2024-02-03 23:50:30,509:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-02-03 23:50:30,510:DEBUG:certbot._internal.main:Arguments: [] 2024-02-03 23:50:30,510:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-02-03 23:50:31,566:DEBUG:certbot._internal.log:Root logging level set at 20 2024-02-03 23:50:31,566:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-02-03 23:50:31,608:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-02-03 23:50:31,656:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-03 23:50:31,856:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-03 23:50:31,867:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is signed by the certificate's issuer. 2024-02-03 23:50:31,871:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is: OCSPCertStatus.GOOD 2024-02-03 23:50:31,881:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:15 UTC. 2024-02-03 23:50:31,882:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-03 23:50:31,882:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-03 23:50:31,888:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-03 23:50:31,889:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-03 23:50:31,889:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-03 23:50:31,896:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-03 23:50:31,897:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-03 23:50:31,899:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-03 23:50:32,380:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-03 23:50:32,380:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:50:27 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "i0KbYWuCg_s": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-03 23:50:32,381:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-03 23:50:37,946:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7350_key-certbot.pem 2024-02-03 23:50:42,800:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7348_csr-certbot.pem 2024-02-03 23:50:42,801:DEBUG:acme.client:Requesting fresh nonce 2024-02-03 23:50:42,801:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-03 23:50:42,951:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-03 23:50:42,951:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:50:38 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA7Vdusq-y2E1sThMgiPNqb42bd8niJZEAsPEUONjEofdM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-03 23:50:42,952:DEBUG:acme.client:Storing nonce: 3l89SrA7Vdusq-y2E1sThMgiPNqb42bd8niJZEAsPEUONjEofdM 2024-02-03 23:50:42,952:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-02-03 23:50:42,958:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdWZHVzcS15MkUxc1RoTWdpUE5xYjQyYmQ4bmlKWkVBc1BFVU9OakVvZmRNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "QH0_wD11u9ATYak0EYnfoqC3Ttt8hVPaYh2Xi5BzCPhTPZV2ursn7nGHExou8hQIoOHMPtRJWVvEmLb1T-uXCQwuWgDyqNkZ1dYiLcvZoWoeA2Fc2efR7tUNjFYhgg40wNtHcisDqQE8Tai2fXSAAZIetwtRt-7d0hw22u2tY2WrJcUyhuSdoiWjwsY-vLv0COEw6p3-y8F8N-G1XKnusLG115-HKjVOWN1C8HinhKOom_4gwqOoaXy2_3wmMZfu0ZlpJikxK9f4UG5I2w_N8bU8x0HdXq2YEVPFngz-wFXmDwQqDKi5KiQry55IaNeUd_zsByRiN7uqi58xUB6TjQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-03 23:50:43,138:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-02-03 23:50:43,139:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 03 Feb 2024 22:50:38 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308706407 Replay-Nonce: 5IXlosaqVzFBshJz7jQCLXMd2B1kwvXuYwK88w8KR6XMsnPmWF4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:25:24Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820152497" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308706407" } 2024-02-03 23:50:43,140:DEBUG:acme.client:Storing nonce: 5IXlosaqVzFBshJz7jQCLXMd2B1kwvXuYwK88w8KR6XMsnPmWF4 2024-02-03 23:50:43,140:DEBUG:acme.client:JWS payload: b'' 2024-02-03 23:50:43,148:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820152497: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFWekZCc2hKejdqUUNMWE1kMkIxa3d2WHVZd0s4OHc4S1I2WE1zblBtV0Y0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAxNTI0OTcifQ", "signature": "oG3Rtf61SxQ8jSmtxHySQ9-mVHTjxuRBXCFxPxMVOfW5y-We8AadKjG3MZig7nRDFwAniLFdPncqyjzXVEMdR50lNh-bW9TIwyUqCDVFQ_g7_H8MR2shPzHvOtx4G0QnDj-0qfq59AbCz2HT6bTc3rG2QzOyd_wNny1FD5J30MyRTL2EB0JLZWteB1XLt9vXusy098mwU1WVYSK3avwO0EsZoH2MStlJEAcKKdvs57i2pC-ixJsoyD80ckD06Ojdf86-Hqoh07NruLin5N76K1cWJTiNVy4e16L-6vRpSYrmebg-fPP_OdFQvtvuLAEZEa59Lx0n7yCNnTIGzjNrLg", "payload": "" } 2024-02-03 23:50:43,334:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820152497 HTTP/1.1" 200 810 2024-02-03 23:50:43,335:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:50:38 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaqehZciE8d1ZSaVdGkgkzS-CHtkR00ercgQxIIZpuqVK8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:25:24Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/GeKDkA", "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/sBY_pA", "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820152497/dU31hg", "token": "MhHXcN129FANxSh9UJE0lu9syDE8YX5mape8M2IICuI" } ] } 2024-02-03 23:50:43,335:DEBUG:acme.client:Storing nonce: 5IXlosaqehZciE8d1ZSaVdGkgkzS-CHtkR00ercgQxIIZpuqVK8 2024-02-03 23:50:43,336:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-03 23:50:43,336:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-02-03 23:50:43,336:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-03 23:50:43,337:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-03 23:50:43,353:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-03 23:50:43,353:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-03 23:50:43,353:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-03 23:50:43,354:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-03 23:50:43,360:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-03 23:50:43,406:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-03 23:50:43,583:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-03 23:50:43,584:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-03 23:50:43,585:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-03 23:50:43,590:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:32 UTC. 2024-02-03 23:50:43,590:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-03 23:50:43,590:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-03 23:50:43,595:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-03 23:50:43,596:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-03 23:50:43,596:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-03 23:50:43,601:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-03 23:50:43,602:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-03 23:50:43,604:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-03 23:50:44,146:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-03 23:50:44,147:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:50:39 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "FsUMvuOBTTk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-03 23:50:44,147:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-03 23:50:48,651:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7351_key-certbot.pem 2024-02-03 23:50:53,020:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7349_csr-certbot.pem 2024-02-03 23:50:53,021:DEBUG:acme.client:Requesting fresh nonce 2024-02-03 23:50:53,021:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-03 23:50:53,202:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-03 23:50:53,203:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:50:48 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2ksh1KUsoCigecES5DF_qIfYqXlH0iJavkfnufwYNhWqjNoDdfM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-03 23:50:53,203:DEBUG:acme.client:Storing nonce: 2ksh1KUsoCigecES5DF_qIfYqXlH0iJavkfnufwYNhWqjNoDdfM 2024-02-03 23:50:53,203:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-02-03 23:50:53,209:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNvQ2lnZWNFUzVERl9xSWZZcVhsSDBpSmF2a2ZudWZ3WU5oV3FqTm9EZGZNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "bWNBtyivyGJVYvpdsxEadw60dmGibSiZPcZKn85lnDZvkXM3BKD-gFpV7xNWS4M3v2W1FdzmJs53KBJLgIhBX-wOafa99zmW93119t4M8W7T6UMcSiGl8d3pCJ-9lv5VcU3CzCJ2JHB2Als_WS8EPVXhJLksrPC-wVz2R-iT7tQoeXHNOw9w1Y9onoqlHNoJeqtJAFZK0rQZ_u_C9yPlYdT6CFpkuQONU4AD2Z1p5q7N9gnvbOrAe2gq7iJYk91H0gvpfrg-Cp-hNEWTMA6smX7aQQWklCXMm5kpi3fnqHKCiF4QWT4aa_-MzsEQMg-LfNfjNv9f7VmxmRigLYJWYQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-03 23:50:53,400:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-02-03 23:50:53,401:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 03 Feb 2024 22:50:48 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308730387 Replay-Nonce: kRyagOpUxmKVYRLX5RWZGeKC6sBRUTbBU5aEXmY2fYrcrOZbnVM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:25:33Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820188867" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308730387" } 2024-02-03 23:50:53,401:DEBUG:acme.client:Storing nonce: kRyagOpUxmKVYRLX5RWZGeKC6sBRUTbBU5aEXmY2fYrcrOZbnVM 2024-02-03 23:50:53,401:DEBUG:acme.client:JWS payload: b'' 2024-02-03 23:50:53,410:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820188867: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFV4bUtWWVJMWDVSV1pHZUtDNnNCUlVUYkJVNWFFWG1ZMmZZcmNyT1piblZNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAxODg4NjcifQ", "signature": "oftfxEMFzk4aN0WUXHbXvdrEKeVduyVPPIGoI1H3FZR7Mih1mm2nmiES_lqGJoN6FtEA5ZKHdTb5FpSQBjF0re1D0NDUdWJXwENFF17N4QgAZTT7FhFbdg2g1Q2ubCigMtAipKM35GL1VZ-7nRUYQ-ClVZRevhynMaxMSauUMO1tcO_qYl7DDqze93OlyvT5OL1psiyjtBTMPS0CYTx9ipR3zwM_UAM94aD-rwt8jRLabvBnh_jok6fzHOjBKLBd-UpLNfyA3PdKrsy2C0onUZnP7lG3mIqmhhxdxKuRprlx2aa-TVXSaHJvDBOGwUttDrWjNiRDqZdcVfZRwRV7uw", "payload": "" } 2024-02-03 23:50:53,598:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820188867 HTTP/1.1" 200 804 2024-02-03 23:50:53,599:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:50:48 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2ksh1KUs3YxKsV-BvffT1rAcgxlJhjoZTm00RPvOnAvJp0wuA-Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:25:33Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/Yq7npQ", "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/OkyE8g", "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820188867/IRVMDw", "token": "e92K5pxoyKNlwZrEIWUZVQT5VV1QrkStWC-zjgttMOU" } ] } 2024-02-03 23:50:53,599:DEBUG:acme.client:Storing nonce: 2ksh1KUs3YxKsV-BvffT1rAcgxlJhjoZTm00RPvOnAvJp0wuA-Q 2024-02-03 23:50:53,599:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-03 23:50:53,600:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-02-03 23:50:53,600:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-03 23:50:53,600:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-03 23:50:53,601:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-03 23:50:53,601:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-03 23:50:53,601:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-03 23:50:53,602:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-03 23:50:53,603:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-03 23:50:53,660:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-03 23:50:53,860:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-03 23:50:53,860:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-03 23:50:53,861:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-03 23:50:53,867:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:49 UTC. 2024-02-03 23:50:53,868:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-03 23:50:53,868:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-03 23:50:53,873:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-03 23:50:53,874:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-03 23:50:53,874:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-03 23:50:53,879:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-03 23:50:53,880:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-03 23:50:53,882:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-03 23:50:54,346:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-03 23:50:54,347:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:50:49 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "WgVZ6tngDm4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-03 23:50:54,348:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-03 23:50:59,317:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7352_key-certbot.pem 2024-02-03 23:51:03,684:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7350_csr-certbot.pem 2024-02-03 23:51:03,684:DEBUG:acme.client:Requesting fresh nonce 2024-02-03 23:51:03,684:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-03 23:51:03,846:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-03 23:51:03,846:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:50:59 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaqk1EAOCJa2zPXyPbO3gUo782HHw8r7xryD-yKa-iXTWI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-03 23:51:03,846:DEBUG:acme.client:Storing nonce: 5IXlosaqk1EAOCJa2zPXyPbO3gUo782HHw8r7xryD-yKa-iXTWI 2024-02-03 23:51:03,847:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-02-03 23:51:03,853:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFrMUVBT0NKYTJ6UFh5UGJPM2dVbzc4MkhIdzhyN3hyeUQteUthLWlYVFdJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Wg1srkP5DE0mVSJfY3q_aiKewnKQDylqgToT5IJgy6MWbdh9NEMqrKf_YJMjzO94wdLQA_-7rVh2k-JreldMWFPx0P3PSrgFvAHA_v9XqqHHYAi-lAK7BB93m_cVVXVECguRJ4n2yLwuT4tfq8q-UMecLUoCxXKxTDppBcr8qdmGIWvi8m2m7luLYPI5xoBHNxy2nvEqZK-0Mpk7SEQnqL5h2PRQsdsEhZJmaZwSUeDL95FdjYr9SxFIQkpnBCypL7Kpq4rShO5lljNHVjFviTbl61ql1xuj3dz0KjAlUODe7Nu07Um3U3uNOmLz0YSGHhrSp_aal-XjtKSMxRfBRQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-03 23:51:04,023:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-02-03 23:51:04,023:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 03 Feb 2024 22:50:59 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308754257 Replay-Nonce: 5IXlosaqleXqpJmy-HCw9A7KmdeJelrhxXp9R81tTPwTo-daEH4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:25:42Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820220907" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308754257" } 2024-02-03 23:51:04,024:DEBUG:acme.client:Storing nonce: 5IXlosaqleXqpJmy-HCw9A7KmdeJelrhxXp9R81tTPwTo-daEH4 2024-02-03 23:51:04,024:DEBUG:acme.client:JWS payload: b'' 2024-02-03 23:51:04,030:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820220907: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFsZVhxcEpteS1IQ3c5QTdLbWRlSmVscmh4WHA5UjgxdFRQd1RvLWRhRUg0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyMjA5MDcifQ", "signature": "OU9kh9h9kjlb8cDy3m0XO8P9ew9tdz_yxzLUtmUkJ69ah0KqCwZWNYdfKad_uKfrgHGu9eUC-5kSomaOi8G_li26cQR576-sK_FSStki1qlN518P9DtX0qawrkvXwImdnE4CzvxxXkg-PDgeL8LnV0Xb7D2COf_WmAPJSfU7ExHUc8ymk1iZwtg-O6mahuu2bb5pcq1qlrlYv6ibRzb8Oy0yDWlSVNM3m5Ck3Azm0YZUaGbt2fsUVCu7YjHoJVu9srDWkgsDNOXOr3sYhA6gFUheEeXuoA1vVKbz0kBKcNlKnDBxQpcu7VmKfmzTJ22kUmE4c_j5yJcemi3YkZ3aOw", "payload": "" } 2024-02-03 23:51:04,207:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820220907 HTTP/1.1" 200 807 2024-02-03 23:51:04,207:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:50:59 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA7OTs9Ul_nqcNDYZtTl8HLoXvzUYgA3wg82DDKmyG7Zjk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:25:42Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/vlhqAg", "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/p9n_vg", "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820220907/ul63Zg", "token": "WrM2Sua6ADfCsDuMmvqVKRsDmyU5L9yuxhSbyCj7bRA" } ] } 2024-02-03 23:51:04,208:DEBUG:acme.client:Storing nonce: 3l89SrA7OTs9Ul_nqcNDYZtTl8HLoXvzUYgA3wg82DDKmyG7Zjk 2024-02-03 23:51:04,208:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-03 23:51:04,208:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-02-03 23:51:04,209:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-03 23:51:04,209:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-03 23:51:04,210:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-03 23:51:04,210:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-03 23:51:04,211:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-03 23:51:04,211:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-03 23:51:04,212:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-03 23:51:04,276:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-03 23:51:04,327:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-03 23:51:04,328:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-03 23:51:04,329:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-03 23:51:04,334:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:03 UTC. 2024-02-03 23:51:04,334:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-03 23:51:04,334:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-03 23:51:04,340:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-03 23:51:04,340:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-03 23:51:04,340:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-03 23:51:04,346:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-03 23:51:04,346:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-03 23:51:04,348:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-03 23:51:04,792:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-03 23:51:04,793:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:51:00 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "jQX7wBfTBoI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-03 23:51:04,794:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-03 23:51:09,149:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7353_key-certbot.pem 2024-02-03 23:51:13,437:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7351_csr-certbot.pem 2024-02-03 23:51:13,438:DEBUG:acme.client:Requesting fresh nonce 2024-02-03 23:51:13,438:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-03 23:51:13,587:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-03 23:51:13,588:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:51:08 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA7CF_cSCHqp8iXa9nGO9GE3vNKDjnwSgaiinHeh4IY6tI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-03 23:51:13,588:DEBUG:acme.client:Storing nonce: 3l89SrA7CF_cSCHqp8iXa9nGO9GE3vNKDjnwSgaiinHeh4IY6tI 2024-02-03 23:51:13,588:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-02-03 23:51:13,594:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdDRl9jU0NIcXA4aVhhOW5HTzlHRTN2TktEam53U2dhaWluSGVoNElZNnRJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "IhQmUyRPo-95c-cuQsFzmP907qy-VchZdiOXHVBg2MEsCxL_JW5OpA2E7wU3RaH75-hoFC5wmRAhTvK-kcEeuAZwmAOZQO7v-8_MWEkL21ALt9X7DC8OqHpv2kP7JX3Rl7asgNGKUQK_A0zM4A9Lbfb5cdbfqyz_9yfWHaP3zMZRj_MA0MF1MzexZyP2VYASV1BmC9yWPR4xxucM4MV44wJUwdZoosE-8rUGPx4OEbOT8QwVTS_TyYtmPZ5j9q5HcaIr2lJ4AKXhVj2cQiUQ8yM0pEPP909APEHRdTCf-MZiLZaOf3eupBACmawnY7d2MYGOZQ0HdI0HngO0Vsw7Qw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-03 23:51:13,805:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-02-03 23:51:13,806:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 03 Feb 2024 22:51:09 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308777647 Replay-Nonce: 3l89SrA77FRbhI-WgKkw_p25a2TEu8A6cLnni00YRwaAwXrlQUM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:25:50Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820252177" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308777647" } 2024-02-03 23:51:13,806:DEBUG:acme.client:Storing nonce: 3l89SrA77FRbhI-WgKkw_p25a2TEu8A6cLnni00YRwaAwXrlQUM 2024-02-03 23:51:13,807:DEBUG:acme.client:JWS payload: b'' 2024-02-03 23:51:13,813:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820252177: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTc3RlJiaEktV2dLa3dfcDI1YTJURXU4QTZjTG5uaTAwWVJ3YUF3WHJsUVVNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyNTIxNzcifQ", "signature": "yCHFisuJJD0lqXpUzdDO6ghkNitLBxTEhsfJWi04fHKckZ0NRz5l0q5P6lDm0ZNMVEn6UCtAewWzn4R2V0L6wLM6d2aJ7X8WpIlHNJo1csUe6g-uGIdk_ddOoidnxIXgljKVQLYd4ko6nE-HteNDdeox2w6HmYPC81SiDeXHy91z5ap1GlZQqR8t3kqiMvg_-VCK2DdYT__KVnmxyb7UeJ23gFHkIvZboOoeNPlrw_XudlMpc8XNXd2-ar3Z2uu0vx_A2fUVN_sn_2Vlx5KSRysmuawTlpw2AvessmrwuO2QDYjMbkF6K0nGm9sKVrun4KKRS6PBp-jg035IIYLmIA", "payload": "" } 2024-02-03 23:51:13,980:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820252177 HTTP/1.1" 200 801 2024-02-03 23:51:13,981:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:51:09 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaqy0syKOemgaQw51rwf_CRWCLXj53Bw15_SLkpmL2X-VY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:25:50Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/WXsY4w", "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/ZwqjFA", "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820252177/HVTsug", "token": "fLBGUlp65C-MIFHRjwAe6sxfCYbCOZ9GVF2n4gp4wY8" } ] } 2024-02-03 23:51:13,981:DEBUG:acme.client:Storing nonce: 5IXlosaqy0syKOemgaQw51rwf_CRWCLXj53Bw15_SLkpmL2X-VY 2024-02-03 23:51:13,982:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-03 23:51:13,982:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-02-03 23:51:13,983:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-03 23:51:13,983:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-03 23:51:13,984:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-03 23:51:13,984:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-03 23:51:13,984:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-03 23:51:13,985:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-03 23:51:13,986:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-03 23:51:14,028:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-03 23:51:14,203:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-03 23:51:14,204:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-03 23:51:14,206:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-03 23:51:14,212:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:20 UTC. 2024-02-03 23:51:14,212:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-03 23:51:14,212:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-03 23:51:14,217:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-03 23:51:14,217:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-03 23:51:14,217:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-03 23:51:14,222:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-03 23:51:14,223:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-03 23:51:14,225:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-03 23:51:14,768:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-03 23:51:14,769:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:51:09 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "tsxqWwsKNNI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-02-03 23:51:14,769:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-03 23:51:19,379:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7354_key-certbot.pem 2024-02-03 23:51:23,669:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7352_csr-certbot.pem 2024-02-03 23:51:23,670:DEBUG:acme.client:Requesting fresh nonce 2024-02-03 23:51:23,670:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-03 23:51:23,852:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-03 23:51:23,853:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:51:19 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: kRyagOpULftEmfYWuFcRJzmHfmF6eh8mVm0QVuVnx31JV_S17S0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-03 23:51:23,853:DEBUG:acme.client:Storing nonce: kRyagOpULftEmfYWuFcRJzmHfmF6eh8mVm0QVuVnx31JV_S17S0 2024-02-03 23:51:23,853:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-02-03 23:51:23,859:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVMZnRFbWZZV3VGY1JKem1IZm1GNmVoOG1WbTBRVnVWbngzMUpWX1MxN1MwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "O7y5c7xWKn1EUxu4f5q921x7Y8aPDmfWMOzuKxn-k2KLnP5JEDDqlfguJtJr_Mk_0dcr8WR5OL1XC3JYI3lrsZNjP_bu0DP-U-R2FE3ZWeKIGw54FJXvecx1G2W-Dpxrtre13CIutRK6sJysYpE1NpOV7V7knft3ECKaQiin7FYei5GxFvdoW-phhgJOBxvT7_cvwZDiD4yzR70vqt7-hDwQjxEf5jk0qmWbCmSlZ7NsdIpgK7ZhLxQhAIBS3I5dvsKSu1x_DHLPWtTxfdWPZo2_Loh8DI8AxjoHBBU-txYjFU0Ye7XBO7r1ACRLXzMt1sl-8JYObNunMJm2SS9LSQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-03 23:51:24,050:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-03 23:51:24,050:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 03 Feb 2024 22:51:19 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308800947 Replay-Nonce: 2ksh1KUsTP62ptVYtSsfPsbxK5HaAR5z3g1RlkIG1LC9pbWfjns X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:25:59Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820285857" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308800947" } 2024-02-03 23:51:24,051:DEBUG:acme.client:Storing nonce: 2ksh1KUsTP62ptVYtSsfPsbxK5HaAR5z3g1RlkIG1LC9pbWfjns 2024-02-03 23:51:24,051:DEBUG:acme.client:JWS payload: b'' 2024-02-03 23:51:24,057:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820285857: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXNUUDYycHRWWXRTc2ZQc2J4SzVIYUFSNXozZzFSbGtJRzFMQzlwYldmam5zIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAyODU4NTcifQ", "signature": "viqdfZwK6Z2ufAG9vl5akudhaxH7aqcIdOUFcMP9122BpVAQBvtTjCv2v3fnU8gp-B74sXMcLdoCuf7malHBk3gJ83y1LKo9Zke_e5_AZDfmDEFBUFtYvxSfv9saVK6Rtgk0c5jfv6mkhg6AgK5rg8xMrP0PVLuMPOvFBLNPjm8N-9dr27KjBqEhL-bC3cTjDWMpZsmF7R9aplOL93RyBq9vYvS7gpwDr_3xcRd1P-ZMS5InVtIocLZEdT7yTkrVtEDbU6qpjBTiXd2_kG0PNtDn53kPP1uHjFsiIRn8sNrM7NCYYv-rnAqVY3rWR7qF8a1Zk4hmGrETfiyio9EjYA", "payload": "" } 2024-02-03 23:51:24,244:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820285857 HTTP/1.1" 200 805 2024-02-03 23:51:24,244:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:51:19 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: kRyagOpUmJmt4MvxA92VIe9aT6xJEl6Sv3x_-RfcMC3Wv0GREUM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:25:59Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/6M2-8w", "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/NyT6VQ", "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820285857/Wxujog", "token": "1cneAQg30vmjBPqMF-W3MBh05MrwUlulEPbxXxmFJ-I" } ] } 2024-02-03 23:51:24,244:DEBUG:acme.client:Storing nonce: kRyagOpUmJmt4MvxA92VIe9aT6xJEl6Sv3x_-RfcMC3Wv0GREUM 2024-02-03 23:51:24,245:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-03 23:51:24,245:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-02-03 23:51:24,246:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-03 23:51:24,246:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-03 23:51:24,247:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-03 23:51:24,247:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-03 23:51:24,247:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-03 23:51:24,248:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-03 23:51:24,249:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-03 23:51:24,309:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-03 23:51:24,490:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-03 23:51:24,491:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-03 23:51:24,492:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-03 23:51:24,497:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:36 UTC. 2024-02-03 23:51:24,497:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-03 23:51:24,497:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-03 23:51:24,502:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-03 23:51:24,502:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-03 23:51:24,502:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-03 23:51:24,508:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-03 23:51:24,509:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-03 23:51:24,512:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-03 23:51:24,972:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-03 23:51:24,973:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:51:20 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "8Ni4ojW5e8U": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-03 23:51:24,974:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-03 23:51:29,555:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7355_key-certbot.pem 2024-02-03 23:51:33,813:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7353_csr-certbot.pem 2024-02-03 23:51:33,814:DEBUG:acme.client:Requesting fresh nonce 2024-02-03 23:51:33,814:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-03 23:51:33,976:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-03 23:51:33,976:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:51:29 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA79gThP0GG1_Q5kG8xD_hKQZWSDWcFt90PJvczCytWVfw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-03 23:51:33,977:DEBUG:acme.client:Storing nonce: 3l89SrA79gThP0GG1_Q5kG8xD_hKQZWSDWcFt90PJvczCytWVfw 2024-02-03 23:51:33,977:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-02-03 23:51:33,983:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTc5Z1RoUDBHRzFfUTVrRzh4RF9oS1FaV1NEV2NGdDkwUEp2Y3pDeXRXVmZ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "NhgdGXwj3lH9_BESxdhNy9y9mObeX0_WAvX6AEZFCDYy4ao9vnYJnbyzFoatrJGdjoBCNEF3EM3IdIuWrSMkVHJXPDI0MFT0WUPY3FnXuF1ooU_7hyTt-aRjUZftdBC28TwD8SM_b4PUR7PLEZ_EzaLMpZvjF-DThEM1EIJTONBbfwT2bViHLwJ7L4Gn6m6l_5bc1EQpwa9MMszo_Sp8Y73xFR4fjD9ZSsLIksMg_FX6-W7141nbHCiYQSo5tgFsXkso8-n3dFn4del0MjO4iTEcnfOnq9jDnZWuFEUVoz201l56rlkfjNH8c4tA024fp5u98wmVIrLrxoXXuxTgIQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-03 23:51:34,183:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-02-03 23:51:34,183:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 03 Feb 2024 22:51:29 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308831767 Replay-Nonce: 5IXlosaqp_jCLyvcRqy_Aczc5FosBvQqTbJXGnG6ZkSIVQyCif0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:08Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820328137" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308831767" } 2024-02-03 23:51:34,183:DEBUG:acme.client:Storing nonce: 5IXlosaqp_jCLyvcRqy_Aczc5FosBvQqTbJXGnG6ZkSIVQyCif0 2024-02-03 23:51:34,184:DEBUG:acme.client:JWS payload: b'' 2024-02-03 23:51:34,189:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820328137: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFwX2pDTHl2Y1JxeV9BY3pjNUZvc0J2UXFUYkpYR25HNlprU0lWUXlDaWYwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAzMjgxMzcifQ", "signature": "nxsXrO8FNn4lfTJhvncXvMj7yA1zgBiqHeP9dhzNXHYdCYog-3Hmuz0ZIevRUxxfY2LaKH7uVuHWOn_aTL30wTZewvrGm6wfJbu5s3QuSbl5HBlXdftZ67Rf62cHiOGtXPxxJg1GJZwEK9oOoRzJARHHIJ4MV8cXyf0flirfIQg1cIg38D6f6y4uBq5xJjTQ1iX54Vp9eRsCyi4qCL8y-wYF7sLqn-5NeamGX61izoyxXGfxjjijOTpStXsCmurlVbSF7obMSPjVRnEo29GbGutap3cyPVEUH985V6HYJ6sU9RMB7NiqexyZRWo3V0qGnE1vRJISbAfV-K7EzTFGcA", "payload": "" } 2024-02-03 23:51:34,351:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820328137 HTTP/1.1" 200 809 2024-02-03 23:51:34,352:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:51:29 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA7gsr2zO-Y_8dKbxQf0oRKFiUBfnjeIuI235cEfmW5I6w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:08Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/EQtjAQ", "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/KonEuA", "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820328137/buqaYg", "token": "dEnunof0iJpL6lLO2XuAyUXy04qb49Kkl4VoORh7IDM" } ] } 2024-02-03 23:51:34,352:DEBUG:acme.client:Storing nonce: 3l89SrA7gsr2zO-Y_8dKbxQf0oRKFiUBfnjeIuI235cEfmW5I6w 2024-02-03 23:51:34,353:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-03 23:51:34,353:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-02-03 23:51:34,354:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-03 23:51:34,354:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-03 23:51:34,355:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-03 23:51:34,355:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-03 23:51:34,355:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-03 23:51:34,355:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-03 23:51:34,357:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-03 23:51:34,397:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-03 23:51:34,588:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-03 23:51:34,589:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-03 23:51:34,590:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-03 23:51:34,596:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:50 UTC. 2024-02-03 23:51:34,596:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-03 23:51:34,596:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-03 23:51:34,602:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-03 23:51:34,602:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-03 23:51:34,603:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-03 23:51:34,618:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-03 23:51:34,619:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-03 23:51:34,621:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-03 23:51:35,084:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-03 23:51:35,085:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:51:30 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "MSFHzSAcEhw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-03 23:51:35,085:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-03 23:51:39,541:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7356_key-certbot.pem 2024-02-03 23:51:43,887:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7354_csr-certbot.pem 2024-02-03 23:51:43,887:DEBUG:acme.client:Requesting fresh nonce 2024-02-03 23:51:43,888:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-03 23:51:44,046:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-03 23:51:44,046:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:51:39 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaqZRN91GsP08Ycrn3Q5kF8pUF-kZ3INjz1js2J4kwDERw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-03 23:51:44,047:DEBUG:acme.client:Storing nonce: 5IXlosaqZRN91GsP08Ycrn3Q5kF8pUF-kZ3INjz1js2J4kwDERw 2024-02-03 23:51:44,047:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-02-03 23:51:44,053:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFaUk45MUdzUDA4WWNybjNRNWtGOHBVRi1rWjNJTmp6MWpzMko0a3dERVJ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "E6k8IN94goszSCl4eAGRA-KPGt5sKDLm_8bPj5DPhmRydA03RgC-D8g2ex_NfGyMW7qylvfy0crvTFcDtH-EsgFUIFdF3iVTiRuB8NZ9SfvgT4AhZ4t6BVblS2pQD4zhrG2A8SzD6Esf-pHC-dsJI8-mfLtsizAEzIKpZWqUo5GreGJsJkogP2X1uGgYm_ygNBGtAa3v-ChjcXRFfcEktNF38wJbuAms9o49KJgd1k7SHgQ2AlRtWaMGwPBekK5GgpL9OuKrI5obX3VUkTaFKOU5C49sPmM6GsCGGoZz2XiN0R-dd-pdZ-S5_UHO8Ys55bkco2f0ozOk9eOo-5e5HQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-03 23:51:44,236:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-02-03 23:51:44,236:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 03 Feb 2024 22:51:39 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308858697 Replay-Nonce: 3l89SrA7rbU0Dr245JAABGQYIhgmgQX-9E0dZBCIKSEb6T41-ZQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:17Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820367847" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308858697" } 2024-02-03 23:51:44,237:DEBUG:acme.client:Storing nonce: 3l89SrA7rbU0Dr245JAABGQYIhgmgQX-9E0dZBCIKSEb6T41-ZQ 2024-02-03 23:51:44,237:DEBUG:acme.client:JWS payload: b'' 2024-02-03 23:51:44,242:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820367847: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdyYlUwRHIyNDVKQUFCR1FZSWhnbWdRWC05RTBkWkJDSUtTRWI2VDQxLVpRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjAzNjc4NDcifQ", "signature": "PGTF0q569B4BaK1nZI6-xH8anEhqnArcrmLJpTTrYVsevqgWTEPvXfr0iDEIlcviYx0WraX3NrC2XUjApBJJmHH8eIHhDFAJoo2vn4qBMinyYlolDk_mhJbs_RXK0PIpCM0UzXzH5V5UHvCLnDw1wmHUzQS5xZvZixDdbyDZ4bzzf3URlYfwRavT4zWhqymg2pwzbyGE1GhisVP018kzgleBPLMqZ_oVcVgF_iKjGWMQmH7cz6ZcHsxmwc5bLilTz-OgY9klp2A2NQarTSC0P6Dgudjt3mZxaeQ4LH-3FOmvoVg-mmaQNmCX42cIyfemewoyQH5FIF8Rs9RGHY-7mA", "payload": "" } 2024-02-03 23:51:44,434:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820367847 HTTP/1.1" 200 806 2024-02-03 23:51:44,435:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:51:39 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA7nqgSrskf4Sl6JIA65XzNGm0iJAS7sr-TSvri_mdZd_8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:17Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/666fkA", "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/UVRmBQ", "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820367847/SNClog", "token": "J3Uzrf6KilhxMAwdtOKTqQNSbcjIpAL9fhmQ0iHO6pM" } ] } 2024-02-03 23:51:44,435:DEBUG:acme.client:Storing nonce: 3l89SrA7nqgSrskf4Sl6JIA65XzNGm0iJAS7sr-TSvri_mdZd_8 2024-02-03 23:51:44,436:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-03 23:51:44,436:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-02-03 23:51:44,436:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-03 23:51:44,437:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-03 23:51:44,437:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-03 23:51:44,438:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-03 23:51:44,438:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-03 23:51:44,438:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-03 23:51:44,439:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-03 23:51:44,488:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-02-03 23:51:44,488:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-03 23:51:44,489:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-02-03 23:51:44,496:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-02-03 23:51:44,499:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-02-03 23:51:44,499:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-02-03 23:51:44,499:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-02-03 23:51:44,500:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-02-03 23:51:44,502:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-02-03 23:51:44,546:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-03 23:51:44,773:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-03 23:51:44,774:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-03 23:51:44,775:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-03 23:51:44,779:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:07 UTC. 2024-02-03 23:51:44,779:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-03 23:51:44,780:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-03 23:51:44,785:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-03 23:51:44,785:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-03 23:51:44,786:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-03 23:51:44,803:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-03 23:51:44,804:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-03 23:51:44,806:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-03 23:51:45,268:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-03 23:51:45,269:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:51:40 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "PUzdby8ltt4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-03 23:51:45,270:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-03 23:51:49,867:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7357_key-certbot.pem 2024-02-03 23:51:54,148:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7355_csr-certbot.pem 2024-02-03 23:51:54,148:DEBUG:acme.client:Requesting fresh nonce 2024-02-03 23:51:54,149:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-03 23:51:54,302:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-03 23:51:54,303:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:51:49 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA7fyDI2i1HcDk0FopxJb1oqubSQp7sK7x7HekZiE4ujK8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-03 23:51:54,303:DEBUG:acme.client:Storing nonce: 3l89SrA7fyDI2i1HcDk0FopxJb1oqubSQp7sK7x7HekZiE4ujK8 2024-02-03 23:51:54,303:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-02-03 23:51:54,310:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdmeURJMmkxSGNEazBGb3B4SmIxb3F1YlNRcDdzSzd4N0hla1ppRTR1aks4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "CrT5o4L7H5UZJjS9W-3qoXtcbHT7NCboAmlqJqp1l0MK6GNSGXYOuZgtNIrzZwKmvm-8rckscSOb8E8oU9xYryFNA6zx_EXRKzyAAKMm1IzLyfjbGSY7SEBKRTHyPC_2uv89V3ftuGJzvfwR1C9I-jX1HIDBbokKY0zjIjA6lLRk7yjnxem6uX5L9dZMxsrfTuXhDr6Imu-khGO2l9jZe54YZpMu5B4PgEsWLAHuOjdpZYGzcY9jpHgmlpRj4QSSX4zVUb8E0NkWi2YnXZWJYFXphFMm_2nCbJyJqhJoFdO81hDuzqrExlj6shc__2L5qAHsjbSDRUFuV8Lnt0aPWA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-03 23:51:54,473:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-02-03 23:51:54,474:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 03 Feb 2024 22:51:49 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308883057 Replay-Nonce: 3l89SrA7O_q9MmQHvBqm2uBqHLeype_MNcbAq8VwJb6wlMVdht0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:25Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820404667" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308883057" } 2024-02-03 23:51:54,474:DEBUG:acme.client:Storing nonce: 3l89SrA7O_q9MmQHvBqm2uBqHLeype_MNcbAq8VwJb6wlMVdht0 2024-02-03 23:51:54,474:DEBUG:acme.client:JWS payload: b'' 2024-02-03 23:51:54,480:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820404667: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdPX3E5TW1RSHZCcW0ydUJxSExleXBlX01OY2JBcThWd0piNndsTVZkaHQwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0MDQ2NjcifQ", "signature": "HSfRq98vND9zaUaz49LmTpzVj6i8RXA4QspKL6mnV9l0Qi9J30644ZhDja4e6L1DzE0z-05Bz-_HBi6j3A6cF8ATbs6x1qsCNnalEh6V-PscGnv7TMwhG8d-CNsvfoPaMD2nZw0b1ZGiHe8O-uyxHyScjgTFFo6KdaGVbkP-PsOuD_ff2nz1q2lyazOcB8uxllAqZjAeg-GaG1kwfIO3PWmVy2Ve4Vr8uG9wxF3Whp1ionnKuENqbT6itfxRZzTluhbQL-kDEPvARccc2ubsIiAdiuVpxuq9BE8ElgbARwzxguqCJV_VWlh75CUwNXie356aLRH8zCOG7dlBX9iRWg", "payload": "" } 2024-02-03 23:51:54,643:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820404667 HTTP/1.1" 200 811 2024-02-03 23:51:54,643:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:51:49 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaq-7M9JFSIZJIRbAYXC5Wyvfmf1aKwD3QpHNCuueonTs4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:25Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/g54rZQ", "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/4yZXyw", "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820404667/bXegoA", "token": "zb8uZEbfQ0u2h6EkUe-RoM8RiIqxFcOxGNhhHn3DI08" } ] } 2024-02-03 23:51:54,643:DEBUG:acme.client:Storing nonce: 5IXlosaq-7M9JFSIZJIRbAYXC5Wyvfmf1aKwD3QpHNCuueonTs4 2024-02-03 23:51:54,644:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-03 23:51:54,644:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-02-03 23:51:54,645:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-03 23:51:54,645:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-03 23:51:54,646:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-03 23:51:54,646:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-03 23:51:54,646:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-03 23:51:54,647:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-03 23:51:54,648:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-03 23:51:54,697:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-03 23:51:54,924:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-03 23:51:54,925:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-03 23:51:54,926:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-03 23:51:54,930:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:31 UTC. 2024-02-03 23:51:54,930:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-03 23:51:54,931:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-03 23:51:54,935:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-03 23:51:54,936:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-03 23:51:54,936:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-03 23:51:54,952:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-03 23:51:54,954:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-03 23:51:54,957:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-03 23:51:55,415:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-03 23:51:55,415:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:51:50 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "B37JX3ij9u8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-03 23:51:55,416:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-03 23:52:00,760:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7358_key-certbot.pem 2024-02-03 23:52:05,105:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7356_csr-certbot.pem 2024-02-03 23:52:05,105:DEBUG:acme.client:Requesting fresh nonce 2024-02-03 23:52:05,106:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-03 23:52:05,268:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-03 23:52:05,269:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:52:00 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaqCqA9klfdH4XyC4Ytmk_ILca7_T0-OpjBJ5FpizR5UAc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-03 23:52:05,269:DEBUG:acme.client:Storing nonce: 5IXlosaqCqA9klfdH4XyC4Ytmk_ILca7_T0-OpjBJ5FpizR5UAc 2024-02-03 23:52:05,269:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-02-03 23:52:05,276:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFDcUE5a2xmZEg0WHlDNFl0bWtfSUxjYTdfVDAtT3BqQko1RnBpelI1VUFjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "xw_xigTebWV1AVzW_zzZC5bCufyV4Wi2Pm8_xhKXQ1CINVlXneni1fCRHVaqO0RpmaT4bcZu89Q_wQGIqZFu4w0evgSFz6EY9pLpxVhmyjwzsMzicV1ZrT4DZm-jwvtWhQqxyzwflLQr74otAk7EM8_lE3VIG-4-ig_3vP48AnpEOOp1D4VCYOPtOIYOn9jcJextS7yJjXmVg9VYWl4kYhiCU6iXrqQka8mXLtWqxrJx6A02aG_bB_Xvt0HOv450iZ62DVab8-1z7_D0xyVSXFwdZxGqC4oVlalJltx182GKKpBXOBjomUHMoJ5obdwyt5dw4ppQskqptG0YGQ_aTg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-03 23:52:05,465:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-02-03 23:52:05,466:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 03 Feb 2024 22:52:00 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308906667 Replay-Nonce: 5IXlosaqzmNGnYr8EnJYkqZBGJ4Yss1S3R4luaX3olGoqBT087o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:34Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820438127" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308906667" } 2024-02-03 23:52:05,466:DEBUG:acme.client:Storing nonce: 5IXlosaqzmNGnYr8EnJYkqZBGJ4Yss1S3R4luaX3olGoqBT087o 2024-02-03 23:52:05,466:DEBUG:acme.client:JWS payload: b'' 2024-02-03 23:52:05,472:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820438127: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXF6bU5HbllyOEVuSllrcVpCR0o0WXNzMVMzUjRsdWFYM29sR29xQlQwODdvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0MzgxMjcifQ", "signature": "BdgIbRbmgmMe_CVTh7Q_yxPZgW3PyANG6fVR-PjYBNo7tU76S0IpGIl1-eSuL6Fyvc1BS3eKnbf7nKRrcxzRqcCt0l5w7k3zyme9tXIUOrVLVOg_dqqDfNfTBxs_aaWWx14H_IDg0Vkk7lhiUa__aPNplDo5ho9J0T6k7w_5HrDzIwy8GomMlRGQklCK0sPAs6I-ZT_lXhNU-eeXbHmTBgkwJDYnWW4JrEyLqKiiOxwhqRdvD7EXruwBJN77y8Y-w8MOlpTpkSss5dLJeB8W2Qqy8x7oTnq8BzrVdJhTZ8V5UD9p3y7Up-64sFVcAQYTQf6Zp5DHDQH5sA1zj4Y0YA", "payload": "" } 2024-02-03 23:52:05,651:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820438127 HTTP/1.1" 200 810 2024-02-03 23:52:05,652:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:52:00 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA7QxUVvDBGtpY2knRJ1BJ_LK6HLiRz2TKOjizY62J4rFA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:34Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/rIGBzA", "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/SWtTfQ", "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820438127/R74bXA", "token": "-MJaT3XaWgQXuHK4Bkl9ZlZZrHIZEHvWaiEs-nWfSbs" } ] } 2024-02-03 23:52:05,652:DEBUG:acme.client:Storing nonce: 3l89SrA7QxUVvDBGtpY2knRJ1BJ_LK6HLiRz2TKOjizY62J4rFA 2024-02-03 23:52:05,653:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-03 23:52:05,653:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-02-03 23:52:05,653:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-03 23:52:05,654:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-03 23:52:05,655:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-03 23:52:05,655:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-03 23:52:05,655:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-03 23:52:05,656:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-03 23:52:05,657:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-03 23:52:05,718:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-03 23:52:05,896:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-03 23:52:05,897:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-02-03 23:52:05,898:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-02-03 23:52:05,901:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:09 UTC. 2024-02-03 23:52:05,901:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-03 23:52:05,902:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-03 23:52:05,907:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-03 23:52:05,907:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-03 23:52:05,907:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-03 23:52:05,912:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-03 23:52:05,913:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-03 23:52:05,915:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-03 23:52:06,458:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-03 23:52:06,458:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:52:01 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "VUoFlDxIDSo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-03 23:52:06,459:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-03 23:52:11,154:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7359_key-certbot.pem 2024-02-03 23:52:15,447:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7357_csr-certbot.pem 2024-02-03 23:52:15,448:DEBUG:acme.client:Requesting fresh nonce 2024-02-03 23:52:15,448:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-03 23:52:15,630:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-03 23:52:15,631:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:52:10 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2ksh1KUs9-h-gEIQ7BZmLVfKUiGgwt5ghGneDiWtbWv16dzH-Mo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-03 23:52:15,631:DEBUG:acme.client:Storing nonce: 2ksh1KUs9-h-gEIQ7BZmLVfKUiGgwt5ghGneDiWtbWv16dzH-Mo 2024-02-03 23:52:15,631:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-02-03 23:52:15,637:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMmtzaDFLVXM5LWgtZ0VJUTdCWm1MVmZLVWlHZ3d0NWdoR25lRGlXdGJXdjE2ZHpILU1vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "xYVpdv5GdpjvrlS0lueOrHpE8rGuQfBMEdjtpNlBsUq6cA8AsTgpNQawqv5QtK9DiweezDajZUwWUQwiQbR4j70ST4uPK3Ygaz0sP3jAlqx-uLvH1Xlm7m_PqjK0LA0e2q1hFdKtczjRm3HYHPatIncO3ToNV3X8oCP7g4w2nJ6MFyaM6G7xMjqqHigozCqgs9THkgrG0cE3lNKjaxwOA0RCM0jlCgTRd4untN7zTNULYJvTQaDUpJasFsQyZUBcMECJszaORAelk6OsjcBIi55MRpz5yHMVvYxnX6EpoA0T7Ga_SguT1EkAaqKyTmkONp2LQHIEsENxii1QjS2zMA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-03 23:52:15,826:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-02-03 23:52:15,827:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 03 Feb 2024 22:52:11 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308929257 Replay-Nonce: kRyagOpUCmUV1klbzz1-FZ2bqp4zgRhER_mK6b9ixzTRtJm7e3I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:43Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820469197" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308929257" } 2024-02-03 23:52:15,827:DEBUG:acme.client:Storing nonce: kRyagOpUCmUV1klbzz1-FZ2bqp4zgRhER_mK6b9ixzTRtJm7e3I 2024-02-03 23:52:15,827:DEBUG:acme.client:JWS payload: b'' 2024-02-03 23:52:15,835:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820469197: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAia1J5YWdPcFVDbVVWMWtsYnp6MS1GWjJicXA0emdSaEVSX21LNmI5aXh6VFJ0Sm03ZTNJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA0NjkxOTcifQ", "signature": "kVa1l6pzejzJGm4rDucJXqBOHaG5wD371G6_GUjSCDipb60VW5Tk9JkHmipSMa2HkCafNZl-dj7tuqYx7Rf2yLnj3kSpd4T_Th2iRPTuWln4X4sg1nMhvCU4ETXt22j3vIrM-LbhAGmLMEX8wlbGedItACnLCat2YkIwrDDPKz5U-MV4DcJ3SogmGy9xMwE-vRZ2L-se21eik9B5l_8h33bp9Z2iwdz4w6QqbDZSBqxilyi5zJr624D3Io0ustfixHACh74o0c0ymYAHlTMBqcU5oqFEeBwk3JnIY6SGsABpJmnoxN8i5FU2U8jneCcydqwnmLplctYqJGzqP4USjQ", "payload": "" } 2024-02-03 23:52:16,033:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820469197 HTTP/1.1" 200 809 2024-02-03 23:52:16,033:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:52:11 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: kRyagOpUCcfXbebuPsMbazoKrkj70D-FezLbaiFY9IisBiBaggM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:43Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/PqKyzA", "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/nQMx2Q", "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820469197/ZJc1Yg", "token": "FaR9sV0FyTAB4JebUKu9VWTVzcV-jrBp1Muem-TCYs0" } ] } 2024-02-03 23:52:16,034:DEBUG:acme.client:Storing nonce: kRyagOpUCcfXbebuPsMbazoKrkj70D-FezLbaiFY9IisBiBaggM 2024-02-03 23:52:16,035:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-03 23:52:16,035:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-02-03 23:52:16,036:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-03 23:52:16,036:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-03 23:52:16,037:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-03 23:52:16,037:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-03 23:52:16,037:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-03 23:52:16,038:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-03 23:52:16,039:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-03 23:52:16,095:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-03 23:52:16,303:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-03 23:52:16,305:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is signed by the certificate's issuer. 2024-02-03 23:52:16,305:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD 2024-02-03 23:52:16,310:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:26 UTC. 2024-02-03 23:52:16,310:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-03 23:52:16,311:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-03 23:52:16,316:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-03 23:52:16,316:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-03 23:52:16,316:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-03 23:52:16,332:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-03 23:52:16,333:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-03 23:52:16,335:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-03 23:52:16,792:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-03 23:52:16,793:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:52:12 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "aCuXv1iIZmE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-03 23:52:16,793:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-03 23:52:21,431:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7360_key-certbot.pem 2024-02-03 23:52:25,543:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7358_csr-certbot.pem 2024-02-03 23:52:25,544:DEBUG:acme.client:Requesting fresh nonce 2024-02-03 23:52:25,544:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-03 23:52:25,700:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-03 23:52:25,700:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:52:20 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaqb7KsUG2G1ZMz0w6WSwL0R_RLpz6u2T7LhWZd-QpbLAA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-03 23:52:25,700:DEBUG:acme.client:Storing nonce: 5IXlosaqb7KsUG2G1ZMz0w6WSwL0R_RLpz6u2T7LhWZd-QpbLAA 2024-02-03 23:52:25,701:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-02-03 23:52:25,707:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXFiN0tzVUcyRzFaTXowdzZXU3dMMFJfUkxwejZ1MlQ3TGhXWmQtUXBiTEFBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "vSk2xM2GFmr_aR1b9TTZaleVHtki1McEtXfcft84ewPBM81C1UppEmjXOcCmLMhvXLcnCS0Otnk7AfTx6zFPBx3Hw-tsxpWAxnGnAn-wJ_gIe4pIGRGvMBakEEavGsdFsR2M4zOqgd9hK-5FdAlj20JHhouflYpBQmXfxb0S3v_3LLO5BTqpTZnkO2FNcpCj-4E-FhxnAcSbpE9q7kmOOBV9naqXj6g_BZGOZBe7QiVJYcdRluQBZ8dASYIQMA3-S1zVeglY0KzK_Et-2DgyyxyNpUXhatlHXsV-zz-x9kvDTGqJmAykupa00vRLbinCSwphRTFaL_ZexWgRGQhoCg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-03 23:52:25,934:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-03 23:52:25,934:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 03 Feb 2024 22:52:21 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308951787 Replay-Nonce: 3l89SrA75d0GRvjYl_vNUB0sI9AFV9MnQrF4ujodotTmGPIOFIY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:26:52Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820501457" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308951787" } 2024-02-03 23:52:25,934:DEBUG:acme.client:Storing nonce: 3l89SrA75d0GRvjYl_vNUB0sI9AFV9MnQrF4ujodotTmGPIOFIY 2024-02-03 23:52:25,935:DEBUG:acme.client:JWS payload: b'' 2024-02-03 23:52:25,941:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820501457: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTc1ZDBHUnZqWWxfdk5VQjBzSTlBRlY5TW5RckY0dWpvZG90VG1HUElPRklZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1MDE0NTcifQ", "signature": "RZBfmziEj7jvtRFc4ySfLkEuXFa5VIKVqwvcITIdTiQvqafgTYj0PwaP8lm9TX6tavOLSlLcaHuayQawnoGEviDNekLZcQtS-VVEFRUSRwG0NMC7gDDAwJ2Ak-qDodBKHXT45PTjop8X9vJJPD9Cq5dpU2QLopZzZbaIgzjyyHCORNK5_eced0zPWq1MnN-TgHUK5ZEHL4TpA5BXFpLcLbNeWLlw1soRqgB0ejHhamRv8aHw8Pljh-lCuJfUtaOQgLEjTTy2Zxau8IrDl9k8x1E2VNEtNfRybImn7jILiVmO_6OvSfkXBt9OkhmHyGbPCddHSZQn8X6-JZM-DMrhjg", "payload": "" } 2024-02-03 23:52:26,100:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820501457 HTTP/1.1" 200 805 2024-02-03 23:52:26,100:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:52:21 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA7zdNrYMbqnuYuI3UyRmsSgeJUzt2lAsmyEuANnU3USFc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:26:52Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/nfOlPQ", "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/ptX2uw", "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820501457/u4UgEQ", "token": "6XWwHzuqeLj1BpLbvCqzedkYBFu11S0drTbirM9d6Zw" } ] } 2024-02-03 23:52:26,101:DEBUG:acme.client:Storing nonce: 3l89SrA7zdNrYMbqnuYuI3UyRmsSgeJUzt2lAsmyEuANnU3USFc 2024-02-03 23:52:26,101:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-03 23:52:26,102:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-02-03 23:52:26,102:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-03 23:52:26,103:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-03 23:52:26,103:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-03 23:52:26,104:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-03 23:52:26,104:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-03 23:52:26,104:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-03 23:52:26,106:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-03 23:52:26,144:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-03 23:52:26,352:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-03 23:52:26,353:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-03 23:52:26,354:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-03 23:52:26,359:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:43 UTC. 2024-02-03 23:52:26,360:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-03 23:52:26,360:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-03 23:52:26,368:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-03 23:52:26,368:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-03 23:52:26,368:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-03 23:52:26,374:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-03 23:52:26,375:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-03 23:52:26,378:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-03 23:52:26,826:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-03 23:52:26,826:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:52:22 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "deh0dd2ddzQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-03 23:52:26,827:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-03 23:52:31,259:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7361_key-certbot.pem 2024-02-03 23:52:35,577:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7359_csr-certbot.pem 2024-02-03 23:52:35,577:DEBUG:acme.client:Requesting fresh nonce 2024-02-03 23:52:35,577:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-03 23:52:35,734:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-03 23:52:35,735:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:52:30 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaq2r9Cz3Kw8-wQjpOIFMNlmbRUEmxDcULXZ10KRT_zoZE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-03 23:52:35,735:DEBUG:acme.client:Storing nonce: 5IXlosaq2r9Cz3Kw8-wQjpOIFMNlmbRUEmxDcULXZ10KRT_zoZE 2024-02-03 23:52:35,735:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-02-03 23:52:35,744:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXEycjlDejNLdzgtd1FqcE9JRk1ObG1iUlVFbXhEY1VMWFoxMEtSVF96b1pFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "WyoAOhMj5-ZdIwlICo5pWzAMXVtltEuRQtyeCaGsv4GRoGdWunTeHFwFviURMowVv-hNIbb5dRQ-TS8WNm0rzBBUX-JJxjWN08SmxD5NMOoZgRXfS0-LissBcrACoZqvDgS5Z3wsPqwz1cLR4rKi1_1OA5NetXFBJ7iLMN4q7yEJ5yUEIcnZEurjHwXjSoYIqW_0GYPOWFmiT56lY0dCCwe165GqAx-pF-QnhFAe_ckxDaSFiMs4UazwtoC0HqvgK-ts5CRNO3b6vZuT4OzCdPekiu9SroH_GlFcIb595sDk8x_nxXXSxIadunUsTwUiSAMff3jYo5t0ute-jnlyiQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-03 23:52:35,918:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-03 23:52:35,918:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 03 Feb 2024 22:52:31 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241308975127 Replay-Nonce: 3l89SrA7UcpT0OYth-HA4Mqk2MeN5mg_j9MgLFLBs5YMIhf-iII X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:27:01Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820533737" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241308975127" } 2024-02-03 23:52:35,919:DEBUG:acme.client:Storing nonce: 3l89SrA7UcpT0OYth-HA4Mqk2MeN5mg_j9MgLFLBs5YMIhf-iII 2024-02-03 23:52:35,919:DEBUG:acme.client:JWS payload: b'' 2024-02-03 23:52:35,925:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820533737: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdVY3BUME9ZdGgtSEE0TXFrMk1lTjVtZ19qOU1nTEZMQnM1WU1JaGYtaUlJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1MzM3MzcifQ", "signature": "ILFQ39B09fkFmcICEWlkcHSJ3vnVX8ypZfwjWXIUQOZiC6bCbswpR1sLZWI8eAz6_gG5JdONWexOpFM_bpbv6RmgSslsouN2cvhw_p5AWbB5PtyoU-Fhy5SG-qRAXy96f2nvldqLnBL2EM-JAxgDU-h7ZkANsE7BuAvK5q4IqSu2VQhlZ4qKu3eRDPr8XcxT71Bp4KeBrNz7bqqFED0mRNYSo0a-glXDyl2yJGgDN9FznpoF2iWORYrEMfv8ZKkqRLphxoNQHoFqzZ_1oSVm-w6_-z7Rg-XURphy2bPC8dW1XpKucx2larcGkbphb35wM2X7nuquDfFmNqWi-DXUIg", "payload": "" } 2024-02-03 23:52:36,081:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820533737 HTTP/1.1" 200 805 2024-02-03 23:52:36,081:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:52:31 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaqOLWQ6S4iq-eMD2YwnjpSRi_dWUyQcy1BjOPbU1ZjD9o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:27:01Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/u7lnsw", "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/kawHqw", "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820533737/Xsywzg", "token": "timbXoeueMn7-mDajAC61wqLkt8Na3yCM1rCNxlTaNs" } ] } 2024-02-03 23:52:36,081:DEBUG:acme.client:Storing nonce: 5IXlosaqOLWQ6S4iq-eMD2YwnjpSRi_dWUyQcy1BjOPbU1ZjD9o 2024-02-03 23:52:36,082:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-03 23:52:36,082:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-02-03 23:52:36,083:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-03 23:52:36,083:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-03 23:52:36,084:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-03 23:52:36,084:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-03 23:52:36,084:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-03 23:52:36,084:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-03 23:52:36,085:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-03 23:52:36,134:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-03 23:52:36,141:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-03 23:52:36,142:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-03 23:52:36,143:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-03 23:52:36,147:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:40:02 UTC. 2024-02-03 23:52:36,147:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-03 23:52:36,148:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-03 23:52:36,153:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-03 23:52:36,153:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-03 23:52:36,153:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-03 23:52:36,157:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-03 23:52:36,158:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-03 23:52:36,161:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-03 23:52:36,621:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-03 23:52:36,622:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:52:31 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "XOyXfioUqII": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-03 23:52:36,622:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-03 23:52:41,242:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7362_key-certbot.pem 2024-02-03 23:52:45,795:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7360_csr-certbot.pem 2024-02-03 23:52:45,796:DEBUG:acme.client:Requesting fresh nonce 2024-02-03 23:52:45,796:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-03 23:52:45,955:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-03 23:52:45,955:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:52:41 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5IXlosaqyjqKu7saXVtw-DLLHGx5A5XUmD_mso0vd1SC0ZGhNyA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-03 23:52:45,955:DEBUG:acme.client:Storing nonce: 5IXlosaqyjqKu7saXVtw-DLLHGx5A5XUmD_mso0vd1SC0ZGhNyA 2024-02-03 23:52:45,956:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-02-03 23:52:45,963:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNUlYbG9zYXF5anFLdTdzYVhWdHctRExMSEd4NUE1WFVtRF9tc28wdmQxU0MwWkdoTnlBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "xI_QiASpHrW78Y3FIJPMp7ftA0xPNzPsFlVHGSeoynTGpqlXYU6RGxHDcrzrZSHV7g9VCbZ20MosYOiVmRTDnwZ594Wm5cvjBMglcyYONF7U1lC9SypgTVkvpJT79RBn6-WxGhziVzuhplWrVVfVYna9ELObHDU7l70mObXl6mhi-Kib9QzwHXsKiM7n4NSCjRPKmqwN2NFlUGANXXvjmRXHHWZ2VS5JA81Rwsy7N1vNCrND4-wzM3jCvUpPMymfviTL_Ob40z30gicAdhmROCw2XKmzqQLGEmVQ0Jh726VTSsFLa4khyV_9E52SFNNZYE8Bf-sqDWL7TwUgfw1jkg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-03 23:52:46,143:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-03 23:52:46,144:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 03 Feb 2024 22:52:41 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/241309008647 Replay-Nonce: 3l89SrA7FaetSXc6gv0-vXGmeiVTe6EjcUzT-Lmxwr7BOY5YsmQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-09T15:27:10Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820580167" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/241309008647" } 2024-02-03 23:52:46,150:DEBUG:acme.client:Storing nonce: 3l89SrA7FaetSXc6gv0-vXGmeiVTe6EjcUzT-Lmxwr7BOY5YsmQ 2024-02-03 23:52:46,151:DEBUG:acme.client:JWS payload: b'' 2024-02-03 23:52:46,158:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/310820580167: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiM2w4OVNyQTdGYWV0U1hjNmd2MC12WEdtZWlWVGU2RWpjVXpULUxteHdyN0JPWTVZc21RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMTA4MjA1ODAxNjcifQ", "signature": "UCnjjsXYgVmfpNiRCiKCQZGNWnnl-kzObYS3jJk12o2h3oKhqi7aGzuoWI08F661k_9C3EbsL13MeNynoMQWiwrrmcoWQi-b2doGWK78H_cLXdMOa0WA6w7eYyVP6bTc0FCYYz9AJZLyLvu7MG2B8CJPM1PQnTzwdj0eitBWSxaC2rGlzbfhB_EiOAeCYVZ49NUfqnI9j2hGfx-J5-e1HSfA7L3T2JyakjQkjrmxQBlv5z8rmF7gnMtR683cTXIpXInFlGlidFPXoR5ak041XYdgLWXcGdh-52-9CZbqGosAUn_OnWSYdcrnduw0HyAUtlgXU8y_WYEoPyj2c4MMKw", "payload": "" } 2024-02-03 23:52:46,316:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/310820580167 HTTP/1.1" 200 805 2024-02-03 23:52:46,316:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 03 Feb 2024 22:52:41 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 3l89SrA7-gNUnpZUZji5Pq7Fq49C5_HGQHJ1hUVCBojernwYcs8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-09T15:27:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/yNgMJw", "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/JW2Bpw", "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/310820580167/iioLug", "token": "5SQ5rjhlQOWWiPkXPBCiFTsHgpMD7cBVmeQI28_saJc" } ] } 2024-02-03 23:52:46,316:DEBUG:acme.client:Storing nonce: 3l89SrA7-gNUnpZUZji5Pq7Fq49C5_HGQHJ1hUVCBojernwYcs8 2024-02-03 23:52:46,317:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-03 23:52:46,318:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-02-03 23:52:46,318:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-03 23:52:46,319:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-03 23:52:46,319:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-03 23:52:46,320:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-03 23:52:46,320:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-03 23:52:46,321:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-03 23:52:46,322:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-03 23:52:46,322:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-02-03 23:52:46,323:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-02-03 23:52:46,325:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-02-03 23:52:46,327:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)