2024-02-04 16:44:39,325:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-02-04 16:44:39,326:DEBUG:certbot._internal.main:Arguments: [] 2024-02-04 16:44:39,326:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-02-04 16:44:40,291:DEBUG:certbot._internal.log:Root logging level set at 20 2024-02-04 16:44:40,292:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-02-04 16:44:40,334:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-02-04 16:44:40,377:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-04 16:44:40,604:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-04 16:44:40,617:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is signed by the certificate's issuer. 2024-02-04 16:44:40,621:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is: OCSPCertStatus.GOOD 2024-02-04 16:44:40,629:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:15 UTC. 2024-02-04 16:44:40,629:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-04 16:44:40,629:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-04 16:44:40,633:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-04 16:44:40,634:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-04 16:44:40,634:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-04 16:44:40,640:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-04 16:44:40,641:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-04 16:44:40,643:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-04 16:44:41,119:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-04 16:44:41,120:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:44:35 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "wHQSVo4UpNM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-02-04 16:44:41,121:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-04 16:44:46,874:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7363_key-certbot.pem 2024-02-04 16:44:51,661:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7361_csr-certbot.pem 2024-02-04 16:44:51,662:DEBUG:acme.client:Requesting fresh nonce 2024-02-04 16:44:51,662:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-04 16:44:51,816:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-04 16:44:51,817:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:44:46 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA77vNhtR18RAGwq7xExPZde_37_XHCqiQ6o8Na9zoqCDg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-04 16:44:51,817:DEBUG:acme.client:Storing nonce: 3l89SrA77vNhtR18RAGwq7xExPZde_37_XHCqiQ6o8Na9zoqCDg 2024-02-04 16:44:51,817:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-02-04 16:44:51,823:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTc3dk5odFIxOFJBR3dxN3hFeFBaZGVfMzdfWEhDcWlRNm84TmE5em9xQ0RnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "HMYFoqTb7V4Xtfod2coUH351jV1kzXefobJ8MAa1RBvbKTvHHklJ7TrZrlW8dhXE9-327yTgknvJR3oLWg9vFnVwUUYfbX7eAqCBFKfZL_uXg6Hh0uW2NzP0TOC10IE6fipyfyo7eEMEBQOqDICvox4RfhD2vW8s-F0ispt5j-3alR3YLqA7ehA3v9wlnt_0Jyo9pjzBZWGEbX15y3R48gl594ZC2G-URV0nxdLtjTEie87om7ZIEcIfgPcMU9G9IuSzvwVaQmZ4XpOeZIaChm63VxN08LejQk6_Y0PmNeOdUuUpNJBKZavdmgDr9elsbV0UNxHRWyiJjanCWdDJ0g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-04 16:44:51,987:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-02-04 16:44:51,987:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 04 Feb 2024 15:44:46 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308706407 Replay-Nonce: 3l89SrA751JmjcQls0P-0Vyc_rF9e7kweO9G2zxwjsTA1GioSzs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:25:24Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820152497" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308706407" } 2024-02-04 16:44:51,988:DEBUG:acme.client:Storing nonce: 3l89SrA751JmjcQls0P-0Vyc_rF9e7kweO9G2zxwjsTA1GioSzs 2024-02-04 16:44:51,988:DEBUG:acme.client:JWS payload: b'' 2024-02-04 16:44:51,994:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820152497: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTc1MUptamNRbHMwUC0wVnljX3JGOWU3a3dlTzlHMnp4d2pzVEExR2lvU3pzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAxNTI0OTcifQ", "signature": "s6OxVJ2tDC1QTBBZ6ck2TCr73dFnEO3Tr1SYe1sqxg9efTynlxIfpV1sbT8xpqfi4SQ0H9K32EHKxGm5gpVaZq3KEKt9JXx4BBHAvSrcTCPs8vk03WRuKPA-r2PL5rpSLeL9gnjOCBJ1aiilxMnSGA_-LvPaN7RXsOxMHzmjZmPGkt0OmM-TUGX3xkYSKyiW3bXV2URiEcMEgHllmTcSbN2ehWznxIZ3EX-6EMEXJHmRRINK2Wem6nzTOiVtHeW3qbehSmGVI_zGEDMc9tqtk2BBA_xoUiWAZZ5JsnYT7Z6bTVztv8nhJnpLiEje3tO0A-0s0quUnxoS4Yky-AKetA", "payload": "" } 2024-02-04 16:44:52,176:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820152497 HTTP/1.1" 200 810 2024-02-04 16:44:52,176:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:44:46 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA7Jp0NnVb33Ct3TE6g-S1vvP4Q-VsTFzYvOeIV1kUSOU4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:25:24Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/GeKDkA", "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/sBY_pA", "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/dU31hg", "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI" } ] } 2024-02-04 16:44:52,177:DEBUG:acme.client:Storing nonce: 3l89SrA7Jp0NnVb33Ct3TE6g-S1vvP4Q-VsTFzYvOeIV1kUSOU4 2024-02-04 16:44:52,177:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-04 16:44:52,177:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-02-04 16:44:52,178:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-04 16:44:52,178:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-04 16:44:52,181:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-04 16:44:52,182:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-04 16:44:52,182:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-04 16:44:52,182:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-04 16:44:52,187:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-04 16:44:52,230:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-04 16:44:52,644:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-04 16:44:52,645:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-04 16:44:52,646:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-04 16:44:52,650:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:32 UTC. 2024-02-04 16:44:52,651:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-04 16:44:52,651:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-04 16:44:52,656:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-04 16:44:52,657:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-04 16:44:52,657:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-04 16:44:52,660:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-04 16:44:52,661:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-04 16:44:52,663:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-04 16:44:53,113:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-04 16:44:53,113:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:44:47 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "9UhOreX_5F8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-04 16:44:53,114:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-04 16:44:57,643:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7364_key-certbot.pem 2024-02-04 16:45:01,729:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7362_csr-certbot.pem 2024-02-04 16:45:01,730:DEBUG:acme.client:Requesting fresh nonce 2024-02-04 16:45:01,730:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-04 16:45:01,883:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-04 16:45:01,883:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:44:56 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA7JckvKNcqvnNKtGlZrEy2kXAPkR4oKaDhbHAGgpwq8LM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-04 16:45:01,883:DEBUG:acme.client:Storing nonce: 3l89SrA7JckvKNcqvnNKtGlZrEy2kXAPkR4oKaDhbHAGgpwq8LM 2024-02-04 16:45:01,884:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-02-04 16:45:01,889:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdKY2t2S05jcXZuTkt0R2xackV5MmtYQVBrUjRvS2FEaGJIQUdncHdxOExNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "noajwsHqw30AD6pXUqWJDDhWatuKarXK1wYVjDcvHh_o6nHwYPtjWUmBAxfJuhf1VO-xbu-fQntyPzO2BBfzEU9a7EXPAqjdDNCGEgxZ121jZhEJbSQRhWA3yHabFvDbQ1k-uQ6YXitnM3IYgHi56uehueAvwnhS-YR-flxIBzHWodU1hzhQClFrkjJa90O9P9ZYqR-nD_CuffZdzNn33tnT6F-bhvcNlKGzJuCTKYyvwea2MTZzexgZmf9vZnh6s1az_mAVHEGc0SuQQLcfv-X_vIxi3vnpWdNnehNvGJlTsTACZ92qimSbGUCD2E81aj2NhW_O5sM1b8goQbfm8Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-04 16:45:02,063:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-02-04 16:45:02,064:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 04 Feb 2024 15:44:56 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308730387 Replay-Nonce: 3l89SrA7HtWUc3KibWpFbdjjm2utFHOX_BV7pSqs-dOzkPP0v2M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:25:33Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820188867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308730387" } 2024-02-04 16:45:02,064:DEBUG:acme.client:Storing nonce: 3l89SrA7HtWUc3KibWpFbdjjm2utFHOX_BV7pSqs-dOzkPP0v2M 2024-02-04 16:45:02,064:DEBUG:acme.client:JWS payload: b'' 2024-02-04 16:45:02,070:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820188867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdIdFdVYzNLaWJXcEZiZGpqbTJ1dEZIT1hfQlY3cFNxcy1kT3prUFAwdjJNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAxODg4NjcifQ", "signature": "eSMulSwYW3d0GlNlzw8UV9zUTNTP2yIpgfX7Z2M7IVjYbXK903YowPmGUQIm4MfLWJVERmZ2Q9k28ijzbcXyVS4nBOquOk2a3pRGgmLiGTEOawE_WNxyLi7AqN4zt8OWdrvIQpXciZnOOHb5mq2-vezZFFNOt5Rr18r84kJFB5zGTfBLz7vLHJy9a4Hh_IhhwJbOsoEbWPixVnK0Lq0-x3GQ3elmqbRQM9xsWtGCqPAruQbwFDih09VJucUGWbReEVLbbWfiqZ8yXhJ_53OYotwH1ckkEp5k12MC16KXVqYYh2wS7_5kPNm_neiQ9wx8mLCuXgOlxtwNY4uc1QnifA", "payload": "" } 2024-02-04 16:45:02,232:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820188867 HTTP/1.1" 200 804 2024-02-04 16:45:02,233:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:44:56 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaqFQB5oxWM-silF-EtoiXO06SOXpCGaq-mPETic8EUX4Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:25:33Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/Yq7npQ", "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/OkyE8g", "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/IRVMDw", "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU" } ] } 2024-02-04 16:45:02,233:DEBUG:acme.client:Storing nonce: 5IXlosaqFQB5oxWM-silF-EtoiXO06SOXpCGaq-mPETic8EUX4Y 2024-02-04 16:45:02,234:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-04 16:45:02,234:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-02-04 16:45:02,235:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-04 16:45:02,235:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-04 16:45:02,236:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-04 16:45:02,236:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-04 16:45:02,236:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-04 16:45:02,237:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-04 16:45:02,238:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-04 16:45:02,282:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-04 16:45:02,504:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-04 16:45:02,506:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-04 16:45:02,507:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-04 16:45:02,513:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:49 UTC. 2024-02-04 16:45:02,514:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-04 16:45:02,514:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-04 16:45:02,521:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-04 16:45:02,522:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-04 16:45:02,522:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-04 16:45:02,526:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-04 16:45:02,527:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-04 16:45:02,530:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-04 16:45:02,977:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-04 16:45:02,978:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:44:57 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "O6hS8bvt7iA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-04 16:45:02,978:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-04 16:45:06,983:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7365_key-certbot.pem 2024-02-04 16:45:11,010:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7363_csr-certbot.pem 2024-02-04 16:45:11,010:DEBUG:acme.client:Requesting fresh nonce 2024-02-04 16:45:11,010:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-04 16:45:11,160:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-04 16:45:11,161:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:45:05 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA77qF44b8IN_kxR6BzfMgc1YM5pA4sv_O7oWYV8VTPcDQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-04 16:45:11,161:DEBUG:acme.client:Storing nonce: 3l89SrA77qF44b8IN_kxR6BzfMgc1YM5pA4sv_O7oWYV8VTPcDQ 2024-02-04 16:45:11,161:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-02-04 16:45:11,167:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTc3cUY0NGI4SU5fa3hSNkJ6Zk1nYzFZTTVwQTRzdl9PN29XWVY4VlRQY0RRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "XQ1Ungr_jyjdwDckBQDKfrGLzs_oj7Za0Si0ucISCevUwTgXyHNUkLOKpYfUuPCEHdiGV_1mFVS8DWUXWggi7eZ1XUFvVmF-fvaMJCdBv4opJnTYhiJQreK552ODtG34WU-vO6DZcj5LnyS5QgKft7Byvrap740jYc1puflUbj3KEv0PPe9hdhsarAQX5leQYmZfFCGjL8VixV8QDjU7MFgSg6Wmywix_pn58-_p_He5-32Pog5p7_g0dbAZXUqKp6rsXH1LzIbeLrp4UhhbKE28tVgtv6K_TxoQ01F3AxLOnZYfw7sqzWVe0YzJ-GRe_YthCVXfhiVU8AjfWBIhvQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-04 16:45:11,334:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-02-04 16:45:11,335:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 04 Feb 2024 15:45:05 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308754257 Replay-Nonce: 3l89SrA7ZyOt27nYigo-PXDknfCVNctgrRq0TRT4bbqYVVTEHPI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:25:42Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820220907" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308754257" } 2024-02-04 16:45:11,335:DEBUG:acme.client:Storing nonce: 3l89SrA7ZyOt27nYigo-PXDknfCVNctgrRq0TRT4bbqYVVTEHPI 2024-02-04 16:45:11,335:DEBUG:acme.client:JWS payload: b'' 2024-02-04 16:45:11,341:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820220907: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdaeU90MjduWWlnby1QWERrbmZDVk5jdGdyUnEwVFJUNGJicVlWVlRFSFBJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyMjA5MDcifQ", "signature": "bR6pqStiI4L-QI9IftcjUMniziIRmbNLVTFLD1uZUFqIdj_yZYDHZ3JL614Wse6PDq40aROhR9DuGBhFUG-fFprLxW0XCnyIHPTYrQtgkqd4YaKElhGfT6LqMfWOgbyYtR-_hVEs_fQzPNr5DVGVr-9g9i4y2vnvsf-IDYxKeaUxDvzH7CbCAPyHDj_QH468FMPscz5uT4UhwNCYNezzjDrIK0pZPzLEQTb-9zRa4-8IlqMDdkY3bOQw_zSf6J7ifXS-x7AIweyqDbcJHkAXKUaDQzGrsgBfajdoRVdXSc8TLUAZh8x-Q2KpqkfrINlRIs74IvmEDsBRNvfH6fWR5g", "payload": "" } 2024-02-04 16:45:11,501:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820220907 HTTP/1.1" 200 807 2024-02-04 16:45:11,501:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:45:06 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaqzNT8pEtmP2Ev_UdKc3kAtlfowZyWnemV6AWagYz3ALM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:25:42Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/vlhqAg", "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/p9n_vg", "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/ul63Zg", "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA" } ] } 2024-02-04 16:45:11,502:DEBUG:acme.client:Storing nonce: 5IXlosaqzNT8pEtmP2Ev_UdKc3kAtlfowZyWnemV6AWagYz3ALM 2024-02-04 16:45:11,502:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-04 16:45:11,502:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-02-04 16:45:11,503:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-04 16:45:11,503:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-04 16:45:11,504:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-04 16:45:11,504:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-04 16:45:11,504:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-04 16:45:11,504:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-04 16:45:11,505:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-04 16:45:11,558:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-04 16:45:11,642:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-04 16:45:11,643:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-04 16:45:11,644:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-04 16:45:11,648:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:03 UTC. 2024-02-04 16:45:11,648:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-04 16:45:11,649:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-04 16:45:11,655:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-04 16:45:11,655:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-04 16:45:11,655:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-04 16:45:11,660:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-04 16:45:11,661:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-04 16:45:11,664:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-04 16:45:12,194:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-04 16:45:12,195:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:45:06 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "6xkMu2bLJ68": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-04 16:45:12,195:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-04 16:45:16,486:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7366_key-certbot.pem 2024-02-04 16:45:20,436:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7364_csr-certbot.pem 2024-02-04 16:45:20,436:DEBUG:acme.client:Requesting fresh nonce 2024-02-04 16:45:20,436:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-04 16:45:20,614:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-04 16:45:20,614:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:45:15 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: kRyagOpU0e7j9kZmQnANzIhHZISJrgKhCUX9OCgqVUAcOSRs00U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-04 16:45:20,614:DEBUG:acme.client:Storing nonce: kRyagOpU0e7j9kZmQnANzIhHZISJrgKhCUX9OCgqVUAcOSRs00U 2024-02-04 16:45:20,614:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-02-04 16:45:20,620:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFUwZTdqOWtabVFuQU56SWhIWklTSnJnS2hDVVg5T0NncVZVQWNPU1JzMDBVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "hHAKbpUdYko3_pG76k4jAwk-bmZl5W8LR5_8l3bKQ87t_VsGH8K-FjGm0RuzMAmldIv5RH9oLPMj9hGh3w746MJ2D8_EVIQtq_5mT0gE5t9R6E4Sdf4TF_oFMQlQ7cZ-9etVJIZcgtCAddZdJI08M28qVqseKlsvMQUMBPKgBNtzRS_IG7YbZ59kBGceKm_c4iOe7QaMEcRpd7EVKARhhZfqKNgI7F1LX6k469_SOdeMxY9mPibXJp6ekOY523gdOEKcBariWk0C6Fzf9wa7t2R2R3veIjpQXIQvv-nAUDpxa4ttXvio8uRUUNVMa5k1DnZr5o4AM2bUQehFCtSnoQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-04 16:45:20,807:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-02-04 16:45:20,808:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 04 Feb 2024 15:45:15 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308777647 Replay-Nonce: 2ksh1KUsM_MU8EEDanV3--PS2rfy1RSzmleHgKjH4pPvI8MnqA0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:25:50Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820252177" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308777647" } 2024-02-04 16:45:20,808:DEBUG:acme.client:Storing nonce: 2ksh1KUsM_MU8EEDanV3--PS2rfy1RSzmleHgKjH4pPvI8MnqA0 2024-02-04 16:45:20,808:DEBUG:acme.client:JWS payload: b'' 2024-02-04 16:45:20,814:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820252177: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNNX01VOEVFRGFuVjMtLVBTMnJmeTFSU3ptbGVIZ0tqSDRwUHZJOE1ucUEwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyNTIxNzcifQ", "signature": "K_6Kqa3VeYvgi3RT4Fqi0vYr8nPdLRPJ-54UZIUOCyjm0yuqae7m7ekrxfF_2Bw-NpY6d-fbrzuoIRyyJQ43KgfxqijTOVkijLLFBpZQlc1WaRhP4s2oL8lhAe225R6WGxqZi7npe0TM_xwl1xk8Zq4m50KyNuOK1rmq7E0IzYLewh5CcIH_aZo_zCMn4GqTw7w8fyKQfv1tBRFDCQIsJVSbjH22GV1-AtFhmd7KyRkYMT1RmqFIfqz0zVCl2uWw4JRI0gpvg3HxiLurgWZFXcPtxnvI9-WYgtGMF5KtEnEyyPTpEKlMU9lg80J3NLV08qvGRQyxSThdhjLHPMIZjQ", "payload": "" } 2024-02-04 16:45:20,996:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820252177 HTTP/1.1" 200 801 2024-02-04 16:45:20,996:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:45:15 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2ksh1KUsCTLbioSSp9TuVGKxeSE5Je_XBEEfSR6nShZssDY82sk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:25:50Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/WXsY4w", "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/ZwqjFA", "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/HVTsug", "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8" } ] } 2024-02-04 16:45:20,997:DEBUG:acme.client:Storing nonce: 2ksh1KUsCTLbioSSp9TuVGKxeSE5Je_XBEEfSR6nShZssDY82sk 2024-02-04 16:45:20,997:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-04 16:45:20,998:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-02-04 16:45:20,998:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-04 16:45:20,998:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-04 16:45:20,999:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-04 16:45:20,999:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-04 16:45:20,999:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-04 16:45:21,000:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-04 16:45:21,001:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-04 16:45:21,052:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-04 16:45:21,262:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-04 16:45:21,263:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-04 16:45:21,264:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-04 16:45:21,268:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:20 UTC. 2024-02-04 16:45:21,268:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-04 16:45:21,269:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-04 16:45:21,275:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-04 16:45:21,275:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-04 16:45:21,275:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-04 16:45:21,279:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-04 16:45:21,280:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-04 16:45:21,282:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-04 16:45:21,729:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-04 16:45:21,730:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:45:16 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "HfXK1Cp8yLM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-04 16:45:21,730:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-04 16:45:26,133:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7367_key-certbot.pem 2024-02-04 16:45:30,095:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7365_csr-certbot.pem 2024-02-04 16:45:30,096:DEBUG:acme.client:Requesting fresh nonce 2024-02-04 16:45:30,096:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-04 16:45:30,247:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-04 16:45:30,247:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:45:24 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaqfCiF-z_W7skNhW7hENSURhZCRtOTD0NXe31WSAqO-M8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-04 16:45:30,248:DEBUG:acme.client:Storing nonce: 5IXlosaqfCiF-z_W7skNhW7hENSURhZCRtOTD0NXe31WSAqO-M8 2024-02-04 16:45:30,248:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-02-04 16:45:30,254:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFmQ2lGLXpfVzdza05oVzdoRU5TVVJoWkNSdE9URDBOWGUzMVdTQXFPLU04IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "CqoFqmEjEj5sJvYrHAS4H7G8AatuzcSIN1yrHIpB7hrZNEkSZaBwkqam-Le-ArMI57l7Xub5eaAmjUyLehMxTjjeNJmupPI9iXDWlRH9PRZg5mhEkwgqI1B1AicmtBZHfLL-QnT7GTeH0w2vhPxlxs0cbDRTHXPR3IXNmmqMsa2DXgsyT5Db8QwPzrmklJY187ZCPAKfABUTRzi-_gLw55IoLPHfuP3X4bf7WNhXKW2xFAISxGZo2PSE250SzpMcG53jXygNegDap5HM-o8EsMUvcegw7o1INVS02z8TtnZJKEcG-TZJ5XheBOGXckoZ6bftyB9F5iMala_DISTd8w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-04 16:45:30,493:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-04 16:45:30,494:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 04 Feb 2024 15:45:25 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308800947 Replay-Nonce: 5IXlosaqKr7LOQnPt3P3GBqdQ4cL74x_8RPSD7WgP1XSXHw4Ho0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:25:59Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820285857" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308800947" } 2024-02-04 16:45:30,494:DEBUG:acme.client:Storing nonce: 5IXlosaqKr7LOQnPt3P3GBqdQ4cL74x_8RPSD7WgP1XSXHw4Ho0 2024-02-04 16:45:30,495:DEBUG:acme.client:JWS payload: b'' 2024-02-04 16:45:30,500:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820285857: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFLcjdMT1FuUHQzUDNHQnFkUTRjTDc0eF84UlBTRDdXZ1AxWFNYSHc0SG8wIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyODU4NTcifQ", "signature": "Ll94Q7wtZKuftvQELN0Neb3Vpbbe1R1VImB1qkWAusy7rYu0Zr77ulB7V2awNxiUCbK_xhiBQ3-J6C8i3gCxTShiqgK738ACuTOpCJLO155Y0Vtbr1CHqJCiWtZJDnmhbJPPoMytypXpaNcjg1M3nev4StH6J3N2gVLLF1AK8sbba2RiVdiZ68M2GKvWduluRuIBxxXNOWJuz4kO8nqZX4pgeErQaYbbrB0_9B6AP9wDNMftClA4xLCEauYRiRQCxrisIw4eTqe9-5QAVx4OuKmyf6AxqZkmiNnaep1ktnc3wWZ1ekAoWnQ19hkbv-gp07Q_UuYBBT0NR61eWWnxNQ", "payload": "" } 2024-02-04 16:45:30,661:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820285857 HTTP/1.1" 200 805 2024-02-04 16:45:30,662:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:45:25 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaqNclXhGJEj99cLFdCorsab6znGQIEQma2rVNX49mO5Xw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:25:59Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/6M2-8w", "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/NyT6VQ", "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/Wxujog", "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I" } ] } 2024-02-04 16:45:30,662:DEBUG:acme.client:Storing nonce: 5IXlosaqNclXhGJEj99cLFdCorsab6znGQIEQma2rVNX49mO5Xw 2024-02-04 16:45:30,663:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-04 16:45:30,663:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-02-04 16:45:30,664:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-04 16:45:30,664:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-04 16:45:30,664:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-04 16:45:30,665:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-04 16:45:30,665:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-04 16:45:30,665:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-04 16:45:30,666:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-04 16:45:30,715:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-04 16:45:30,980:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-04 16:45:30,981:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-04 16:45:30,982:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-04 16:45:30,987:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:36 UTC. 2024-02-04 16:45:30,987:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-04 16:45:30,987:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-04 16:45:30,991:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-04 16:45:30,991:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-04 16:45:30,991:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-04 16:45:30,996:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-04 16:45:30,996:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-04 16:45:30,998:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-04 16:45:31,448:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-04 16:45:31,448:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:45:26 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "EfoAm3Z12zA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-04 16:45:31,448:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-04 16:45:35,644:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7368_key-certbot.pem 2024-02-04 16:45:39,558:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7366_csr-certbot.pem 2024-02-04 16:45:39,559:DEBUG:acme.client:Requesting fresh nonce 2024-02-04 16:45:39,559:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-04 16:45:39,711:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-04 16:45:39,712:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:45:34 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA7_Vrj_L-WLRG0GFOwEsN6xAOtlXWckDjFXlU-8fsS2uA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-04 16:45:39,712:DEBUG:acme.client:Storing nonce: 3l89SrA7_Vrj_L-WLRG0GFOwEsN6xAOtlXWckDjFXlU-8fsS2uA 2024-02-04 16:45:39,712:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-02-04 16:45:39,718:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdfVnJqX0wtV0xSRzBHRk93RXNONnhBT3RsWFdja0RqRlhsVS04ZnNTMnVBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "dm8uNdJvw4bSPuLsXmubKYTQT3ZzhP9pohfhrwTY9CvSlmPrET6nKWjcTHJP4_kiNCqAiOOEKnwhCufZA1hl8pfc2whoHyTY062wtksno19Mgd8RUQAK-gxHs-VwKhRgcKh7H34LDmGta6EPyyT3-0c72Yuymn2iTaqj1ae6bPSrMtzqlbCuoNBiElbXvSqWmdHyQvFk4dxTXrlLDVZJa86OcvXFapNMGpbx6Cshn6p3jNXQ-fXMCS8QH4MLssMpC-8uz7BvkCNVfHlExHypbjL84NpqN_rRKNlWxX-8PsC6SNqF-V_niqidxiynhKmzkH_IGXhnq-kKhpkAKADQVQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-04 16:45:39,878:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-02-04 16:45:39,879:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 04 Feb 2024 15:45:34 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308831767 Replay-Nonce: 3l89SrA73uwPMtUW3PKZwFWP9HNuXIU82xSuFwamGwApptQgwqE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:08Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820328137" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308831767" } 2024-02-04 16:45:39,879:DEBUG:acme.client:Storing nonce: 3l89SrA73uwPMtUW3PKZwFWP9HNuXIU82xSuFwamGwApptQgwqE 2024-02-04 16:45:39,879:DEBUG:acme.client:JWS payload: b'' 2024-02-04 16:45:39,885:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820328137: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTczdXdQTXRVVzNQS1p3RldQOUhOdVhJVTgyeFN1RndhbUd3QXBwdFFnd3FFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAzMjgxMzcifQ", "signature": "c22Ll7ZIs7gMEKIeXsI0nB-OTPhJC57m_M93Iv20e3YsAoOn0peKQKeLjRA8LPYq6LG5kc-BziJNENSKc2G69Y1fQEnBJe0cYmIlugJ_quvwQZ7hgokc3hF7QvFDF6Ao06L4-u7aq5TqEmw5vvdV2nOpl4gSMF2_te9pyOKNTQc95UwUCPLvjHWMCBeG8QVD6m38UpViDpI-ZvyMeaZQ-wG9v9ZsuoLDOFgAYf9oaP87ew4rzlDdvPv65zt_TC3YihG5vh3BKI0FaQkSoHtacdV3st9jdFnbfAEqj7ObeRyfnm0Fq1bmQzEx_JBJKT6X5XnID1vtxYCz_3ZVV_S_Xw", "payload": "" } 2024-02-04 16:45:40,072:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820328137 HTTP/1.1" 200 809 2024-02-04 16:45:40,072:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:45:34 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaqq_YLvoZ1Bd8CO5Xn0pOCVnwR5RTe1rglIOT987m3yZw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:08Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/EQtjAQ", "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/KonEuA", "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/buqaYg", "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM" } ] } 2024-02-04 16:45:40,072:DEBUG:acme.client:Storing nonce: 5IXlosaqq_YLvoZ1Bd8CO5Xn0pOCVnwR5RTe1rglIOT987m3yZw 2024-02-04 16:45:40,073:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-04 16:45:40,074:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-02-04 16:45:40,074:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-04 16:45:40,074:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-04 16:45:40,075:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-04 16:45:40,075:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-04 16:45:40,075:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-04 16:45:40,076:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-04 16:45:40,077:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-04 16:45:40,121:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-04 16:45:40,364:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-04 16:45:40,366:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-04 16:45:40,366:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-04 16:45:40,370:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:50 UTC. 2024-02-04 16:45:40,371:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-04 16:45:40,371:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-04 16:45:40,376:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-04 16:45:40,377:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-04 16:45:40,377:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-04 16:45:40,381:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-04 16:45:40,382:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-04 16:45:40,385:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-04 16:45:40,930:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-04 16:45:40,931:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:45:35 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "G9RVq4Xzt-I": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-04 16:45:40,932:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-04 16:45:45,242:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7369_key-certbot.pem 2024-02-04 16:45:49,215:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7367_csr-certbot.pem 2024-02-04 16:45:49,215:DEBUG:acme.client:Requesting fresh nonce 2024-02-04 16:45:49,215:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-04 16:45:49,398:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-04 16:45:49,398:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:45:43 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: kRyagOpUfQ3_taMv2F0ohAu3NT3uI6yr9yEMEPDtT7PMIaGt0hs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-04 16:45:49,399:DEBUG:acme.client:Storing nonce: kRyagOpUfQ3_taMv2F0ohAu3NT3uI6yr9yEMEPDtT7PMIaGt0hs 2024-02-04 16:45:49,399:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-02-04 16:45:49,404:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVmUTNfdGFNdjJGMG9oQXUzTlQzdUk2eXI5eUVNRVBEdFQ3UE1JYUd0MGhzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "DehOdzteTJhnYR2vogVeQpuJiyPL6zQNUJUig6peKeGxBKDHMlNMhszbsFdqBz5kQBQX-mPhOP9iWdQdDuiJ5g5d55GGOu0w5fYgjKhoFW9_ZOHPi-zNVRDYUDHp5Wxq9k3kao64yxrL0TIRzr-mPBPWCXO3TffPSyA7eOfHA9sShQzqVnze2sm6FbrqWVxk15PHA1z4cUQPLMPe3v9d2FUFvcZfLkMylzbz5ByfQ5mWpxOAzRuKmnb3I-6ajxnElfKzSfn5AcBvpIxE8hzpTvnCLgcsjzEHyeYey7iOHSL3XlTbDGOWEqjL0hcA_D5xKZET5TrKx11jXA5BpgzkPw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-04 16:45:49,609:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-02-04 16:45:49,609:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 04 Feb 2024 15:45:44 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308858697 Replay-Nonce: kRyagOpUC2OUtn2NYAWXJ8WN929qbgwkuGcYxCls4MW5Y3sK8IQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:17Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820367847" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308858697" } 2024-02-04 16:45:49,610:DEBUG:acme.client:Storing nonce: kRyagOpUC2OUtn2NYAWXJ8WN929qbgwkuGcYxCls4MW5Y3sK8IQ 2024-02-04 16:45:49,610:DEBUG:acme.client:JWS payload: b'' 2024-02-04 16:45:49,615:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820367847: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVDMk9VdG4yTllBV1hKOFdOOTI5cWJnd2t1R2NZeENsczRNVzVZM3NLOElRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAzNjc4NDcifQ", "signature": "LBF5XyOTWiaZrkEiXVj59GpNkEnuAlqfqLk8nadnwWiKBqBQOArrr4fzAZJrFA9Em2_m5wBJexGSFmmmdOqYGckSyLI7UggGSaTgByUtUE9gaPvypFoqARAMLrRSMLQIlAFJ4JDKvcphY4Rvb3Zh3CDlebkRAnfRPNXstmlk2jW4DFy-eSOjI6gI9Kokv0s95iD3ZXd4YYITdcwmmcLg9eQoWVoLFQe2B8HpxM2Cuae0fX7cFbAnO4-Xy9YvjXCiTu1khndKf1ywF0pg-Q6zTgv_U9klo990pBg_60jrJDD9EZYxhkC1tHsJk8FJnH3VArwV_WglqdpAzcerzM6pUQ", "payload": "" } 2024-02-04 16:45:49,799:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820367847 HTTP/1.1" 200 806 2024-02-04 16:45:49,800:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:45:44 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: kRyagOpUyYYFduzfHZ70V1xXlSYZZualD4iHfKMUqT9QlFj3hvc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:17Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/666fkA", "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/UVRmBQ", "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/SNClog", "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM" } ] } 2024-02-04 16:45:49,800:DEBUG:acme.client:Storing nonce: kRyagOpUyYYFduzfHZ70V1xXlSYZZualD4iHfKMUqT9QlFj3hvc 2024-02-04 16:45:49,801:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-04 16:45:49,801:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-02-04 16:45:49,802:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-04 16:45:49,802:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-04 16:45:49,803:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-04 16:45:49,804:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-04 16:45:49,804:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-04 16:45:49,804:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-04 16:45:49,806:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-04 16:45:49,855:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-02-04 16:45:49,855:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-04 16:45:49,856:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-02-04 16:45:49,863:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-02-04 16:45:49,865:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-02-04 16:45:49,866:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-02-04 16:45:49,866:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-02-04 16:45:49,866:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-02-04 16:45:49,868:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-02-04 16:45:49,909:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-04 16:45:50,159:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-04 16:45:50,160:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-04 16:45:50,161:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-04 16:45:50,166:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:07 UTC. 2024-02-04 16:45:50,166:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-04 16:45:50,167:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-04 16:45:50,174:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-04 16:45:50,175:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-04 16:45:50,175:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-04 16:45:50,179:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-04 16:45:50,180:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-04 16:45:50,182:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-04 16:45:50,656:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-04 16:45:50,657:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:45:45 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "pzzdHW9Qfkw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-04 16:45:50,657:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-04 16:45:54,942:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7370_key-certbot.pem 2024-02-04 16:45:58,846:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7368_csr-certbot.pem 2024-02-04 16:45:58,847:DEBUG:acme.client:Requesting fresh nonce 2024-02-04 16:45:58,847:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-04 16:45:59,002:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-04 16:45:59,002:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:45:53 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA7NGUN_IufG1Z3oQ2O30RDk4h0WcKzqg5LuSaPIp068zM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-04 16:45:59,003:DEBUG:acme.client:Storing nonce: 3l89SrA7NGUN_IufG1Z3oQ2O30RDk4h0WcKzqg5LuSaPIp068zM 2024-02-04 16:45:59,003:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-02-04 16:45:59,008:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdOR1VOX0l1ZkcxWjNvUTJPMzBSRGs0aDBXY0t6cWc1THVTYVBJcDA2OHpNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "sZgzMqF7_-MUK1t_EuxjN6cf5K6NlHIZLpJ8_OX2G9oSmh2YrSsvvbSlr5m8Xe1HpjJG_32yL3DZJm8c7wYi7NNGcKLeUPR1mr6xW4SRSNbD1yNqjNP5CzenmwaPBAtaA9acUWuOJPq0rhu9RGVDn9H5kC7Uak5S_oBK4etw7sGQbsBPHP_QQ8DWJ8--nHNQKpK2tLBg_9kPI4Dn_AQl-LK-EIJLq4F02bQxII-79XwXSRQ9ktsvX7AkGjnMEol9f39mf78gYUV_W--u13M2jKNVyfGuRwm30UnVFrkT6HvEFTAGpG9arj9sbxxKjFcIJyDQJ-HnO7JWTH4Xq1aYmw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-04 16:45:59,174:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-02-04 16:45:59,174:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 04 Feb 2024 15:45:53 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308883057 Replay-Nonce: 3l89SrA7N4CX-ApgwT9hlXfJk_9E5Lv4oTS-T4l4Ct11lm2jTPM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:25Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820404667" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308883057" } 2024-02-04 16:45:59,174:DEBUG:acme.client:Storing nonce: 3l89SrA7N4CX-ApgwT9hlXfJk_9E5Lv4oTS-T4l4Ct11lm2jTPM 2024-02-04 16:45:59,175:DEBUG:acme.client:JWS payload: b'' 2024-02-04 16:45:59,180:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820404667: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdONENYLUFwZ3dUOWhsWGZKa185RTVMdjRvVFMtVDRsNEN0MTFsbTJqVFBNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0MDQ2NjcifQ", "signature": "OIsBbugjJFW-J2Dwl9RLkSSneYXXNEVK-5qi92lJAXclL0VkaAcQV9jCsPPlRNQ0iWWPtgS2kX7BhqwbETrpIPMehOcBdoVi3eOHLlVmV8a1rge6vTZvinPlTAlQ33-mTGtjVJ0-Hen9JvBPlJf_2p2RCgB9ubnEyOlIPmRI9wpwQXp3UKo-4y1QHP3K3r-crXRsj6KCLUWOY2tToyI9YYylus1DlxhAuhP4z3pE1JAKjhOISQQ8_-ZI1tMKaKthBl6Fc6dKA6Y8IsdQ2xyHRFoNx78MBreM1c87a4xsBwuG43PZX2ZvMomeOCJGhnVJRjMmsc3FQFeBnf93Xg_qmw", "payload": "" } 2024-02-04 16:45:59,339:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820404667 HTTP/1.1" 200 811 2024-02-04 16:45:59,340:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:45:53 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaq6-9WxJATIUBkjVof6tljMO8AecIHSQJi6JhgUnl7Rkk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:25Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/g54rZQ", "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/4yZXyw", "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/bXegoA", "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08" } ] } 2024-02-04 16:45:59,340:DEBUG:acme.client:Storing nonce: 5IXlosaq6-9WxJATIUBkjVof6tljMO8AecIHSQJi6JhgUnl7Rkk 2024-02-04 16:45:59,341:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-04 16:45:59,342:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-02-04 16:45:59,342:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-04 16:45:59,342:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-04 16:45:59,343:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-04 16:45:59,344:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-04 16:45:59,344:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-04 16:45:59,345:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-04 16:45:59,346:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-04 16:45:59,399:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-04 16:45:59,594:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-04 16:45:59,595:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-04 16:45:59,596:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-04 16:45:59,600:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:31 UTC. 2024-02-04 16:45:59,600:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-04 16:45:59,601:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-04 16:45:59,605:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-04 16:45:59,605:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-04 16:45:59,605:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-04 16:45:59,610:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-04 16:45:59,611:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-04 16:45:59,613:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-04 16:46:00,075:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-04 16:46:00,076:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:45:54 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "VCMgCaqcIzM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-04 16:46:00,077:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-04 16:46:04,277:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7371_key-certbot.pem 2024-02-04 16:46:08,253:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7369_csr-certbot.pem 2024-02-04 16:46:08,254:DEBUG:acme.client:Requesting fresh nonce 2024-02-04 16:46:08,254:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-04 16:46:08,414:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-04 16:46:08,414:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:46:03 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA7xmWF-MViEsXVBWqJ9fkqOVtJdaPRGYAQ22ysrFrZ6es X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-04 16:46:08,414:DEBUG:acme.client:Storing nonce: 3l89SrA7xmWF-MViEsXVBWqJ9fkqOVtJdaPRGYAQ22ysrFrZ6es 2024-02-04 16:46:08,415:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-02-04 16:46:08,422:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTd4bVdGLU1WaUVzWFZCV3FKOWZrcU9WdEpkYVBSR1lBUTIyeXNyRnJaNmVzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Bd7QeyC9ed9dfJbln3CPWLov63L1NY-b0DxdzhKp1BIy7Cz-M5snH3vklztWvzetCtDV9rxPDzxctM2BJRbd0_Ac9VsPum_HPGAo--XKnnx9F1VhVegW67nn5M7MTVC92G7Ow1NU1sxf6vHF26TuHG4r_NFyDK1iNBkBVx4bxXzQsbDlA6GXheD2m9EoNWFusrjhigXOGbIW-b4PHGEQqbI6ZJR364YYxlYqzoFNWS1MeEcLUCAYF0zQAMzxm7KevKlBvwl9DaM00Nz8T06U9QTPLlagru79_4CJecj_Eorr5MV27zmAF1JS-32LJ0DnFyylJaclfhWe7OmHNrYuVw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-04 16:46:08,602:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-02-04 16:46:08,602:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 04 Feb 2024 15:46:03 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308906667 Replay-Nonce: 5IXlosaqvDphp-E1plOf0S-CCXePERLiFTLhkkX8WFn3dlMfj-4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:34Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820438127" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308906667" } 2024-02-04 16:46:08,603:DEBUG:acme.client:Storing nonce: 5IXlosaqvDphp-E1plOf0S-CCXePERLiFTLhkkX8WFn3dlMfj-4 2024-02-04 16:46:08,603:DEBUG:acme.client:JWS payload: b'' 2024-02-04 16:46:08,609:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820438127: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXF2RHBocC1FMXBsT2YwUy1DQ1hlUEVSTGlGVExoa2tYOFdGbjNkbE1mai00IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0MzgxMjcifQ", "signature": "U1BoZ4l0c7SLsYIrClTwo9ylU_tWBcT3VaFeJcsHF6eLNRi9bO34ggqL5bZ9UODzw5CRwq5HDkYJLhlPOd8fCNe-YwSLgpf_n1suHqE-U-fcC2LkybG49zedgGa75Ljt-L_nP5go2jj1SdBL_y6_TwT--y6D_0BEVTHXfsi-iQQFU4HCbJ6CkaerfVWAJHckSjTd5IjWn-EbpsLM3fYNXXv0J2mEdsCaSQ1XdqajqWQ6VMtyVdF8dNIpjpQxPqUBAv28SXdh_POReAWbbf87d9S7sefPXY8_IMZswUt7bqpSgXwrBhSEIgAEAUfSgPY7YRYupzrtGQwvznLK_4ZeGA", "payload": "" } 2024-02-04 16:46:08,771:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820438127 HTTP/1.1" 200 810 2024-02-04 16:46:08,772:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:46:03 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaqTOCwgvZRRtbi70XrWT1zRLeWX5FpzjcxUZHeQe0w544 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:34Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/rIGBzA", "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/SWtTfQ", "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/R74bXA", "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs" } ] } 2024-02-04 16:46:08,772:DEBUG:acme.client:Storing nonce: 5IXlosaqTOCwgvZRRtbi70XrWT1zRLeWX5FpzjcxUZHeQe0w544 2024-02-04 16:46:08,773:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-04 16:46:08,773:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-02-04 16:46:08,773:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-04 16:46:08,774:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-04 16:46:08,774:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-04 16:46:08,775:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-04 16:46:08,775:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-04 16:46:08,775:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-04 16:46:08,776:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-04 16:46:08,824:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-04 16:46:09,076:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-04 16:46:09,077:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-02-04 16:46:09,078:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-02-04 16:46:09,084:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:09 UTC. 2024-02-04 16:46:09,084:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-04 16:46:09,085:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-04 16:46:09,090:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-04 16:46:09,091:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-04 16:46:09,091:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-04 16:46:09,095:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-04 16:46:09,096:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-04 16:46:09,098:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-04 16:46:09,630:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-04 16:46:09,631:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:46:04 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "MpcC7H26iPI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-04 16:46:09,631:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-04 16:46:13,903:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7372_key-certbot.pem 2024-02-04 16:46:17,899:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7370_csr-certbot.pem 2024-02-04 16:46:17,899:DEBUG:acme.client:Requesting fresh nonce 2024-02-04 16:46:17,899:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-04 16:46:18,077:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-04 16:46:18,078:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:46:12 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2ksh1KUsMvTtYMZsVrLXnFwyvD7tpBqzR76_TJ2GehGOsDL8BZA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-04 16:46:18,078:DEBUG:acme.client:Storing nonce: 2ksh1KUsMvTtYMZsVrLXnFwyvD7tpBqzR76_TJ2GehGOsDL8BZA 2024-02-04 16:46:18,079:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-02-04 16:46:18,085:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNNdlR0WU1ac1ZyTFhuRnd5dkQ3dHBCcXpSNzZfVEoyR2VoR09zREw4QlpBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "q-NM2yvzls5hQxepSTsTk9tr1EwcJNSHhgSozyNVujUsjWi63X9LwM_y1A8WLDV1ar5tnPV3_A8yYXVR5yIHkX4NthqGnp1d8O6M1vnS-pv6l2pf4HTLsRfIIiZcrideMBkrnNtPVgsKO1sd0OEPW9qyi020mE5ACaqQy3oSIlkhGnlYJtUQZiBxrqcaZ07kPKA7bKYIwnXPgc3dTZSlUe6xna0juwInmgYQNtgju_L-WoUeQ5TAnyggPCrnMPdA-4xc9qxFkcjb4gBZFa8x-tRx0gYd87mASh04vg4dT-JLFnn9W6CGmJmdekKPDcOb14f6DYWPLXKnu9bYGxK4DQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-04 16:46:18,272:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-02-04 16:46:18,273:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 04 Feb 2024 15:46:12 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308929257 Replay-Nonce: kRyagOpUHLMLz-1vRU7MYkzVUxFlY6fxbUFW0pZ-slhZickGHrw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:43Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820469197" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308929257" } 2024-02-04 16:46:18,273:DEBUG:acme.client:Storing nonce: kRyagOpUHLMLz-1vRU7MYkzVUxFlY6fxbUFW0pZ-slhZickGHrw 2024-02-04 16:46:18,273:DEBUG:acme.client:JWS payload: b'' 2024-02-04 16:46:18,279:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820469197: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVITE1Mei0xdlJVN01Za3pWVXhGbFk2ZnhiVUZXMHBaLXNsaFppY2tHSHJ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0NjkxOTcifQ", "signature": "EKkV3NnrSKlTNp4uOJ4MrEfiqsuTgKpUV0Z74c5wHLm-pst-6QQtbCNC_CrVrKE1658sFGe3TIg7N4Mf4tM2gBDeOqVEieAWFMWFmMRT2gZ66PPV8gXqxOKwsF0y-1F0AbZ22cp-pKg-7kEeB71N5Xgv4tMCnYR51ao7--swZ1Miz1TprCQT5fVgG5536MHJuLAwas9Ws3ExQ8gdEIt2nFf2Vdd4ITq7-mDCBM4TNA-GU0GMrAKNnb5OYNWYrpFIkqk_lzFuQgfaOm371ysx0Y_CTHFRWZodgalUZHg6nsmHKMCk6B7MYHFuSp7n_2p-mZgs18wHCQhMOwfIsA-5zw", "payload": "" } 2024-02-04 16:46:18,460:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820469197 HTTP/1.1" 200 809 2024-02-04 16:46:18,461:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:46:13 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2ksh1KUs6qhvQmaqjfsGx3xmwv6d0pWWKpRgAd-gNRBHM4iIG7w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:43Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/PqKyzA", "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/nQMx2Q", "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/ZJc1Yg", "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0" } ] } 2024-02-04 16:46:18,461:DEBUG:acme.client:Storing nonce: 2ksh1KUs6qhvQmaqjfsGx3xmwv6d0pWWKpRgAd-gNRBHM4iIG7w 2024-02-04 16:46:18,462:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-04 16:46:18,462:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-02-04 16:46:18,463:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-04 16:46:18,463:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-04 16:46:18,464:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-04 16:46:18,464:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-04 16:46:18,464:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-04 16:46:18,464:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-04 16:46:18,465:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-04 16:46:18,510:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-04 16:46:18,695:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-04 16:46:18,697:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is signed by the certificate's issuer. 2024-02-04 16:46:18,697:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD 2024-02-04 16:46:18,702:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:26 UTC. 2024-02-04 16:46:18,702:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-04 16:46:18,702:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-04 16:46:18,706:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-04 16:46:18,707:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-04 16:46:18,707:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-04 16:46:18,712:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-04 16:46:18,713:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-04 16:46:18,715:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-04 16:46:19,175:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-04 16:46:19,175:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:46:13 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Zg6NblQd0dc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-04 16:46:19,176:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-04 16:46:23,524:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7373_key-certbot.pem 2024-02-04 16:46:27,521:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7371_csr-certbot.pem 2024-02-04 16:46:27,522:DEBUG:acme.client:Requesting fresh nonce 2024-02-04 16:46:27,522:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-04 16:46:27,676:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-04 16:46:27,677:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:46:22 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaqh3KCSYont5C_NRWLL3IJeu1y3qAzSS1Dq_O44mUc_U0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-04 16:46:27,677:DEBUG:acme.client:Storing nonce: 5IXlosaqh3KCSYont5C_NRWLL3IJeu1y3qAzSS1Dq_O44mUc_U0 2024-02-04 16:46:27,677:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-02-04 16:46:27,684:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFoM0tDU1lvbnQ1Q19OUldMTDNJSmV1MXkzcUF6U1MxRHFfTzQ0bVVjX1UwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Yytet3imj6P3jARmTtL9A2xrjql5M7ipYNrilbHvn-qvh9exy27lGaXLMiM6NPuZvwUwB2TZ05NYJM7sAl4qarcH0G5KNggps0uT3w2Bf4MmUAlU4pvG4C0v382PBIMa0adtpz2BI9peHdmCsdY4aJRbHep0UELyAA9FBcWBbYErcQJXlmZcrtBGn8IZhQqFzl03ysLNlm24O2aaMU147o5WzNwdzK8HJMSTvRE3NLndRTWmm1gzrU-nwtshgFH0G1igDtJruHi8dPIIvn9it_pp24KNudrbcJXpxixChbXB0BUeB04YSF92_8W6r0CXFMnFHl0WsR-f6wfSpGHhuw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-04 16:46:27,872:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-04 16:46:27,873:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 04 Feb 2024 15:46:22 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308951787 Replay-Nonce: 3l89SrA7Mztd2mZ-WrOH5LRNCHCUcK45B17MeqUdHPDDgWM9Q4o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:52Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820501457" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308951787" } 2024-02-04 16:46:27,873:DEBUG:acme.client:Storing nonce: 3l89SrA7Mztd2mZ-WrOH5LRNCHCUcK45B17MeqUdHPDDgWM9Q4o 2024-02-04 16:46:27,873:DEBUG:acme.client:JWS payload: b'' 2024-02-04 16:46:27,879:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820501457: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdNenRkMm1aLVdyT0g1TFJOQ0hDVWNLNDVCMTdNZXFVZEhQRERnV005UTRvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1MDE0NTcifQ", "signature": "nQr6lWZnU5JCAwEhQNwEC80zT7AGhe2wgA_GsWILuHoxP-lglao0Ia9uUTyvA9BY8rKtHb9t7lyTcTnWLD48j5xesf7a1SXECrvoHjVCQ_pRlFzd--IOzdRs1pwTsGmFT539CcGuqQdiDdzyduqMyyxexx4maKt_h6VojPIEElPO0LpgojS1mcJtlCDM8Og_S9L_z-d_yQwXhQehLjHCnZ-qXT5nDjhVzcTKu77UrBkAGlBMAYICmMsOYfYrKpSui3F-hgNUDlDz66hLEuUPmuYsBdL_hFUDHG4V3Io6l3yNGzDJTT27HX1i7GwXw8T6vnzknKroHGFgUf70g5I1tA", "payload": "" } 2024-02-04 16:46:28,038:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820501457 HTTP/1.1" 200 805 2024-02-04 16:46:28,039:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:46:22 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaq268hhjZaZ_bFAf2zT-1Tw892GgzYP5ZcyEh-OrFx6aU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:52Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/nfOlPQ", "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/ptX2uw", "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/u4UgEQ", "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw" } ] } 2024-02-04 16:46:28,039:DEBUG:acme.client:Storing nonce: 5IXlosaq268hhjZaZ_bFAf2zT-1Tw892GgzYP5ZcyEh-OrFx6aU 2024-02-04 16:46:28,040:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-04 16:46:28,040:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-02-04 16:46:28,040:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-04 16:46:28,041:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-04 16:46:28,041:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-04 16:46:28,042:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-04 16:46:28,042:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-04 16:46:28,042:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-04 16:46:28,043:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-04 16:46:28,091:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-04 16:46:28,275:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-04 16:46:28,276:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-04 16:46:28,277:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-04 16:46:28,281:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:43 UTC. 2024-02-04 16:46:28,282:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-04 16:46:28,282:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-04 16:46:28,287:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-04 16:46:28,287:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-04 16:46:28,288:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-04 16:46:28,294:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-04 16:46:28,295:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-04 16:46:28,298:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-04 16:46:28,759:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-04 16:46:28,760:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:46:23 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "x8PfKedNtDo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-02-04 16:46:28,760:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-04 16:46:32,954:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7374_key-certbot.pem 2024-02-04 16:46:36,936:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7372_csr-certbot.pem 2024-02-04 16:46:36,937:DEBUG:acme.client:Requesting fresh nonce 2024-02-04 16:46:36,937:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-04 16:46:37,091:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-04 16:46:37,092:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:46:31 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA76Js4whGyUagKdf1k_8lInwDh1MfB6_2-SbRgeqnlJMg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-04 16:46:37,092:DEBUG:acme.client:Storing nonce: 3l89SrA76Js4whGyUagKdf1k_8lInwDh1MfB6_2-SbRgeqnlJMg 2024-02-04 16:46:37,092:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-02-04 16:46:37,098:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTc2SnM0d2hHeVVhZ0tkZjFrXzhsSW53RGgxTWZCNl8yLVNiUmdlcW5sSk1nIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ZAZ-d_kvlW--PCXQaalAY4r_Q0WepivffcHRnf0lBGQWRiKslVqE2rB5KtQGOfkrKTIeaGDNlsIFTwnxAqcq-MDbcS9o8yM0nHlZ_WXJ0muf5Bs6LIH5sG5xPxtFH8vchmPX6RFWkFKRCCMg4UYzY-i_VDnXj8DNWcYyke9FRmHHzDnBNxhFHHpYuObd3-5vi1j2A64iJNuPthbyDnB5ME-AElMpuw87hGZc7qwdWp5B0giYEC9mVPn2xKXC_6NcFlcgTKb9Qr1mD9lM9qXViiowA1mFi4fFyWXpltWqfKEbN9eZVv2rvqbOvLfbw77Z3d9VLT4H-AwbAsOrWj2RaA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-04 16:46:37,336:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-04 16:46:37,336:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 04 Feb 2024 15:46:31 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308975127 Replay-Nonce: 3l89SrA7YJpBEbHV3jwjrrvVaxO3q4kHcIT_piWgkJ8qH96rvYw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:27:01Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820533737" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308975127" } 2024-02-04 16:46:37,337:DEBUG:acme.client:Storing nonce: 3l89SrA7YJpBEbHV3jwjrrvVaxO3q4kHcIT_piWgkJ8qH96rvYw 2024-02-04 16:46:37,337:DEBUG:acme.client:JWS payload: b'' 2024-02-04 16:46:37,343:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820533737: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdZSnBCRWJIVjNqd2pycnZWYXhPM3E0a0hjSVRfcGlXZ2tKOHFIOTZydll3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1MzM3MzcifQ", "signature": "Zw_wqjBCUl-4gzgKwMfocUy1WLMixb5S78iZz6TNFCW4IXYOkLphLiYCsc3ZtzViLK13sNg_w3WTJRhfRMtV_ydoN_-_Fd_3NCSP7eQ5Nb_n9OsUV-KYbZrBGm3KsPTeur55MhS1JEpnLOtRn7O8FxW0X9_i72MWL1ZUtxxeZwvPFlBTUrSfmuzjkdhNzjqTqExIgkZMtAg4AgnzRGXiAd73RZurg7BvRseVXp8Om5NTDgRR2XD0x71tZTtUm_MzkS9lXJKnvGlfIe0uPKJ7XlfpQzd6zUnNWtS4MiToEderUoBl1RnVOv-oL0bsYAnCXaTcy1leV2kKnFne4cdgBg", "payload": "" } 2024-02-04 16:46:37,518:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820533737 HTTP/1.1" 200 805 2024-02-04 16:46:37,518:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:46:32 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaqRhcDS-7Mf2QPMN3Q4PPSOSxl5ZJPyp3R442NVMMICW4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:27:01Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/u7lnsw", "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/kawHqw", "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/Xsywzg", "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs" } ] } 2024-02-04 16:46:37,518:DEBUG:acme.client:Storing nonce: 5IXlosaqRhcDS-7Mf2QPMN3Q4PPSOSxl5ZJPyp3R442NVMMICW4 2024-02-04 16:46:37,519:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-04 16:46:37,520:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-02-04 16:46:37,521:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-04 16:46:37,521:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-04 16:46:37,522:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-04 16:46:37,522:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-04 16:46:37,522:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-04 16:46:37,522:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-04 16:46:37,523:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-04 16:46:37,560:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-04 16:46:37,627:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-04 16:46:37,628:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-04 16:46:37,629:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-04 16:46:37,633:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:40:02 UTC. 2024-02-04 16:46:37,633:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-04 16:46:37,634:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-04 16:46:37,639:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-04 16:46:37,639:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-04 16:46:37,639:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-04 16:46:37,644:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-04 16:46:37,645:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-04 16:46:37,647:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-04 16:46:38,099:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-04 16:46:38,099:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:46:32 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "28E-PnNzllI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-04 16:46:38,100:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-04 16:46:42,616:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7375_key-certbot.pem 2024-02-04 16:46:46,644:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7373_csr-certbot.pem 2024-02-04 16:46:46,644:DEBUG:acme.client:Requesting fresh nonce 2024-02-04 16:46:46,644:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-04 16:46:46,796:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-04 16:46:46,797:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:46:41 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaq2DT9hx7oYoeMyno-4ODgfr4N9pOyAQu5wWtN6w86udE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-04 16:46:46,797:DEBUG:acme.client:Storing nonce: 5IXlosaq2DT9hx7oYoeMyno-4ODgfr4N9pOyAQu5wWtN6w86udE 2024-02-04 16:46:46,797:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-02-04 16:46:46,803:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXEyRFQ5aHg3b1lvZU15bm8tNE9EZ2ZyNE45cE95QVF1NXdXdE42dzg2dWRFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "SBr5PxYIflGhjsOF75rnwG8aGvXE_L4U6CONWl5DRpQ9ufn-rkRMYTMJbUc0zsPLIJMdPm0-DyC-5-P6edA3vuI_G7_1QHEo5ouMX7Nh9VXG7A04QQ9aanfMiMWsgoLGlZbB73NsyCNa3LwPaOXNJm9hhuqFE1Mo9XaiUwHSdCQ9pKBZFeiAUiaUFHhkFDwGSb36juliBs8w_LDtMzs_Q0J6-zEmUBIDnJ49o0k54nJOSHNr4wf--hpZZAB76adrvSfM93N2_PEZ8-FTY08cK_a-GyqQqWuFgyNEc44ob2bga--O-GohStgxOhTy9q-1lgXjFONKK5G32lcJgQRM7w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-04 16:46:46,968:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-04 16:46:46,968:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 04 Feb 2024 15:46:41 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241309008647 Replay-Nonce: 5IXlosaqAwB4hdIoXA6w_Wn1_E1MCd-Jq7Vij5DoytAt9v51tJs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:27:10Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820580167" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241309008647" } 2024-02-04 16:46:46,968:DEBUG:acme.client:Storing nonce: 5IXlosaqAwB4hdIoXA6w_Wn1_E1MCd-Jq7Vij5DoytAt9v51tJs 2024-02-04 16:46:46,969:DEBUG:acme.client:JWS payload: b'' 2024-02-04 16:46:46,973:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820580167: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFBd0I0aGRJb1hBNndfV24xX0UxTUNkLUpxN1ZpajVEb3l0QXQ5djUxdEpzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1ODAxNjcifQ", "signature": "qJCeKnX_WDbKpaK0ooaq-Pb_Yjv_DtlUprNT_107GARh7nIMXVE3IhJ17jbPiHWw2gtJs_RkrmJ_IzqzL7FAnKeOW779rV0ZmJH-S9R7BG8hq1-R_m6jHPt88RAL-Kj-aE_v2nYIXWY8QpDl6Z-Rt5DJS15LFKPfMgrxf5hzM6Q2hU64C4CTjXXcVk-yxcqL4cLG1bxAdUpUQaBQnyqma_6xme_CZT1pHg_57Af5ywa7F9jkdQb7e-UYKdZMSOqy0KBkBtE-vFH1k_EPgrFLdr6pos0rBMfJTdIW9klRr6IVy-XSC2uROq41B_E981021KxPv52Q_3KiwWUm0-Q0Cg", "payload": "" } 2024-02-04 16:46:47,128:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820580167 HTTP/1.1" 200 805 2024-02-04 16:46:47,129:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 04 Feb 2024 15:46:41 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaqzb3tasbWMdt0tuHwQrpNfs2KIkLok6JrLYFoPtdJ9GQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:27:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/yNgMJw", "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/JW2Bpw", "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/iioLug", "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc" } ] } 2024-02-04 16:46:47,129:DEBUG:acme.client:Storing nonce: 5IXlosaqzb3tasbWMdt0tuHwQrpNfs2KIkLok6JrLYFoPtdJ9GQ 2024-02-04 16:46:47,129:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-04 16:46:47,130:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-02-04 16:46:47,131:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-04 16:46:47,131:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-04 16:46:47,132:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-04 16:46:47,132:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-04 16:46:47,132:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-04 16:46:47,132:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-04 16:46:47,134:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-04 16:46:47,134:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-02-04 16:46:47,134:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-02-04 16:46:47,136:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-02-04 16:46:47,138:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)