6ZNGZoldVe2P4Kiueimze67Go72nFgd1YmPbvvWtMnoInbXv3Q2bSRIgnh7DxvFu_OPDBPF4CYpD9ACQwguFtxc2duLe852ddv4A", "payload": "" } 2024-02-05 21:29:34,966:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820220907 HTTP/1.1" 200 807 2024-02-05 21:29:34,967:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:29:28 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: kRyagOpUWrgszHBzrgM5aiO-TRvP3mT1k39Cde289aHcpMi1DUY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:25:42Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/vlhqAg", "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/p9n_vg", "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/ul63Zg", "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA" } ] } 2024-02-05 21:29:34,967:DEBUG:acme.client:Storing nonce: kRyagOpUWrgszHBzrgM5aiO-TRvP3mT1k39Cde289aHcpMi1DUY 2024-02-05 21:29:34,968:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-05 21:29:34,968:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-02-05 21:29:34,969:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-05 21:29:34,969:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-05 21:29:34,970:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-05 21:29:34,970:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-05 21:29:34,970:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-05 21:29:34,971:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-05 21:29:34,972:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-05 21:29:35,011:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-05 21:29:35,263:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-05 21:29:35,264:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-05 21:29:35,265:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-05 21:29:35,270:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:03 UTC. 2024-02-05 21:29:35,270:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-05 21:29:35,270:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-05 21:29:35,275:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-05 21:29:35,275:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-05 21:29:35,275:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-05 21:29:35,280:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-05 21:29:35,281:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-05 21:29:35,283:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-05 21:29:35,825:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-05 21:29:35,826:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:29:29 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "dQy7s3PNyvU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-05 21:29:35,826:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-05 21:29:39,897:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7392_key-certbot.pem 2024-02-05 21:29:43,485:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7390_csr-certbot.pem 2024-02-05 21:29:43,485:DEBUG:acme.client:Requesting fresh nonce 2024-02-05 21:29:43,485:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-05 21:29:43,666:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-05 21:29:43,668:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:29:37 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: kRyagOpU6u3ySFG7K3KkYJq7UWkrGqVXeEnbJSJ29AqR5E0ipXc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-05 21:29:43,668:DEBUG:acme.client:Storing nonce: kRyagOpU6u3ySFG7K3KkYJq7UWkrGqVXeEnbJSJ29AqR5E0ipXc 2024-02-05 21:29:43,668:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-02-05 21:29:43,678:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFU2dTN5U0ZHN0szS2tZSnE3VVdrckdxVlhlRW5iSlNKMjlBcVI1RTBpcFhjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Dnc9crPINcWxB_qAuvQ9hFy4cl-yrTcRQDy4clBfn9esYkHai_TQeoYwUWy9-yU1sHcnSAt3x9tmrm6azg-ErxZ3ZK6U3wB5HMTDNqhazj8I8vaLGPxVUMgdHr0gSd77iQEyEL-k7iN-LDG1vHAXxezFdWZWMPMTTZUVLwr0E9IJ1tWhBd2kPqtYZhkZimINFlEsjXWAkRazG2Eqs1xoXJm3l5HB4vv7-oohHx1-G_5mRy0xBclEEGSsHx9_EFjM2O1zOTvRgIu25TuZTCilYW8hZETSiNHaW-LVmsu39uyWV7ELSPlUDDIfmeY6XYgKrgHofjWOfZ42Nmkm-MXBig", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-05 21:29:43,943:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-02-05 21:29:43,943:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 05 Feb 2024 20:29:37 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308777647 Replay-Nonce: 2ksh1KUs3RbAatyXMx2OTDo7Xc0GNttvrB6UVcK0REvLQ6-b_ak X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:25:50Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820252177" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308777647" } 2024-02-05 21:29:43,944:DEBUG:acme.client:Storing nonce: 2ksh1KUs3RbAatyXMx2OTDo7Xc0GNttvrB6UVcK0REvLQ6-b_ak 2024-02-05 21:29:43,944:DEBUG:acme.client:JWS payload: b'' 2024-02-05 21:29:43,950:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820252177: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXMzUmJBYXR5WE14Mk9URG83WGMwR050dHZyQjZVVmNLMFJFdkxRNi1iX2FrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyNTIxNzcifQ", "signature": "LbbegKysMIJAgs8NQ9PihrsBQP0B85BT20hn6KAl-54NjxGalE7VLcLnNtmfAKvcYz7v2YqGe5BFCQsxBc9SalUPiyCvhaDdDIlzVRZZehv4kgixfvhc6tlsVa_LrfiTVI1ScL8ML_c3XrCvaZeq13d2hE6XQOye5Jd7oV7BSnnmzpTeDU4MhU5SFIlBV6JzrKxP4KLMU7-SO6zExFn4VolbWMyheLWkd4ouGssAT4f68qa_UnGVXvIyYWg-jg8ZwKob4jb4p8AbfXDxLM3tJQqJYgEnLM5eE0WAMcQMvaA-tfqprfIGFJyeVB4sWl3mBZYLZ8lRBgBwl2MzUlVJ9A", "payload": "" } 2024-02-05 21:29:44,140:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820252177 HTTP/1.1" 200 801 2024-02-05 21:29:44,140:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:29:37 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: kRyagOpUcsyyqfzP0zbVVlBVElvj0e0MQghIw0GEVQi1Yam-SlE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:25:50Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/WXsY4w", "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/ZwqjFA", "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/HVTsug", "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8" } ] } 2024-02-05 21:29:44,141:DEBUG:acme.client:Storing nonce: kRyagOpUcsyyqfzP0zbVVlBVElvj0e0MQghIw0GEVQi1Yam-SlE 2024-02-05 21:29:44,141:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-05 21:29:44,142:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-02-05 21:29:44,142:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-05 21:29:44,142:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-05 21:29:44,143:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-05 21:29:44,143:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-05 21:29:44,143:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-05 21:29:44,143:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-05 21:29:44,146:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-05 21:29:44,197:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-05 21:29:44,415:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-05 21:29:44,416:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-05 21:29:44,417:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-05 21:29:44,420:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:20 UTC. 2024-02-05 21:29:44,420:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-05 21:29:44,421:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-05 21:29:44,426:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-05 21:29:44,426:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-05 21:29:44,426:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-05 21:29:44,430:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-05 21:29:44,431:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-05 21:29:44,433:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-05 21:29:44,882:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-05 21:29:44,883:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:29:38 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "3g3T0wiVY10": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-05 21:29:44,884:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-05 21:29:48,762:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7393_key-certbot.pem 2024-02-05 21:29:52,350:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7391_csr-certbot.pem 2024-02-05 21:29:52,350:DEBUG:acme.client:Requesting fresh nonce 2024-02-05 21:29:52,351:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-05 21:29:52,515:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-05 21:29:52,517:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:29:46 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaqVZolFedtwxIp_DXZ0eJ6Dh5QXwMBFnSYBQOfXujXqLg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-05 21:29:52,517:DEBUG:acme.client:Storing nonce: 5IXlosaqVZolFedtwxIp_DXZ0eJ6Dh5QXwMBFnSYBQOfXujXqLg 2024-02-05 21:29:52,518:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-02-05 21:29:52,526:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFWWm9sRmVkdHd4SXBfRFhaMGVKNkRoNVFYd01CRm5TWUJRT2ZYdWpYcUxnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "UxWyaal9oUdEznspfh_NrsHcwLeeV4GERsHWWij8fosR-KwzX2UpFXy4iit0qcR7b8_-0HpgTL1b3-ociSyMTvPDFjxj9KjdpZI4qZdkqinIdMsJPFAul_festa_sriuW88zj2C55YumNDVcIVe2gyckQ57ndJMJMA04wFqwOznliKjynveMz18z1TWoKucrnFCwy5gb1SL6b0ZwejiGaeHO5wX4mSD2rJB1hSQfnrn2fiVRZH3RFa6SxJnanAyWVZec42DCR0o6aKq4rnfaRr20B0t6849DPvqDUUMC9d6QKRFg9u-PuUjVqWisPd5wSXKk9uI8k3PGbe5MiU96hA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-05 21:29:52,699:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-05 21:29:52,701:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 05 Feb 2024 20:29:46 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308800947 Replay-Nonce: 5IXlosaqHWKj3qV8z0axtpT3Kursnz4HWCN9Z6Ze5XewJG9rsGI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:25:59Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820285857" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308800947" } 2024-02-05 21:29:52,701:DEBUG:acme.client:Storing nonce: 5IXlosaqHWKj3qV8z0axtpT3Kursnz4HWCN9Z6Ze5XewJG9rsGI 2024-02-05 21:29:52,702:DEBUG:acme.client:JWS payload: b'' 2024-02-05 21:29:52,710:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820285857: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFIV0tqM3FWOHowYXh0cFQzS3Vyc256NEhXQ045WjZaZTVYZXdKRzlyc0dJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyODU4NTcifQ", "signature": "ncQEjgXaNcUBoOkToXy5wSyGBJfmu77lJ66jGTtfQLL5fEkivx10rbonibTJtbiY17h09yZxXpCUo-Tu7o0T0G1KtcuDgD8e5yqn5K7iVKqQTu1f6ZxKNibxF1eXzgTYHNLBUdVye5ZVB03KBAVcgJiMkUGn9wA2l8eNVnogeAFUEqxIZ7Ga8aeVvpFKAy12ulZ8S2kkJ8SjgopoEDAbX1ppE1RandtlEMmJFLJhXbKawSh4f_KUzacP8o1jqo-Z7qiYH0AhG2uret5iOJY3nwjge-gXoVGlzm7xx0iVnzAJ54zQyTxWAYK4B24UKYwwpJRIdy3_Y03qfC7tVqebAg", "payload": "" } 2024-02-05 21:29:52,879:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820285857 HTTP/1.1" 200 805 2024-02-05 21:29:52,880:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:29:46 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA7To_PYayhiM4djKRBJcubGHy-T-WqN7ftFwd_4pNptb0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:25:59Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/6M2-8w", "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/NyT6VQ", "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/Wxujog", "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I" } ] } 2024-02-05 21:29:52,880:DEBUG:acme.client:Storing nonce: 3l89SrA7To_PYayhiM4djKRBJcubGHy-T-WqN7ftFwd_4pNptb0 2024-02-05 21:29:52,881:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-05 21:29:52,881:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-02-05 21:29:52,881:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-05 21:29:52,882:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-05 21:29:52,882:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-05 21:29:52,882:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-05 21:29:52,883:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-05 21:29:52,883:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-05 21:29:52,884:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-05 21:29:52,919:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-05 21:29:53,160:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-05 21:29:53,161:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-05 21:29:53,162:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-05 21:29:53,166:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:36 UTC. 2024-02-05 21:29:53,166:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-05 21:29:53,166:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-05 21:29:53,171:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-05 21:29:53,171:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-05 21:29:53,171:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-05 21:29:53,176:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-05 21:29:53,177:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-05 21:29:53,179:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-05 21:29:53,629:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-05 21:29:53,630:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:29:47 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "kE7L0zFhrSs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-05 21:29:53,630:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-05 21:29:57,434:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7394_key-certbot.pem 2024-02-05 21:30:01,022:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7392_csr-certbot.pem 2024-02-05 21:30:01,023:DEBUG:acme.client:Requesting fresh nonce 2024-02-05 21:30:01,023:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-05 21:30:01,175:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-05 21:30:01,175:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:29:54 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA7-VFG4Xre-z6f1FZKaTy6UWhcFuTp1qj3A7D6Ugo7Xno X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-05 21:30:01,176:DEBUG:acme.client:Storing nonce: 3l89SrA7-VFG4Xre-z6f1FZKaTy6UWhcFuTp1qj3A7D6Ugo7Xno 2024-02-05 21:30:01,176:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-02-05 21:30:01,181:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTctVkZHNFhyZS16NmYxRlpLYVR5NlVXaGNGdVRwMXFqM0E3RDZVZ283WG5vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Rg_GPiLKLoaPSvVo1PsCg3Y52_dLOB377i_acseVCo16kF7VcUGG_uxLKMl-rJkW76w5pz6lHn5HTj7Xp6_gJ9acfY4Tr7zd6w33R67jhDbVvHuuZFJ8MkEuXUv1GuaUjjhiC2QTgKWGyAJIY2pULigAbdjV-azdybK7RwJgsln7nxDtkFuXzV-yPtxx0oaQ2_7N4c1pPjxRP31ka71-opGutQNXDf1iZvL_ci5QjWOU3E4PpHywsbj0xPzxcfKld8ikjkAYN4o7LzN7EDPAtrnaI-_imV-fWCL6gWCVyLEKOYqrD5NtDfvtbaMFjMaQoGRC98JPiF5vDjwdCCDITQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-05 21:30:01,344:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-02-05 21:30:01,345:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 05 Feb 2024 20:29:54 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308831767 Replay-Nonce: 5IXlosaq4Rta9JfJbIJpJxvc6cBYyJvYHF7TWkzu26gpIHqlsmM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:08Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820328137" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308831767" } 2024-02-05 21:30:01,345:DEBUG:acme.client:Storing nonce: 5IXlosaq4Rta9JfJbIJpJxvc6cBYyJvYHF7TWkzu26gpIHqlsmM 2024-02-05 21:30:01,345:DEBUG:acme.client:JWS payload: b'' 2024-02-05 21:30:01,351:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820328137: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXE0UnRhOUpmSmJJSnBKeHZjNmNCWXlKdllIRjdUV2t6dTI2Z3BJSHFsc21NIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAzMjgxMzcifQ", "signature": "fWl-CqGgTLaXeyZ5OIFysD8KlK5cP9jZZ-J6r7H4Z4E8joIf-vgZryRhpYVaMcTbcEKyr6fvS-JpFGLKKDd8Xqfst2Z9ikSJumKJ0VgvhshtLbOeSQfxJs46xAh_FID_w8T2Qkemejj5mwP9g_iXLfXZTWZs-guby-VGAB0fWoVltn6YTJIad5Xt3BogQIwIfPA13fkXk-gN-mtvESmVnVK2IHFJstnpl8OZm4tPdk856omfZdy0gMo_xbusf76w6PESr8APeVXH-Qn0nMSSXLa3pJoXkR-twcKRTzfdW2P1fir3ualLiZDnen7Y-lZCuRV6ER2f8u44f_onjdwKzQ", "payload": "" } 2024-02-05 21:30:01,535:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820328137 HTTP/1.1" 200 809 2024-02-05 21:30:01,537:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:29:55 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaqDhLgog7bZHrgzx4KELS3SjmjcogQwVlCxac9wL5z658 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:08Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/EQtjAQ", "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/KonEuA", "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/buqaYg", "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM" } ] } 2024-02-05 21:30:01,537:DEBUG:acme.client:Storing nonce: 5IXlosaqDhLgog7bZHrgzx4KELS3SjmjcogQwVlCxac9wL5z658 2024-02-05 21:30:01,539:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-05 21:30:01,539:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-02-05 21:30:01,540:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-05 21:30:01,540:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-05 21:30:01,541:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-05 21:30:01,541:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-05 21:30:01,541:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-05 21:30:01,542:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-05 21:30:01,543:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-05 21:30:01,591:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-05 21:30:01,803:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-05 21:30:01,804:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-05 21:30:01,804:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-05 21:30:01,808:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:50 UTC. 2024-02-05 21:30:01,808:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-05 21:30:01,808:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-05 21:30:01,813:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-05 21:30:01,813:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-05 21:30:01,813:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-05 21:30:01,818:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-05 21:30:01,819:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-05 21:30:01,821:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-05 21:30:02,281:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-05 21:30:02,282:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:29:55 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "OojUgYnLy_w": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-05 21:30:02,282:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-05 21:30:05,956:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7395_key-certbot.pem 2024-02-05 21:30:09,558:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7393_csr-certbot.pem 2024-02-05 21:30:09,559:DEBUG:acme.client:Requesting fresh nonce 2024-02-05 21:30:09,559:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-05 21:30:09,737:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-05 21:30:09,738:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:30:03 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA7n_FpwP0FPB5_S46unLfrR9EXXxGl1JiKmjbF6VsznwI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-05 21:30:09,738:DEBUG:acme.client:Storing nonce: 3l89SrA7n_FpwP0FPB5_S46unLfrR9EXXxGl1JiKmjbF6VsznwI 2024-02-05 21:30:09,738:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-02-05 21:30:09,744:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTduX0Zwd1AwRlBCNV9TNDZ1bkxmclI5RVhYeEdsMUppS21qYkY2VnN6bndJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "gfojozJyP_RVoaAaEoWO_-1PxYK2KmUunPl-7fqpuUMKlWMGUYVWMlzYA1gT2Gn9sWJPrsvXqlwXmfFLuOD3xSW9i-wlLNtuXAwIgZcQxttkUrLpb6HiMp64pMrOBPyrgowoRLdL6zALo1wHN3K50z_0-HjM_VLdpSusqSDxPRFvG2xxpBygHVLjrHkUaC1rCwOgEzqDdnJs9JNWyrM_2zrkymUXU2-t7AruRHPdQ4FSNYMV1e7_e2zLA74zXifMnznlRKlZl91Iqok0mh1inR1_HEuRGkN_Qt7K5u2j6LhaFQDoc18XJDFU663as9oWd0xTqvEG8Ls0QHRI-Mk4mg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-05 21:30:09,969:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-02-05 21:30:09,970:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 05 Feb 2024 20:30:03 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308858697 Replay-Nonce: 3l89SrA7sJM4veGp1zX2itRPFx7dQzoy_zDiFCbV1_Sbv0q_ITA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:17Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820367847" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308858697" } 2024-02-05 21:30:09,971:DEBUG:acme.client:Storing nonce: 3l89SrA7sJM4veGp1zX2itRPFx7dQzoy_zDiFCbV1_Sbv0q_ITA 2024-02-05 21:30:09,971:DEBUG:acme.client:JWS payload: b'' 2024-02-05 21:30:09,985:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820367847: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdzSk00dmVHcDF6WDJpdFJQRng3ZFF6b3lfekRpRkNiVjFfU2J2MHFfSVRBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAzNjc4NDcifQ", "signature": "f6uz43PiXvDKLO6kVIHwNyjI8PpCn90UxD87xhiedrUUysCuUMVJcIsvGt5lefDrfXRAWMbG8741jA8ApAAOPYNjunRaGsEtswogEe3Ov7lzWwTIxY5U9itf1U8YcM2Z_RZ48DIdd7MLY8zPmATEieEa3WXQULbATZ-TYAgKXoRiVOM40hEkti1SZOqf4Bw88cZleJ1VtTFmpuFUT0iks_8hUsEIUWteX8wrbX79j03FMnJ6HVhSn_n51oQgCs_UyN1ika91dd3vdgje2dPALXHWVVMN5gTS4_BIlSNtiVea94Oy8UpDZapnNf0rHxIp2pcOQg2G-UkSxE015lX89g", "payload": "" } 2024-02-05 21:30:10,206:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820367847 HTTP/1.1" 200 806 2024-02-05 21:30:10,206:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:30:03 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA7ck6HuuT-4oJHw1Lefod3d3MvZ5NsMT0aR8zAL7z4vaQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:17Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/666fkA", "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/UVRmBQ", "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/SNClog", "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM" } ] } 2024-02-05 21:30:10,206:DEBUG:acme.client:Storing nonce: 3l89SrA7ck6HuuT-4oJHw1Lefod3d3MvZ5NsMT0aR8zAL7z4vaQ 2024-02-05 21:30:10,207:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-05 21:30:10,207:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-02-05 21:30:10,208:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-05 21:30:10,208:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-05 21:30:10,208:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-05 21:30:10,208:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-05 21:30:10,208:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-05 21:30:10,208:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-05 21:30:10,210:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-05 21:30:10,255:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-02-05 21:30:10,255:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-05 21:30:10,255:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-02-05 21:30:10,262:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-02-05 21:30:10,265:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-02-05 21:30:10,265:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-02-05 21:30:10,265:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-02-05 21:30:10,265:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-02-05 21:30:10,267:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-02-05 21:30:10,306:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-05 21:30:10,554:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-05 21:30:10,554:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-05 21:30:10,555:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-05 21:30:10,559:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:07 UTC. 2024-02-05 21:30:10,559:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-05 21:30:10,560:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-05 21:30:10,564:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-05 21:30:10,565:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-05 21:30:10,565:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-05 21:30:10,569:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-05 21:30:10,570:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-05 21:30:10,572:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-05 21:30:11,105:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-05 21:30:11,106:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:30:04 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "g2hkPZa9Zco": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-05 21:30:11,106:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-05 21:30:14,739:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7396_key-certbot.pem 2024-02-05 21:30:18,328:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7394_csr-certbot.pem 2024-02-05 21:30:18,328:DEBUG:acme.client:Requesting fresh nonce 2024-02-05 21:30:18,328:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-05 21:30:18,506:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-05 21:30:18,507:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:30:12 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2ksh1KUspBuseYbqZ-nu6PLvKTa0KXm651tqpoqwaelaOyXraJE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-05 21:30:18,507:DEBUG:acme.client:Storing nonce: 2ksh1KUspBuseYbqZ-nu6PLvKTa0KXm651tqpoqwaelaOyXraJE 2024-02-05 21:30:18,507:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-02-05 21:30:18,515:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNwQnVzZVlicVotbnU2UEx2S1RhMEtYbTY1MXRxcG9xd2FlbGFPeVhyYUpFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "o0-Ny4JxScAVEjHVsgYNy0M2_IaThs5GLKDSftnjjhX7zvJw00FEHBjn_oeQ200W607-QF360GstVflAID1StQiIff1glEaDY-RU8IYSNxVBVMS6WjUUcDBpavlRtj4tmYLZff4QUzn55VPPygWLcTfrSyuePx5vkZO5x945CtGpJqf7VcPMoouXHygguQOwsaddQdNiBXH3duxz-EXiOk_np-l3GetkAyUketjcvJkngLWl2wRbhlznNJfd0_Pm4txJagKnUUAqMMvygC98TLaBuWhUp7DvH8h9h_m5wVhGEm1ewmD6OkTC73iICkEnh8SEYcGKlLvYql_kSignUQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-05 21:30:18,715:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-02-05 21:30:18,716:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 05 Feb 2024 20:30:12 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308883057 Replay-Nonce: 2ksh1KUs7zE1_0yc5Eb4GxEf8TXKVKdWWUFNjyJOIFP1zBXpyiA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:25Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820404667" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308883057" } 2024-02-05 21:30:18,717:DEBUG:acme.client:Storing nonce: 2ksh1KUs7zE1_0yc5Eb4GxEf8TXKVKdWWUFNjyJOIFP1zBXpyiA 2024-02-05 21:30:18,717:DEBUG:acme.client:JWS payload: b'' 2024-02-05 21:30:18,722:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820404667: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXM3ekUxXzB5YzVFYjRHeEVmOFRYS1ZLZFdXVUZOanlKT0lGUDF6QlhweWlBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0MDQ2NjcifQ", "signature": "bjsNPbbTRo3qE4FYoFd2S8XjctCHxm3XcOD-zvEV26-fVXKyGBEBKSgJUH0bKh3KT5MO_RXjjzUoTRqbha5TY6oNEaVRkqEAGsvbeJh8lydLlUUZhx6HHLFOSohVDhS9hak2Bhv5XpjV93H49QBr_YAy_KykJqzgyNzVBH9Drfqyzbf87SbplAhhQkZetB2vrwu3P2MNyJ5pYZBggA_vX1YRPMqXP6F6V1mHnOO4rv_HvT8oCbXNnTq6aK2v0O4nWRL1GD1KFlbDWMlKhWq88cqKTlpM88gkkvHpwZct-Vc3G2ijj5nPGosDFfFSgYTZCTVUCrhxOqxYBCK85mD1uA", "payload": "" } 2024-02-05 21:30:18,904:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820404667 HTTP/1.1" 200 811 2024-02-05 21:30:18,905:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:30:12 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2ksh1KUsFM8xh25vvqsUYFFjzSRamckDELn8MsaQFQPg9dt8BfI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:25Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/g54rZQ", "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/4yZXyw", "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/bXegoA", "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08" } ] } 2024-02-05 21:30:18,906:DEBUG:acme.client:Storing nonce: 2ksh1KUsFM8xh25vvqsUYFFjzSRamckDELn8MsaQFQPg9dt8BfI 2024-02-05 21:30:18,907:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-05 21:30:18,908:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-02-05 21:30:18,908:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-05 21:30:18,908:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-05 21:30:18,909:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-05 21:30:18,909:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-05 21:30:18,909:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-05 21:30:18,910:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-05 21:30:18,911:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-05 21:30:18,959:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-05 21:30:19,161:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-05 21:30:19,162:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-05 21:30:19,163:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-05 21:30:19,167:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:31 UTC. 2024-02-05 21:30:19,167:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-05 21:30:19,168:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-05 21:30:19,174:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-05 21:30:19,174:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-05 21:30:19,174:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-05 21:30:19,178:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-05 21:30:19,179:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-05 21:30:19,180:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-05 21:30:19,712:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-05 21:30:19,712:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:30:13 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "gp0b_woEzE0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-05 21:30:19,713:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-05 21:30:23,377:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7397_key-certbot.pem 2024-02-05 21:30:26,963:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7395_csr-certbot.pem 2024-02-05 21:30:26,964:DEBUG:acme.client:Requesting fresh nonce 2024-02-05 21:30:26,964:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-05 21:30:27,141:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-05 21:30:27,141:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:30:20 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2ksh1KUsp-ZVemUZa1v10FSG6qKgz7ZDc198mYt8NBV4Vh8ZLJw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-05 21:30:27,141:DEBUG:acme.client:Storing nonce: 2ksh1KUsp-ZVemUZa1v10FSG6qKgz7ZDc198mYt8NBV4Vh8ZLJw 2024-02-05 21:30:27,142:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-02-05 21:30:27,148:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNwLVpWZW1VWmExdjEwRlNHNnFLZ3o3WkRjMTk4bVl0OE5CVjRWaDhaTEp3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "I1YiPNhSannNSmuGhEa4-MBgimlOn3tXN0N42ydKPdp6WHFGDwOwnHoW_xEsMd_-WLABsmeZyK5VTMbVogj-RHNN7wtk0dS94sAPG_pRPcqGdLGiJz7Ywq6WTpIDPZPYS1TsqkllazHcNNl1dz-iatrzjL0f1lMI-HCcTMYNu3t2X9kb44_haa_vT6TJut3jZYjywXlcQJy4VV1qx68XUbIj-p3OqMDuqe9nCGtMSJz1TY34XNxT8Dxqsfi3rYKjF0EEAGOmrI-pi_ULXb0JGWWv4DYUW3PxaP54s3zjj61Ad9Mab99iSMu-JxoI5Se7CoRJJ38bh_MwBFsYoZ9esQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-05 21:30:27,340:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-02-05 21:30:27,340:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 05 Feb 2024 20:30:20 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308906667 Replay-Nonce: kRyagOpUkMn4U927d27-c1Ol53R5dAZIUAGBRu3nINgq2TfmZiY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:34Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820438127" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308906667" } 2024-02-05 21:30:27,341:DEBUG:acme.client:Storing nonce: kRyagOpUkMn4U927d27-c1Ol53R5dAZIUAGBRu3nINgq2TfmZiY 2024-02-05 21:30:27,341:DEBUG:acme.client:JWS payload: b'' 2024-02-05 21:30:27,346:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820438127: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVrTW40VTkyN2QyNy1jMU9sNTNSNWRBWklVQUdCUnUzbklOZ3EyVGZtWmlZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0MzgxMjcifQ", "signature": "XCqm_jzHYABIgqvhZyiZ7HEeRtVWB_v1T0Kf52nm-jBMAAZ4a04YWkWQICnrbGycgBxA_7_2h5nK_p4nklGFf9LQPkj6GQi_i0-FgvD50NyrTZklN7kD_dA03d006FSbERuxYg3Rl155UhAdRdRgS4RiLNu4Zl6oHnPnXYX_2uVk21-AaRWQ4IGarYsF30O9uJOkoB3Lhoa--XasyOAz7L8kijPsScFDDiboX35SyhaLKa0EDenJ_a_Cl1bGhv-V9bk_jW8kUQZDZ7iTUiYqgKhMDLLcwQ6-BLT-DtLx5913G6Yo5_OGw3RwGW6HTSgoffLoOwGMxXuKNcd922UyjA", "payload": "" } 2024-02-05 21:30:27,569:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820438127 HTTP/1.1" 200 810 2024-02-05 21:30:27,571:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:30:21 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2ksh1KUsG_XyYjEiATXqZy6UbNqHpT2I7sddv17QyQ9XJoY8oNo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:34Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/rIGBzA", "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/SWtTfQ", "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/R74bXA", "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs" } ] } 2024-02-05 21:30:27,571:DEBUG:acme.client:Storing nonce: 2ksh1KUsG_XyYjEiATXqZy6UbNqHpT2I7sddv17QyQ9XJoY8oNo 2024-02-05 21:30:27,573:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-05 21:30:27,573:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-02-05 21:30:27,573:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-05 21:30:27,574:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-05 21:30:27,575:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-05 21:30:27,575:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-05 21:30:27,575:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-05 21:30:27,575:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-05 21:30:27,577:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-05 21:30:27,613:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-05 21:30:27,850:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-05 21:30:27,853:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-02-05 21:30:27,854:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-02-05 21:30:27,862:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:09 UTC. 2024-02-05 21:30:27,863:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-05 21:30:27,863:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-05 21:30:27,869:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-05 21:30:27,869:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-05 21:30:27,869:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-05 21:30:27,873:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-05 21:30:27,874:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-05 21:30:27,876:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-05 21:30:28,406:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-05 21:30:28,407:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:30:21 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "T_puJ2jyWwU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-05 21:30:28,407:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-05 21:30:32,432:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7398_key-certbot.pem 2024-02-05 21:30:36,041:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7396_csr-certbot.pem 2024-02-05 21:30:36,042:DEBUG:acme.client:Requesting fresh nonce 2024-02-05 21:30:36,042:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-05 21:30:36,220:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-05 21:30:36,221:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:30:29 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: kRyagOpUu7GJdfWFhUeKXEPE6CNlxEOrJHl6OBKIKfuFT9KgOu4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-05 21:30:36,221:DEBUG:acme.client:Storing nonce: kRyagOpUu7GJdfWFhUeKXEPE6CNlxEOrJHl6OBKIKfuFT9KgOu4 2024-02-05 21:30:36,221:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-02-05 21:30:36,227:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFV1N0dKZGZXRmhVZUtYRVBFNkNObHhFT3JKSGw2T0JLSUtmdUZUOUtnT3U0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "iUoEyfT2C2UCbjJLpCJmev0cwh3NzRjEwCarqXBSSUh7QeWUfvsR9w3aWU8lhVTkAnRx5h974S6jlUmNySnYLGUT2KqIdTixBE1lZrcpXfC_A8HTfARCVhcQ-S4wq6m3wr406qssRuFdddkxgjnGCydAIuCnbisJSfNoPrN0XvhvAqqQfGx7kGkfSq7eGUjoQ42JgTcHwhxU-B6reAtxcqhsq1CMG9dnMnsf8lmWl7S69OgkRhRe6pcZMilTPrJPegN2keU6eEi7NO38e0p7eVhtRFF694SXWaHR9Krr68XMP3aflmKFzt8zPX8w87WMei5ysTCKAUvR8xKBH0BRAA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-05 21:30:36,419:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-02-05 21:30:36,419:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 05 Feb 2024 20:30:29 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308929257 Replay-Nonce: 2ksh1KUsmU4Xx7vzoxjGoNdLkKxVABXeO0kBF3gKCrkG57WQgys X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:43Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820469197" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308929257" } 2024-02-05 21:30:36,420:DEBUG:acme.client:Storing nonce: 2ksh1KUsmU4Xx7vzoxjGoNdLkKxVABXeO0kBF3gKCrkG57WQgys 2024-02-05 21:30:36,420:DEBUG:acme.client:JWS payload: b'' 2024-02-05 21:30:36,425:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820469197: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNtVTRYeDd2em94akdvTmRMa0t4VkFCWGVPMGtCRjNnS0Nya0c1N1dRZ3lzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0NjkxOTcifQ", "signature": "DcNEwA4SVBBtYRyuu02ViXckOftxfc5-ai0kbnK4y0zzurFVWRnWl61LArv93fuC4iW4kObYVNWnnrCiT763Esg9Mb8fBtLpx-0mc0EV7sZ--YigNH8utVMva3UC0Fx5dPdhSiDbrhtlYFJIwr_KbGkwnoIdTvDbPSerA6bYPIoYAHwAybna9c7hI87bTP5P7U_rmNyeNuxttC4SEkvdJC5tahXeWEzdUdlCsUKglHO8YTBQxrxfWTeW99M38ReRSGBqViG7Egh0IreUcGWVSz4L_cru34NGNg2SsbnPCSPZy4K8RmWOoZIxfXq_spA5joGcC3Cn4I1sM42sSaCGeA", "payload": "" } 2024-02-05 21:30:36,605:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820469197 HTTP/1.1" 200 809 2024-02-05 21:30:36,606:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:30:30 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2ksh1KUsoY-IuHV6fnqeRQPzQBQJte3RTPeo8QRX0RELT-HyXSc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:43Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/PqKyzA", "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/nQMx2Q", "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/ZJc1Yg", "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0" } ] } 2024-02-05 21:30:36,607:DEBUG:acme.client:Storing nonce: 2ksh1KUsoY-IuHV6fnqeRQPzQBQJte3RTPeo8QRX0RELT-HyXSc 2024-02-05 21:30:36,607:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-05 21:30:36,608:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-02-05 21:30:36,609:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-05 21:30:36,609:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-05 21:30:36,611:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-05 21:30:36,611:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-05 21:30:36,611:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-05 21:30:36,611:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-05 21:30:36,612:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-05 21:30:36,658:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-05 21:30:36,823:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-05 21:30:36,824:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is signed by the certificate's issuer. 2024-02-05 21:30:36,825:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD 2024-02-05 21:30:36,829:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:26 UTC. 2024-02-05 21:30:36,829:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-05 21:30:36,829:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-05 21:30:36,836:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-05 21:30:36,836:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-05 21:30:36,837:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-05 21:30:36,841:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-05 21:30:36,842:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-05 21:30:36,844:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-05 21:30:37,301:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-05 21:30:37,301:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:30:30 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "AnSiwtbsa30": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-05 21:30:37,302:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-05 21:30:41,063:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7399_key-certbot.pem 2024-02-05 21:30:44,658:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7397_csr-certbot.pem 2024-02-05 21:30:44,658:DEBUG:acme.client:Requesting fresh nonce 2024-02-05 21:30:44,658:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-05 21:30:44,819:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-05 21:30:44,819:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:30:38 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaq0_jizmWeHruC0NBEAQb-YUKusBJSO6CWq2XfBBjdiUA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-05 21:30:44,819:DEBUG:acme.client:Storing nonce: 5IXlosaq0_jizmWeHruC0NBEAQb-YUKusBJSO6CWq2XfBBjdiUA 2024-02-05 21:30:44,820:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-02-05 21:30:44,825:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXEwX2ppem1XZUhydUMwTkJFQVFiLVlVS3VzQkpTTzZDV3EyWGZCQmpkaVVBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Vmxivv2l7eskSZT_uDaNuOcnIUtjwQmBQbul7EcXmluq7bVxWerZDZ8ZOQJmjzL8ui0xnmbWo90R6GPE6ik4IxRgJJlPOHEjNit331YCLDD5Qtvw6VWClgkfzHaEesoMHX4Lkzqhk3kyNd07k3gLUgjmFgYZKR5B7DY-lWssiNWuwXs61VHCSqww1K1bDgWyt_oJsZ7FRHSq3OYdPmpZF3c_6sWxPffJRksHq9-njCgWGEV6d_lrGFCkFTPp3AJlvP4Y2LvQt4EZuOANtYkTXKiQWHHOV8nHzg_jXS8KpdZ2U70uWIKWf0AmWCg9zz3RvilRj-teouD5aEfvZk9RVw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-05 21:30:45,071:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-05 21:30:45,072:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 05 Feb 2024 20:30:38 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308951787 Replay-Nonce: 3l89SrA7XBlHZqJQUZUsiWw6pP8OEUuu4kq15U62FD7FfyuPQvs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:52Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820501457" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308951787" } 2024-02-05 21:30:45,072:DEBUG:acme.client:Storing nonce: 3l89SrA7XBlHZqJQUZUsiWw6pP8OEUuu4kq15U62FD7FfyuPQvs 2024-02-05 21:30:45,072:DEBUG:acme.client:JWS payload: b'' 2024-02-05 21:30:45,077:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820501457: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdYQmxIWnFKUVVaVXNpV3c2cFA4T0VVdXU0a3ExNVU2MkZEN0ZmeXVQUXZzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1MDE0NTcifQ", "signature": "YxbljICyxq0BrRItQsp611dwQ6O8c35hTkBz1-gXTsin8DnnRecg8hLXMy4jRFmlXwtnY7-5rjRJWyWP5NWmjazJcPxFC7J8zpVISPzndnPhlV6VS2cLa1YFoaG1VpKq2VTFG3Wboq_Dl2yHhF_z8XBtMB9WrPT1Rh319qVbu-VEiw4QOOjkAFHwsAh3zM5QtXqZWmFHyD8MMt1BMj2zvpXb2oUTt6tqqAJU27HUWL109uwfw8i3NJGTNn6tGS4gCDwNa6_HmSRVDuEUiv1o-K54Erry_1gPybqaa6GADntbvdNTIf63KwbItyomD1vdiW8xkqR2Yzw-TQG36LAqrg", "payload": "" } 2024-02-05 21:30:45,282:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820501457 HTTP/1.1" 200 805 2024-02-05 21:30:45,282:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:30:38 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA7nomeQa_nT7vYoqh5L1-4I4IDSDeQy5JGwCbeFCLQZgA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:52Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/nfOlPQ", "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/ptX2uw", "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/u4UgEQ", "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw" } ] } 2024-02-05 21:30:45,283:DEBUG:acme.client:Storing nonce: 3l89SrA7nomeQa_nT7vYoqh5L1-4I4IDSDeQy5JGwCbeFCLQZgA 2024-02-05 21:30:45,283:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-05 21:30:45,284:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-02-05 21:30:45,285:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-05 21:30:45,285:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-05 21:30:45,287:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-05 21:30:45,287:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-05 21:30:45,287:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-05 21:30:45,288:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-05 21:30:45,289:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-05 21:30:45,328:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-05 21:30:45,583:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-05 21:30:45,584:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-05 21:30:45,585:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-05 21:30:45,589:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:43 UTC. 2024-02-05 21:30:45,589:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-05 21:30:45,589:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-05 21:30:45,594:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-05 21:30:45,594:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-05 21:30:45,594:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-05 21:30:45,598:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-05 21:30:45,599:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-05 21:30:45,601:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-05 21:30:46,148:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-05 21:30:46,149:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:30:39 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "GFEmr7mzJXc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-05 21:30:46,149:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-05 21:30:49,902:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7400_key-certbot.pem 2024-02-05 21:30:53,489:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7398_csr-certbot.pem 2024-02-05 21:30:53,489:DEBUG:acme.client:Requesting fresh nonce 2024-02-05 21:30:53,490:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-05 21:30:53,672:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-05 21:30:53,673:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:30:47 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: kRyagOpUTidsro_3cyyl-qh76p0bRz87vhmMmqOy1SclY5OFg3Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-05 21:30:53,673:DEBUG:acme.client:Storing nonce: kRyagOpUTidsro_3cyyl-qh76p0bRz87vhmMmqOy1SclY5OFg3Q 2024-02-05 21:30:53,673:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-02-05 21:30:53,680:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVUaWRzcm9fM2N5eWwtcWg3NnAwYlJ6ODd2aG1NbXFPeTFTY2xZNU9GZzNRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "B-nBm_2QZgztl6fUtS7-B67Ed2kl4szdWrMPS5WrhTOug068cFrc0n6LtI6q4FxIH-Eo930blMz_-o7EbizxRcYPm1OmnO7-G30QAJ6d4ljaAcPwoGEznV9q4syiw6PGMo5k3VdxL65_w1PMZIwTWHQEUpar2_7htz01PSlyIua51qhvQLjiO8zrLNZn06a3G6MWHTIYtPUmIl2SRxvy4b0SLEYsIAL8acbXOP1yuUTu7cw0zGuBWB_3JvCes_W_Sgt863KlyCK3YUuOZNjeHO_K2lnMPFO8b3Y2Vder1IDw0TbN9T0WzU33Rx9LWytBWNq-_xCVVM6i9mc3bifXUA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-05 21:30:53,875:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-05 21:30:53,876:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 05 Feb 2024 20:30:47 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308975127 Replay-Nonce: 2ksh1KUsWajuqptwP-EkzGfiaN2NCdBsUwvw7hPNiF8-DNIuoJE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:27:01Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820533737" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308975127" } 2024-02-05 21:30:53,876:DEBUG:acme.client:Storing nonce: 2ksh1KUsWajuqptwP-EkzGfiaN2NCdBsUwvw7hPNiF8-DNIuoJE 2024-02-05 21:30:53,876:DEBUG:acme.client:JWS payload: b'' 2024-02-05 21:30:53,882:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820533737: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNXYWp1cXB0d1AtRWt6R2ZpYU4yTkNkQnNVd3Z3N2hQTmlGOC1ETkl1b0pFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1MzM3MzcifQ", "signature": "DhfqurUPWGtxIna5LHbeUVXyrO8a_hIBIoDowSxO5FiTERWnkt79l7I16mD7KEvW2C8grGvNVInCvKp2tYuA5nQBeyprQaJr6y43X0Yb3xM8Vn4R_2dZVjoQFHcGyRV8xSxPcBPHQufmqbDLzgx9gpcsTlJraXLbgEPI12xUXJdgz-S-xr-q81frQ5-_9zBR2bTas5kRZkcrW5CkGg5rBvnx3ogx2u8rdKgF5ooH8IkHA5Pq-23HXeI4N-uKkKF6Qvs6QO5mTGg-Weg1A1_8y4AxEsujK-sAv94GLIXVJhdHCQiniy1OnP2fYMYL0KtbRcjFfgIKQLjb2-Hd1E6-rQ", "payload": "" } 2024-02-05 21:30:54,067:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820533737 HTTP/1.1" 200 805 2024-02-05 21:30:54,068:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:30:47 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2ksh1KUsn8uIKqXGCMESa7SqCDmZ4cYhZKfxdByWkvR8UEB5j50 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:27:01Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/u7lnsw", "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/kawHqw", "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/Xsywzg", "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs" } ] } 2024-02-05 21:30:54,068:DEBUG:acme.client:Storing nonce: 2ksh1KUsn8uIKqXGCMESa7SqCDmZ4cYhZKfxdByWkvR8UEB5j50 2024-02-05 21:30:54,068:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-05 21:30:54,069:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-02-05 21:30:54,069:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-05 21:30:54,069:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-05 21:30:54,070:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-05 21:30:54,070:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-05 21:30:54,070:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-05 21:30:54,071:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-05 21:30:54,072:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-05 21:30:54,120:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-05 21:30:54,309:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-05 21:30:54,310:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-05 21:30:54,311:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-05 21:30:54,315:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:40:02 UTC. 2024-02-05 21:30:54,316:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-05 21:30:54,316:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-05 21:30:54,321:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-05 21:30:54,321:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-05 21:30:54,321:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-05 21:30:54,325:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-05 21:30:54,326:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-05 21:30:54,328:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-05 21:30:54,862:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-05 21:30:54,863:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:30:48 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "WHzKaGm_5o0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-05 21:30:54,863:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-05 21:30:58,804:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7401_key-certbot.pem 2024-02-05 21:31:02,401:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7399_csr-certbot.pem 2024-02-05 21:31:02,402:DEBUG:acme.client:Requesting fresh nonce 2024-02-05 21:31:02,402:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-05 21:31:02,578:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-05 21:31:02,579:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:30:56 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: kRyagOpUKLOuMXoK8Y12dt3g7gh3uQFKJDYfxC4mA6fa3LZN_-Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-05 21:31:02,579:DEBUG:acme.client:Storing nonce: kRyagOpUKLOuMXoK8Y12dt3g7gh3uQFKJDYfxC4mA6fa3LZN_-Y 2024-02-05 21:31:02,579:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-02-05 21:31:02,585:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVLTE91TVhvSzhZMTJkdDNnN2doM3VRRktKRFlmeEM0bUE2ZmEzTFpOXy1ZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "V5U8RNiDKfsIGnSnt4dqB2Qw3AcYFm2--aEibmTz1n4ao_ssIWFh-YZqxwePXCcK8bEVmJS49CEPUEa1puAFOyiHwIrejstBQqAqwyRPOPE7sCM6G2pOHSXngnIbEWyH2uDrfXJz7owNq9eQ88bNdQb3JFJql_s-NxO2JBTaYlKhdu3AvIVILk8FgtY1Mre6ejtWEqOAez8X-_g0MU1DVoUnxWTJbUK5l0uVuT2BMtWl8D7sWoldY_l0H5MDiAIzmZoMQE1i8EMdYP_aksOAR0axcP9hDX29i6aAjsbdUJKkjJGGsntkoBHpaQ1DuYf4EvqqwbQ8po72WMAnyAQyxg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-05 21:31:02,777:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-05 21:31:02,777:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 05 Feb 2024 20:30:56 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241309008647 Replay-Nonce: kRyagOpUeWWzlqvJIRJiODqrBLffUfyNvI8UgiTjuJ7gLa0QP0s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:27:10Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820580167" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241309008647" } 2024-02-05 21:31:02,777:DEBUG:acme.client:Storing nonce: kRyagOpUeWWzlqvJIRJiODqrBLffUfyNvI8UgiTjuJ7gLa0QP0s 2024-02-05 21:31:02,778:DEBUG:acme.client:JWS payload: b'' 2024-02-05 21:31:02,784:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820580167: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVlV1d6bHF2SklSSmlPRHFyQkxmZlVmeU52SThVZ2lUanVKN2dMYTBRUDBzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1ODAxNjcifQ", "signature": "P5hQEpslcJ_68b4meizbsxF4J0W5VqbjLeXONJStetXkMcM0diIFTBGBRoMLmpvwCDm1JOWqdkOMSe5l6A5z1TO0IW1j-jdiZZJ600pBxp_HJBL7Yp0T31ny3VQNgr-v0fEmW7cKFJGDgpHS7jlTLBruLwU0Efwx-RR8xZnFmWd45nv1rRpdYs7j8hkF6-m5jW_enNOkQzcnfzwpLwaw1BMkfOSKh_1CquuPPUyP9jv6HUDgS_CT-rIXj3SlgvssNuDY-Jxj_Ev0025LZFR8jsFBJHRdF3-oRrZvEc3UJHRPEB7y6dO1bVgJukIvj2JpXlkbblmAx3DkS_JtAAnOCQ", "payload": "" } 2024-02-05 21:31:02,964:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820580167 HTTP/1.1" 200 805 2024-02-05 21:31:02,965:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 05 Feb 2024 20:30:56 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: kRyagOpUeSb0bJ4KANUm1pZGFMPcC60Ys_LorkQFr2dBD7LIt08 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:27:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/yNgMJw", "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/JW2Bpw", "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/iioLug", "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc" } ] } 2024-02-05 21:31:02,965:DEBUG:acme.client:Storing nonce: kRyagOpUeSb0bJ4KANUm1pZGFMPcC60Ys_LorkQFr2dBD7LIt08 2024-02-05 21:31:02,966:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-05 21:31:02,966:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-02-05 21:31:02,966:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-05 21:31:02,967:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-05 21:31:02,967:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-05 21:31:02,968:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-05 21:31:02,968:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-05 21:31:02,968:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-05 21:31:02,969:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-05 21:31:02,970:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-02-05 21:31:02,970:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-02-05 21:31:02,976:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-02-05 21:31:02,979:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)