2025-02-01 18:44:59,864:DEBUG:certbot._internal.main:certbot version: 1.6.0 2025-02-01 18:44:59,865:DEBUG:certbot._internal.main:Arguments: [] 2025-02-01 18:44:59,865:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2025-02-01 18:45:00,813:DEBUG:certbot._internal.log:Root logging level set at 20 2025-02-01 18:45:00,813:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2025-02-01 18:45:00,859:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2025-02-01 18:45:00,902:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-01 18:45:01,129:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 18:45:01,130:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2025-02-01 18:45:01,135:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2025-02-01 18:45:01,146:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-02-01 18:45:01,151:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 18:45:01,195:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-01 18:45:01,375:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 18:45:01,376:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is signed by the certificate's issuer. 2025-02-01 18:45:01,377:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD 2025-02-01 18:45:01,382:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-02-01 18:45:01,387:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 18:45:01,426:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-01 18:45:01,695:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 18:45:01,697:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2025-02-01 18:45:01,698:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2025-02-01 18:45:01,702:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-02-01 18:45:01,706:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 18:45:01,758:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-02-01 18:45:01,960:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 18:45:01,961:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is signed by the certificate's issuer. 2025-02-01 18:45:01,962:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is: OCSPCertStatus.GOOD 2025-02-01 18:45:01,967:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-02-01 18:45:01,970:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 18:45:02,014:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-01 18:45:02,237:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 18:45:02,239:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert22.pem is signed by the certificate's issuer. 2025-02-01 18:45:02,241:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD 2025-02-01 18:45:02,247:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-02-01 18:45:02,250:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 18:45:02,304:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-02-01 18:45:02,494:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 18:45:02,495:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-02-01 18:45:02,496:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-02-01 18:45:02,500:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:13:49 UTC. 2025-02-01 18:45:02,501:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-01 18:45:02,501:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 18:45:02,506:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-02-01 18:45:02,507:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-02-01 18:45:02,507:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-01 18:45:02,512:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-02-01 18:45:02,514:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-01 18:45:02,516:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-01 18:45:02,966:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-01 18:45:02,967:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:44:21 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "XZbvoBlbJD4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-02-01 18:45:02,968:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-01 18:45:12,378:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9033_key-certbot.pem 2025-02-01 18:45:21,066:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9031_csr-certbot.pem 2025-02-01 18:45:21,067:DEBUG:acme.client:Requesting fresh nonce 2025-02-01 18:45:21,067:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-01 18:45:21,215:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-01 18:45:21,216:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:44:40 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UvlUZ57PDjS6-mAaxN5O-GaqCCsXgfNvckgTnqkczFEnA2eX-ls X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-01 18:45:21,216:DEBUG:acme.client:Storing nonce: UvlUZ57PDjS6-mAaxN5O-GaqCCsXgfNvckgTnqkczFEnA2eX-ls 2025-02-01 18:45:21,217:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2025-02-01 18:45:21,224:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVXZsVVo1N1BEalM2LW1BYXhONU8tR2FxQ0NzWGdmTnZja2dUbnFrY3pGRW5BMmVYLWxzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "X_5y4FLYi1dRM809yF1EEWwNx2FMG6AOdAtuxHtvsDKQRUQLuXbgAzUM0HO1-stYYBs8cd4gOM5yKxXnQ2nFqI9WIOcj1OLmWiYF9NE7mMpQ2gMI_I8vXy0mXejPR1eTxRv4cA3CnCrXVB0VtbXjULyeZMkGVwlFP6ZQXdp2LzMWftRPXJpCcsu9wI8uOlUQbiUWgDohLW6GbznZjdmBeGQ_TGe045nipkM-jCnyfigxTJn9EDQBVS-oEtAHv0Fe_2SMvCplgf1TYyDkuZoYXigA0BFp0-D2nj96tne69sqb25uHwxNWjKXG9mc_XGGxd-IHD1WzJLWxgHEh7tWGmQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-02-01 18:45:21,413:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-02-01 18:45:21,414:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 01 Feb 2025 17:44:40 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603648845 Replay-Nonce: TUC11O6Xi_UDrlPaJFyZfGnvsPQnz0OUr4qQlETzzGhhF4i5Aus X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:15:56Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613419375" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603648845" } 2025-02-01 18:45:21,414:DEBUG:acme.client:Storing nonce: TUC11O6Xi_UDrlPaJFyZfGnvsPQnz0OUr4qQlETzzGhhF4i5Aus 2025-02-01 18:45:21,414:DEBUG:acme.client:JWS payload: b'' 2025-02-01 18:45:21,421:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613419375: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhpX1VEcmxQYUpGeVpmR252c1BRbnowT1VyNHFRbEVUenpHaGhGNGk1QXVzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM0MTkzNzUifQ", "signature": "RqzFR_4fv0iEeJlMf1ED9cqySvb23_4cWORebUTwuDJTWVhzAtF1qG90HlfnMFsb8qhgZ-nQqM49AQyCw-xThJHgfeO0hdwzluHV5uFsMM9EkKTq2mplllfKFnmumuu_Ew0IXgEkpU8RDzluoF5y_YpDoD1WTwaC7BE7MiJcg-oGDFVmytU2O_vCSqPo6WWZZwBLRs6H3Ss3dEfp7hiG1GNNi3W4zqLDYsH4B0d_rbbUVXr3mFi0OjM5kpoIGYQfI2vngmaVrNg488w1-Qr-l5PpT71VkTQfVtZ68fS1HhWfKN9WxZ25wdZCZNLrJkch35pYRCRcwQFU4M8MpR6s8Q", "payload": "" } 2025-02-01 18:45:21,577:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613419375 HTTP/1.1" 200 823 2025-02-01 18:45:21,578:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:44:40 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UvlUZ57PKqRcNPw2aSrKxUWSrGnaqemoVQcJ2P-nb1C9_IHQPak X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:15:56Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613419375/bahWuQ", "status": "pending", "token": "9EnXT6FT7rznT8ngp10HxQzCcXcgDHNCsRx5DOBACns" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613419375/T3sOUw", "status": "pending", "token": "9EnXT6FT7rznT8ngp10HxQzCcXcgDHNCsRx5DOBACns" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613419375/yJLmdw", "status": "pending", "token": "9EnXT6FT7rznT8ngp10HxQzCcXcgDHNCsRx5DOBACns" } ] } 2025-02-01 18:45:21,578:DEBUG:acme.client:Storing nonce: UvlUZ57PKqRcNPw2aSrKxUWSrGnaqemoVQcJ2P-nb1C9_IHQPak 2025-02-01 18:45:21,578:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-01 18:45:21,578:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2025-02-01 18:45:21,591:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-01 18:45:21,591:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-01 18:45:21,601:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 18:45:21,602:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-01 18:45:21,602:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-01 18:45:21,602:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-01 18:45:21,615:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 18:45:21,658:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-01 18:45:21,869:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 18:45:21,870:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2025-02-01 18:45:21,871:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2025-02-01 18:45:21,876:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:20 UTC. 2025-02-01 18:45:21,876:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-01 18:45:21,876:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 18:45:21,881:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-02-01 18:45:21,881:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-02-01 18:45:21,882:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-01 18:45:21,898:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-02-01 18:45:21,899:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-01 18:45:21,901:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-01 18:45:22,349:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-01 18:45:22,352:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:44:41 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "nh5DRTa97CU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-02-01 18:45:22,353:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-01 18:45:30,672:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9034_key-certbot.pem 2025-02-01 18:45:38,631:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9032_csr-certbot.pem 2025-02-01 18:45:38,632:DEBUG:acme.client:Requesting fresh nonce 2025-02-01 18:45:38,632:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-01 18:45:38,786:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-01 18:45:38,786:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:44:57 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UvlUZ57PjloK58DU1Fg8moS80A9onVg0Cc0L6ed-NaK8g4P-DRM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-01 18:45:38,787:DEBUG:acme.client:Storing nonce: UvlUZ57PjloK58DU1Fg8moS80A9onVg0Cc0L6ed-NaK8g4P-DRM 2025-02-01 18:45:38,787:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2025-02-01 18:45:38,792:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVXZsVVo1N1BqbG9LNThEVTFGZzhtb1M4MEE5b25WZzBDYzBMNmVkLU5hSzhnNFAtRFJNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "qkzaIsQyvKN6vjf9iu1REddquH02DF0m0AYpw2cW0EkmT-LfFF8IzYOzHr6hVsgS5UfQFIUejSGKUn9OgFUtKN0UzV5jlCJXphoIvX4SvWSXWcdFV8ocYWM9HN-qUsV39-tyXx975vyUch5HhqXIq8SMNpBrdy45iSQfrOFm0MwU0N0NNLXR16HSHlgQTID6RpkOYlsOMZTxEDrNfbW2DP0YDgMk9Uek5GyTBf--9ch9mE5hNgsUlbl5VMvkZAq8xWS0G-dCZpK1AoK5XIvA8-E7LYXDP46M6j2wJmaavT0uPSusPmFLvIihB-G1ym0nMRkyBUw3Qf3S_OiV7crRcg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-02-01 18:45:38,991:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2025-02-01 18:45:38,992:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 01 Feb 2025 17:44:57 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603700365 Replay-Nonce: TUC11O6XoATh5HBQqiBOCPJpgfTMt16LiqYZMt20Jc0RUk5fb40 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:16:10Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613495675" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603700365" } 2025-02-01 18:45:38,992:DEBUG:acme.client:Storing nonce: TUC11O6XoATh5HBQqiBOCPJpgfTMt16LiqYZMt20Jc0RUk5fb40 2025-02-01 18:45:38,992:DEBUG:acme.client:JWS payload: b'' 2025-02-01 18:45:38,999:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613495675: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhvQVRoNUhCUXFpQk9DUEpwZ2ZUTXQxNkxpcVlaTXQyMEpjMFJVazVmYjQwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM0OTU2NzUifQ", "signature": "WWu9xRmWuq-fS-Y_iTs8zcbIKuzETRQ3iCFfQ2kQo41gHov0B2WjW1g3RJnKZqOl0cYV66G6fxwEayOzFRnCS9MdPrmt_rdsgLmkZI9mBE0nUgSgqH7vjsusH9W4tNr3eXBHFvZzmnAiQv9n0Zh1GeqzY0ChdDMhiZ00_Apt_GQ3zrMclZzi0jvlHrIr7wpv_VtjAxru7nu5QEJ4urA_H8DG_5GIyZ0cggPLkZ4qow9WJKhHesUi0l_7w687lcZduLihj6zX5gdlKCS9wg-3ZO32D8ntvs7ksBavo_RaZxD7IpmVVm73YieS8j9caVAYvMGJPXl0cCSbPNYpxZ4yiA", "payload": "" } 2025-02-01 18:45:39,160:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613495675 HTTP/1.1" 200 827 2025-02-01 18:45:39,161:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:44:58 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6Xbl1pxrw_ScSNfc1zBouNZHAqsXEzIbcM2UYCescnJrU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:16:10Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613495675/TKifNg", "status": "pending", "token": "-N4wWQFOkzSF8ZGn4EebknObkGtUQ-conbTGk8O9Reo" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613495675/OR7sGQ", "status": "pending", "token": "-N4wWQFOkzSF8ZGn4EebknObkGtUQ-conbTGk8O9Reo" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613495675/DpTZMg", "status": "pending", "token": "-N4wWQFOkzSF8ZGn4EebknObkGtUQ-conbTGk8O9Reo" } ] } 2025-02-01 18:45:39,161:DEBUG:acme.client:Storing nonce: TUC11O6Xbl1pxrw_ScSNfc1zBouNZHAqsXEzIbcM2UYCescnJrU 2025-02-01 18:45:39,162:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-01 18:45:39,162:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2025-02-01 18:45:39,163:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-01 18:45:39,163:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-01 18:45:39,164:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 18:45:39,164:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-01 18:45:39,164:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-01 18:45:39,165:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-01 18:45:39,166:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 18:45:39,211:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-01 18:45:39,404:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 18:45:39,406:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is signed by the certificate's issuer. 2025-02-01 18:45:39,406:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is: OCSPCertStatus.GOOD 2025-02-01 18:45:39,410:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:51 UTC. 2025-02-01 18:45:39,410:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-01 18:45:39,410:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 18:45:39,415:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-02-01 18:45:39,415:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-02-01 18:45:39,415:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-01 18:45:39,421:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-02-01 18:45:39,423:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-01 18:45:39,425:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-01 18:45:39,884:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-01 18:45:39,884:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:44:58 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "upxtL2zSbmY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2025-02-01 18:45:39,885:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-01 18:45:48,248:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9035_key-certbot.pem 2025-02-01 18:45:56,222:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9033_csr-certbot.pem 2025-02-01 18:45:56,223:DEBUG:acme.client:Requesting fresh nonce 2025-02-01 18:45:56,223:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-01 18:45:56,374:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-01 18:45:56,375:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:45:15 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6X5_PKkP8FgX_DF892KZo-H7KoXoCRcNmLfvgirHpElm4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-01 18:45:56,375:DEBUG:acme.client:Storing nonce: TUC11O6X5_PKkP8FgX_DF892KZo-H7KoXoCRcNmLfvgirHpElm4 2025-02-01 18:45:56,376:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2025-02-01 18:45:56,382:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlg1X1BLa1A4RmdYX0RGODkyS1pvLUg3S29Yb0NSY05tTGZ2Z2lySHBFbG00IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "THyj7Dlyq7kCHT_mfM6hkf9k5a_rpjECGflHPrcybMiCKiMQ49wx4keYIF7KIeF1N2dK8crNK5FQuZXkc_84R1K9V8giBAJAIGutHvyPaFAnptH5jlSyX09eSEUj4Jffxj6ER7lCy7UV-bc30uYuuXqCYUTVdNGoZu5xK6IR7vZZ2F9bE_CvktaZfuWuOpMPSr_aKsKM6Ws66SGBNpHTZ1toZKBbbnpOgE16aF5L5COTwNQZZuQxzdTrYsfWYEPIEIqOorTe04oTR0mqlgth0-K1OD_53PUEGwssVhef_JBFWBitrh-xFuQz7-TjYuqTJWd-P8HHB-h9BHSCiVs21A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2025-02-01 18:45:56,603:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 353 2025-02-01 18:45:56,604:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 01 Feb 2025 17:45:15 GMT Content-Type: application/json Content-Length: 353 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603747715 Replay-Nonce: TUC11O6X-banKw7yCJRUqPp40ZlxMoMkgf7VhQGdAiUkplFzBDU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:16:23Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613569085" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603747715" } 2025-02-01 18:45:56,604:DEBUG:acme.client:Storing nonce: TUC11O6X-banKw7yCJRUqPp40ZlxMoMkgf7VhQGdAiUkplFzBDU 2025-02-01 18:45:56,604:DEBUG:acme.client:JWS payload: b'' 2025-02-01 18:45:56,610:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613569085: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlgtYmFuS3c3eUNKUlVxUHA0MFpseE1vTWtnZjdWaFFHZEFpVWtwbEZ6QkRVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM1NjkwODUifQ", "signature": "dyWdUAHIG7Jmaz00crhp9pGgrAfCXkRkzx81M5nLFxP_Q1n3lruwgsro3VZGya77fWFpOmYAotDfx7_bEtjlG3pQrhiB2vgPlPeQFR_TuZhHFeVl7cOdf94WLTkQ3ALh70D5gzB7CtqzImG2Fk-qE4isVoSSSxixLXP9Y5c4Qj1cG-OCyJ7NvLBV6mIyg5cvn4V6lbABVxkdvvUDuA0eLcWEXac9cMGKfzLnmsn8Z2EZu5ySpAdkGNTMnCif_WIetFjve02WlWF5RK9qFmGHFBkcO5M1MhnlNQ2HNLMddWb1WDeZEs05pLm093Hd_1ERzdyXpr4WbYI7AMvkmZz7lQ", "payload": "" } 2025-02-01 18:45:56,775:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613569085 HTTP/1.1" 200 825 2025-02-01 18:45:56,775:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:45:15 GMT Content-Type: application/json Content-Length: 825 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6XR9uqd4kCIZxwXZBS0rdKT5FtUt4ey6dQAJJE1Pg70cI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:16:23Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613569085/_lVOeQ", "status": "pending", "token": "voycDLD6WaIuZqIiZii35bQ8xrl32oR994HNkskXaVM" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613569085/i556TQ", "status": "pending", "token": "voycDLD6WaIuZqIiZii35bQ8xrl32oR994HNkskXaVM" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613569085/67S_cA", "status": "pending", "token": "voycDLD6WaIuZqIiZii35bQ8xrl32oR994HNkskXaVM" } ] } 2025-02-01 18:45:56,776:DEBUG:acme.client:Storing nonce: TUC11O6XR9uqd4kCIZxwXZBS0rdKT5FtUt4ey6dQAJJE1Pg70cI 2025-02-01 18:45:56,776:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-01 18:45:56,777:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2025-02-01 18:45:56,777:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-01 18:45:56,778:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-01 18:45:56,778:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 18:45:56,778:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-01 18:45:56,778:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-01 18:45:56,780:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-01 18:45:56,781:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 18:45:56,836:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-01 18:45:57,020:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 18:45:57,021:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-02-01 18:45:57,022:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-02-01 18:45:57,027:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:13 UTC. 2025-02-01 18:45:57,027:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-01 18:45:57,028:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 18:45:57,032:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-02-01 18:45:57,033:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-02-01 18:45:57,033:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-01 18:45:57,038:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-02-01 18:45:57,040:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-01 18:45:57,042:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-01 18:45:57,515:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-01 18:45:57,515:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:45:16 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "HKFGipDbaP4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-02-01 18:45:57,516:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-01 18:46:05,392:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9036_key-certbot.pem 2025-02-01 18:46:12,507:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9034_csr-certbot.pem 2025-02-01 18:46:12,507:DEBUG:acme.client:Requesting fresh nonce 2025-02-01 18:46:12,507:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-01 18:46:12,667:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-01 18:46:12,667:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:45:31 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8i1f0YRCxrh5DvrQy0XXhUN1ttlej_O3qq1dQAkevVOXA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-01 18:46:12,668:DEBUG:acme.client:Storing nonce: hXNDuA8i1f0YRCxrh5DvrQy0XXhUN1ttlej_O3qq1dQAkevVOXA 2025-02-01 18:46:12,668:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2025-02-01 18:46:12,674:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGkxZjBZUkN4cmg1RHZyUXkwWFhoVU4xdHRsZWpfTzNxcTFkUUFrZXZWT1hBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "FYvA0hjurUuSmQeoZKFXswD-z-J-Ms3tW5vr6sFK9xh5k4ol3KyDHlfIpoLO04RSnEPPrn624ZMgMFFH9HDts_t2mwPiZcDj1qZP4wE2l0tuSTJzmYuDru1g6bhI-x5ikbxhRHfCq4I6oChkSWiMFdWRnPSeBgsmNJlNgUTfES1LNdcG46u0AE212jOI_87IPnQ_rLWizSy_b-jjJNV-vXa1TE4br4nhNvpCvyZXDjzeEifl9e3SjhL8DUoLDt4wZA4rt-z2BYVaqWc6B7LRWNzLXtNzYW0vI0AwtPmVPq_e_TUNNuBuzmWN2cXbJMRVIubSzKXIr-UvOTY0b3CYBw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-02-01 18:46:12,861:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 352 2025-02-01 18:46:12,861:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 01 Feb 2025 17:45:31 GMT Content-Type: application/json Content-Length: 352 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603792325 Replay-Nonce: aTttXYyyv3Vwxfx9fpBfc49hcD2IdhMFUJzsI1j8V8oprnP8yiA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:16:37Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613637565" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603792325" } 2025-02-01 18:46:12,862:DEBUG:acme.client:Storing nonce: aTttXYyyv3Vwxfx9fpBfc49hcD2IdhMFUJzsI1j8V8oprnP8yiA 2025-02-01 18:46:12,862:DEBUG:acme.client:JWS payload: b'' 2025-02-01 18:46:12,869:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613637565: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXl2M1Z3eGZ4OWZwQmZjNDloY0QySWRoTUZVSnpzSTFqOFY4b3ByblA4eWlBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM2Mzc1NjUifQ", "signature": "v1iC8OLya0F_HF4CRfrsuuRcQL1XqO12T9HbL9Mtfdf_90duz9pEG232U1XcL3gWrnhrtz3ZsA5nqr1pBZWyodyMPgX--kwriJbLaxGqwVndJmu6Wva5tjdTZz-bpM8DOpuo8VoZptGLEOljmIPKlT9D56zXkA9k0KoKlmkQW5e_Stp5HooM65rqqp03p2M4lccnU1k-fS0CiV0hSlWOa4y252k1cVjpc89xJ74EUheBui6FdIvb7GeuUbu-53eqaVlsB9yCc0dOJJSmaeLDaSctjxHTlta-Py50SwdCAQJEPxuFiI8IZIuCogTOmu_GNVJTgeJOmgjaSGl8MPQPSA", "payload": "" } 2025-02-01 18:46:13,036:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613637565 HTTP/1.1" 200 824 2025-02-01 18:46:13,037:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:45:31 GMT Content-Type: application/json Content-Length: 824 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8iC2222tzLEB7tENsinGfBVyYqO5nao4-wBjxyRQRprLY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:16:37Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613637565/_4E6Mg", "status": "pending", "token": "koSUgsC_SD5VGbDQ3X2SLH_w9qYfJ8H3V8YT4kweWIk" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613637565/HkAMUw", "status": "pending", "token": "koSUgsC_SD5VGbDQ3X2SLH_w9qYfJ8H3V8YT4kweWIk" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613637565/5bZpJA", "status": "pending", "token": "koSUgsC_SD5VGbDQ3X2SLH_w9qYfJ8H3V8YT4kweWIk" } ] } 2025-02-01 18:46:13,037:DEBUG:acme.client:Storing nonce: hXNDuA8iC2222tzLEB7tENsinGfBVyYqO5nao4-wBjxyRQRprLY 2025-02-01 18:46:13,038:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-01 18:46:13,038:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2025-02-01 18:46:13,038:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-01 18:46:13,040:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-01 18:46:13,040:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 18:46:13,040:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-01 18:46:13,041:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-01 18:46:13,041:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-01 18:46:13,042:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 18:46:13,102:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2025-02-01 18:46:13,102:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-01 18:46:13,103:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2025-02-01 18:46:13,115:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2025-02-01 18:46:13,121:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2025-02-01 18:46:13,121:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2025-02-01 18:46:13,121:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2025-02-01 18:46:13,122:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2025-02-01 18:46:13,125:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2025-02-01 18:46:13,168:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-01 18:46:13,340:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 18:46:13,341:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-02-01 18:46:13,342:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-02-01 18:46:13,347:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:35 UTC. 2025-02-01 18:46:13,347:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-01 18:46:13,347:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 18:46:13,352:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-02-01 18:46:13,352:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-02-01 18:46:13,352:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-01 18:46:13,357:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-02-01 18:46:13,358:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-01 18:46:13,361:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-01 18:46:13,814:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-01 18:46:13,815:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:45:32 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "ocT9AHwAsCk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-02-01 18:46:13,816:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-01 18:46:21,608:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9037_key-certbot.pem 2025-02-01 18:46:28,732:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9035_csr-certbot.pem 2025-02-01 18:46:28,733:DEBUG:acme.client:Requesting fresh nonce 2025-02-01 18:46:28,733:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-01 18:46:28,886:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-01 18:46:28,886:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:45:47 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UvlUZ57Po1RXzpD9wIGy9sgf_HTfsOY_vdcQKt7aga20rWGUsZ8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-01 18:46:28,886:DEBUG:acme.client:Storing nonce: UvlUZ57Po1RXzpD9wIGy9sgf_HTfsOY_vdcQKt7aga20rWGUsZ8 2025-02-01 18:46:28,887:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2025-02-01 18:46:28,893:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVXZsVVo1N1BvMVJYenBEOXdJR3k5c2dmX0hUZnNPWV92ZGNRS3Q3YWdhMjByV0dVc1o4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "T3g-qi-tWXuChLcWtji7I33_3Ka-bmP0odRiufcLVIiuDy_WVDeH0ahV_2GbrKFqEigN1DdQALQqE763zNWu_PbqMOLrtKOdCcN8QEGn5XNc8SAmo6Bl4kvPoGIoth3A_31RVRuO9v58du1ZTfaBd8Q1bPGGO0t6XwJNXM3jlbnzrR3COvYUvln2dr__sCPXtE1M_SGx5iqr1anlcGsVGtzeFblmpc2Za_92taF5WNDmR1oJ6oW9HHeakZqPfOUro7xY5Qd5NiNGyq4e_A-83Xtfu-X9KXsGYomGS236JeesS9TYGyjk6KLs6xnVGerCcf31nOi5xUm-pAYPSJ_hAw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-02-01 18:46:29,072:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 357 2025-02-01 18:46:29,073:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 01 Feb 2025 17:45:47 GMT Content-Type: application/json Content-Length: 357 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603833745 Replay-Nonce: TUC11O6Xi2Tw6BwQDub6mswlIJPQ3Gq812y6upmbFWq1ulBXs6Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:16:51Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613700475" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603833745" } 2025-02-01 18:46:29,073:DEBUG:acme.client:Storing nonce: TUC11O6Xi2Tw6BwQDub6mswlIJPQ3Gq812y6upmbFWq1ulBXs6Y 2025-02-01 18:46:29,073:DEBUG:acme.client:JWS payload: b'' 2025-02-01 18:46:29,079:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613700475: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhpMlR3NkJ3UUR1YjZtc3dsSUpQUTNHcTgxMnk2dXBtYkZXcTF1bEJYczZZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM3MDA0NzUifQ", "signature": "mWl_9ZG6N7RD33vJmW6jy6yfWcJQEEEd_XF15epmDFvbQeGVolomW_vJ1AvLrbuj2r3R-a1HFbh8gdD1EnFGjoT83ZUQnjZqTUO2xpZQcj_RORayKMRdPq5voibCrT-Q8fG_BjCuIxrVi296roBv6iTOWP3E4PTYdMwEwkyI4KBR4NZII3cz0FjVruTgXj1Jm40kETTWZWrGYGwEuTSIeY2M6fDjI1kZW8FLPfFonz8PBYDjNRHraHyzyWYKj3tdO_eujrZGwLbqBml--CBuCvJXx7Lvv7jZ5_UCpp7TxqXNpI2QyKPCJCRm5VfarJP7FXGM_g-IYKVTtm2Og1JWWQ", "payload": "" } 2025-02-01 18:46:29,237:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613700475 HTTP/1.1" 200 829 2025-02-01 18:46:29,238:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:45:48 GMT Content-Type: application/json Content-Length: 829 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UvlUZ57PAT-_WHMWcqDCOkxq9rTLHXSYoI7u83ReBfyh0oA5b74 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:16:51Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613700475/4GWkdQ", "status": "pending", "token": "_3T_C3yuCWV4XSeLeRXCPycDIQnwxDGf-AyaPY9XlxE" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613700475/jElvnA", "status": "pending", "token": "_3T_C3yuCWV4XSeLeRXCPycDIQnwxDGf-AyaPY9XlxE" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613700475/B2drkw", "status": "pending", "token": "_3T_C3yuCWV4XSeLeRXCPycDIQnwxDGf-AyaPY9XlxE" } ] } 2025-02-01 18:46:29,238:DEBUG:acme.client:Storing nonce: UvlUZ57PAT-_WHMWcqDCOkxq9rTLHXSYoI7u83ReBfyh0oA5b74 2025-02-01 18:46:29,238:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-01 18:46:29,240:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2025-02-01 18:46:29,241:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-01 18:46:29,241:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-01 18:46:29,242:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 18:46:29,242:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-01 18:46:29,242:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-01 18:46:29,243:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-01 18:46:29,244:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 18:46:29,293:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-02-01 18:46:29,484:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 18:46:29,486:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-02-01 18:46:29,486:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-02-01 18:46:29,491:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:05 UTC. 2025-02-01 18:46:29,491:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-01 18:46:29,492:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 18:46:29,500:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-02-01 18:46:29,501:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-02-01 18:46:29,501:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-01 18:46:29,507:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-02-01 18:46:29,508:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-01 18:46:29,511:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-01 18:46:29,961:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-01 18:46:29,962:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:45:48 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "FRtgL9aT3jw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-02-01 18:46:29,962:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-01 18:46:37,313:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9038_key-certbot.pem 2025-02-01 18:46:44,380:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9036_csr-certbot.pem 2025-02-01 18:46:44,380:DEBUG:acme.client:Requesting fresh nonce 2025-02-01 18:46:44,380:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-01 18:46:44,532:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-01 18:46:44,532:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:46:03 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6XGUxSv-vlEMfBzEQGHlXAHQEMpPJxqUrTYPy3f0Z_ZN8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-01 18:46:44,533:DEBUG:acme.client:Storing nonce: TUC11O6XGUxSv-vlEMfBzEQGHlXAHQEMpPJxqUrTYPy3f0Z_ZN8 2025-02-01 18:46:44,533:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2025-02-01 18:46:44,539:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhHVXhTdi12bEVNZkJ6RVFHSGxYQUhRRU1wUEp4cVVyVFlQeTNmMFpfWk44IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "VNJpBqoGnDdAOwd0QNJM0xdy14_U-KQpQ_QKkQxYHdS7ggXQTWB0tEjf0CEb4BpaP5fUXIi36cQgJ2OtICts3W0xfQR6NS8cTrSwVUPJ6nFIbkmtOLKdZvPgupfQ4UAYLr_qxhUZKuYbJBdW24zFfl5ibddGO9D7X3ipwOZXmh6qwYbh0esWSzx9RWkZEOshc8Baomp5PCtO12vTuzzBaYbWR-C910lIef4BBHYseloZPVl7nqAIei5A9Tf6kl0C2aPA2ACcQscQeF5w54cgMuPKROu7zir2e6Kj9SrPywFz0rXgS44DZxtCH57GzGzAngahwNL5FTIw0yY5XZ-qMQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2025-02-01 18:46:44,730:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356 2025-02-01 18:46:44,730:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 01 Feb 2025 17:46:03 GMT Content-Type: application/json Content-Length: 356 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603881465 Replay-Nonce: UvlUZ57Pa4EGg5ppXeK6mGYzIx7iK0kNyw1QZV4-ijVkz3P8jxo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:17:04Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613770605" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603881465" } 2025-02-01 18:46:44,731:DEBUG:acme.client:Storing nonce: UvlUZ57Pa4EGg5ppXeK6mGYzIx7iK0kNyw1QZV4-ijVkz3P8jxo 2025-02-01 18:46:44,731:DEBUG:acme.client:JWS payload: b'' 2025-02-01 18:46:44,737:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613770605: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVXZsVVo1N1BhNEVHZzVwcFhlSzZtR1l6SXg3aUswa055dzFRWlY0LWlqVmt6M1A4anhvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM3NzA2MDUifQ", "signature": "qCMsUCTUb71Bu-qAa9Sv57GzetTA4oLv_bLvKx9w8M8uOe4FFE1XdGSo-vmSQWoJYZjZZuMzhdRbIWbFV91eWkkMUp25XQ1zvRwh5PloN31PuJHd0eoJ0zVbSM-M8-BhkrrT71NRfmwodbdwt-NgIvDYwCf78_i0HxgjGbvEDB4AxBbaUquo1YcIMcru4tYlYpFBgb4QYvfbhEfUZCzwTA-OEp3UnK4YxWyAtDTrMmJPql3AHJ9rRNHaHBzd2KT-4rwWTcxGlQSnSj4oRD6WwpFswfVA3uPQ4BT99R1yQzaF-iS3CdMDTJtR22R3hSX_Yvf02qziAZf61yuY1XfxRw", "payload": "" } 2025-02-01 18:46:44,907:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613770605 HTTP/1.1" 200 828 2025-02-01 18:46:44,907:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:46:03 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6Xc4NPtwjX5ENJZK8BsgLZeVZsVnnUFhSUhLenuXyroDI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:17:04Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613770605/QBtWUw", "status": "pending", "token": "a_L9ZYSN7UCXXgi8qZoJiOQo70GFjG_W81I9wg8pLws" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613770605/9nrvYA", "status": "pending", "token": "a_L9ZYSN7UCXXgi8qZoJiOQo70GFjG_W81I9wg8pLws" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613770605/F9o6HQ", "status": "pending", "token": "a_L9ZYSN7UCXXgi8qZoJiOQo70GFjG_W81I9wg8pLws" } ] } 2025-02-01 18:46:44,908:DEBUG:acme.client:Storing nonce: TUC11O6Xc4NPtwjX5ENJZK8BsgLZeVZsVnnUFhSUhLenuXyroDI 2025-02-01 18:46:44,908:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-01 18:46:44,909:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2025-02-01 18:46:44,909:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-01 18:46:44,910:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-01 18:46:44,911:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 18:46:44,911:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-01 18:46:44,911:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-01 18:46:44,911:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-01 18:46:44,912:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 18:46:44,966:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-01 18:46:45,159:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 18:46:45,160:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2025-02-01 18:46:45,161:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2025-02-01 18:46:45,166:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:33 UTC. 2025-02-01 18:46:45,166:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-01 18:46:45,167:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 18:46:45,172:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-02-01 18:46:45,172:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-02-01 18:46:45,172:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-01 18:46:45,188:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-02-01 18:46:45,189:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-01 18:46:45,190:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-01 18:46:45,660:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-01 18:46:45,661:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:46:04 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "BEnl7YVbgnc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-02-01 18:46:45,661:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-01 18:46:53,383:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9039_key-certbot.pem 2025-02-01 18:47:00,480:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9037_csr-certbot.pem 2025-02-01 18:47:00,481:DEBUG:acme.client:Requesting fresh nonce 2025-02-01 18:47:00,481:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-01 18:47:00,639:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-01 18:47:00,639:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:46:19 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8iTylFOWgjVLmlJhQj2DlsmoypMKJi5HaPNDoph1BerWc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-01 18:47:00,640:DEBUG:acme.client:Storing nonce: hXNDuA8iTylFOWgjVLmlJhQj2DlsmoypMKJi5HaPNDoph1BerWc 2025-02-01 18:47:00,640:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2025-02-01 18:47:00,646:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGlUeWxGT1dnalZMbWxKaFFqMkRsc21veXBNS0ppNUhhUE5Eb3BoMUJlcldjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "aBdREVlSMQZBmIjzdj1gGT1aIv3kDio8s8_pPXtUqhylwgRX6tZo9WzzPgwIg6hJH6EMVW2NMo3G4kVPnkgSRRtTqoLtfuIh8YyoxbsDqNFVUWsL8j1G0f5g_rc0SH4WGOdmu17BHMHPOBbuMU19Dd2HDGnRl7_gVFun6FqjxvF0TrK4DoEtuj9DcSRVTbXiX9tJZC8bO35LGgjcCX_98QIGHS1HGq_NDCZ4BwdWKBbg1hBAPponNsbHGg2EX1D-_xXIEPKmIBop7MgqzSxyMCg7s1CYpnAOIXNf1pLUXg-Ae1h6L-Nk5zI5dw2NncF-dUa-02WLiWT-kKEk2pUuKw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-02-01 18:47:00,820:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2025-02-01 18:47:00,821:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 01 Feb 2025 17:46:19 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603934575 Replay-Nonce: aTttXYyyAbGKmLBPwvEZqdgKtdj_Ik8XUjpl1E2M53lmaAMjHfk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:17:18Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613854905" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603934575" } 2025-02-01 18:47:00,821:DEBUG:acme.client:Storing nonce: aTttXYyyAbGKmLBPwvEZqdgKtdj_Ik8XUjpl1E2M53lmaAMjHfk 2025-02-01 18:47:00,821:DEBUG:acme.client:JWS payload: b'' 2025-02-01 18:47:00,827:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613854905: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXlBYkdLbUxCUHd2RVpxZGdLdGRqX0lrOFhVanBsMUUyTTUzbG1hQU1qSGZrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM4NTQ5MDUifQ", "signature": "NNfd8a29ZnPDIUxwVtcV1afTGINu2uEaDM8yadqssT9eN6xxC0rWLMLDgL2s19ndef94Pg0NLrPAVkr2d58RqXx0LSv_byLeb7m3dZnv69VmnDvUu6Y5gEfQUSkf-e-GsdQr-5BCwkkwQ8X5JYaGXQUfFieye9AA5SlLej6HTxu-hRsZlWS-v5sWOO9h_PI-i3YswOFHkt8bRztrNx8yd-bfaI2xNo2nEFQf1o5fvntOR1VdGzS7jgCUF3UPaTLpsjyQHPsBy_RuKy5xp1119yt3KjM2P1nQreZH4-ld4SBZTATRp-J220i9Z4dWzFKRDeSh3e0Zu0wBqNfXqhzxbg", "payload": "" } 2025-02-01 18:47:00,991:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613854905 HTTP/1.1" 200 827 2025-02-01 18:47:00,992:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:46:19 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8iJSobAYcX3SZYj9KqxQlb0LGjr5LjDu1mSuAyNM1qBw4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:17:18Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613854905/7RtzaQ", "status": "pending", "token": "IK7vYZaRda0VTDtKKQsecohpYPhsEngjBQ1X3SBv7HQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613854905/bMnPCg", "status": "pending", "token": "IK7vYZaRda0VTDtKKQsecohpYPhsEngjBQ1X3SBv7HQ" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613854905/ke1eMQ", "status": "pending", "token": "IK7vYZaRda0VTDtKKQsecohpYPhsEngjBQ1X3SBv7HQ" } ] } 2025-02-01 18:47:00,992:DEBUG:acme.client:Storing nonce: hXNDuA8iJSobAYcX3SZYj9KqxQlb0LGjr5LjDu1mSuAyNM1qBw4 2025-02-01 18:47:00,993:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-01 18:47:00,993:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2025-02-01 18:47:00,994:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-01 18:47:00,994:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-01 18:47:00,995:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 18:47:00,995:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-01 18:47:00,995:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-01 18:47:00,995:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-01 18:47:00,996:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 18:47:01,045:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-02-01 18:47:01,255:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 18:47:01,256:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2025-02-01 18:47:01,257:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2025-02-01 18:47:01,261:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:54 UTC. 2025-02-01 18:47:01,261:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-01 18:47:01,261:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 18:47:01,266:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-02-01 18:47:01,267:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-02-01 18:47:01,267:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-01 18:47:01,282:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-02-01 18:47:01,283:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-01 18:47:01,285:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-01 18:47:01,747:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-01 18:47:01,748:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:46:20 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "QQX1odV5eu4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-02-01 18:47:01,748:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-01 18:47:08,950:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9040_key-certbot.pem 2025-02-01 18:47:16,138:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9038_csr-certbot.pem 2025-02-01 18:47:16,139:DEBUG:acme.client:Requesting fresh nonce 2025-02-01 18:47:16,139:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-01 18:47:16,290:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-01 18:47:16,290:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:46:35 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6XyOrDuYkWfSwy5YK3hUxhjRhj3Swjq_LWuZaQxLGAdMQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-01 18:47:16,290:DEBUG:acme.client:Storing nonce: TUC11O6XyOrDuYkWfSwy5YK3hUxhjRhj3Swjq_LWuZaQxLGAdMQ 2025-02-01 18:47:16,291:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2025-02-01 18:47:16,298:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlh5T3JEdVlrV2ZTd3k1WUszaFV4aGpSaGozU3dqcV9MV3VaYVF4TEdBZE1RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "BOvMCGVkkG1nUgnIUNldDFlCrBeyi8x53wsl7Th34oZpfS_TE5ZUIMF9zgAyFbgCgH33Zhi_acSPTOGl2EJrDw__p7_sHbMKXdqwXKIh2B1qZ4kMaBSRa4ZRdGz_yOGeGb0R-UcDdpuyu-ze1iiTh3_CQddfnR7G041YXDn_0l-3a8ZjkSkueT7oSszjbdSIMzkw-vOCoDuzM5XvQHyTWF9iko7J-5KrsPPux2xDIzWkEN_8nq6FOfBL4zHa0h1D20BLWRmAqClG-uJiaO-axrTpe417KnUfetJMgmhMD-LD_QD9dJGS-_Wb9dRDcuQeHYYTCaljTLdmUh3j1X0xhQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-02-01 18:47:16,499:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-02-01 18:47:16,500:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 01 Feb 2025 17:46:35 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603978585 Replay-Nonce: TUC11O6XADV8fxXTi1DzYzX1f6g3ohch41ptfs3jZdBpRXCT0kE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:17:32Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613923815" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603978585" } 2025-02-01 18:47:16,500:DEBUG:acme.client:Storing nonce: TUC11O6XADV8fxXTi1DzYzX1f6g3ohch41ptfs3jZdBpRXCT0kE 2025-02-01 18:47:16,500:DEBUG:acme.client:JWS payload: b'' 2025-02-01 18:47:16,506:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613923815: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhBRFY4ZnhYVGkxRHpZelgxZjZnM29oY2g0MXB0ZnMzalpkQnBSWENUMGtFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM5MjM4MTUifQ", "signature": "KJR76JzmMnZcH5Wdsm_gnAihIuVLgdtHHSXDwsepjthqaKI4JXeq7XNnaPgBVEStZ2kijDX6jM4xKZX6kuzwVdYtU0_0DxgXel0srWKYgE-XIVbI7ARg6cJP2rTDVbpy4kEkTSZOS4_BUx-7YdcdVrpM2x443n7vKcRYpC7wdLs40V1nlg72uUNIKxe4j8UJ2DcXq9bgoTs4_xWO9Z5nygK8RXA3BENR4IeDYsyqlRXVlvgduCwogUICmSwDifQDeC4v6ne3dYPYTRrDpV_OyTx8jvhrh7zL9j_E2OZdzwt29jWvitpf0tlTqEmYlL18XcbNI9damgnRlW0sr1U7QQ", "payload": "" } 2025-02-01 18:47:16,667:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613923815 HTTP/1.1" 200 823 2025-02-01 18:47:16,667:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:46:35 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UvlUZ57PtlQD7enenu6bt_kekgV1eYi9lhhTexZAzqNEGTTnzvo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:17:32Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613923815/wvLngQ", "status": "pending", "token": "m7yyxIJSFIemVfF7rkix7A6ntmc25SA7QMkT0Knl1qI" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613923815/t9VvUw", "status": "pending", "token": "m7yyxIJSFIemVfF7rkix7A6ntmc25SA7QMkT0Knl1qI" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613923815/wNRiHQ", "status": "pending", "token": "m7yyxIJSFIemVfF7rkix7A6ntmc25SA7QMkT0Knl1qI" } ] } 2025-02-01 18:47:16,668:DEBUG:acme.client:Storing nonce: UvlUZ57PtlQD7enenu6bt_kekgV1eYi9lhhTexZAzqNEGTTnzvo 2025-02-01 18:47:16,668:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-01 18:47:16,669:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2025-02-01 18:47:16,669:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-01 18:47:16,669:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-01 18:47:16,670:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 18:47:16,670:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-01 18:47:16,670:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-01 18:47:16,670:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-01 18:47:16,672:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 18:47:16,722:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-01 18:47:16,930:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 18:47:16,932:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-02-01 18:47:16,932:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-02-01 18:47:16,937:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:15 UTC. 2025-02-01 18:47:16,937:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-01 18:47:16,938:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 18:47:16,943:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-02-01 18:47:16,943:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-02-01 18:47:16,943:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-01 18:47:16,959:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-02-01 18:47:16,960:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-01 18:47:16,962:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-01 18:47:17,409:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-01 18:47:17,410:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:46:36 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "REGAtmDZZUk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-02-01 18:47:17,410:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-01 18:47:24,937:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9041_key-certbot.pem 2025-02-01 18:47:32,423:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9039_csr-certbot.pem 2025-02-01 18:47:32,423:DEBUG:acme.client:Requesting fresh nonce 2025-02-01 18:47:32,424:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-01 18:47:32,573:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-01 18:47:32,574:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:46:51 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UvlUZ57PCfAZ5UCAJnDlqucw6rft7rtAq8Vsk5ff-hfavZdxlXw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-01 18:47:32,574:DEBUG:acme.client:Storing nonce: UvlUZ57PCfAZ5UCAJnDlqucw6rft7rtAq8Vsk5ff-hfavZdxlXw 2025-02-01 18:47:32,574:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2025-02-01 18:47:32,581:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVXZsVVo1N1BDZkFaNVVDQUpuRGxxdWN3NnJmdDdydEFxOFZzazVmZi1oZmF2WmR4bFh3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "UXvCuqqOy7sI4xWnXh36SswRupGcloKTmQr2zg6FUEQWrjppysSrYczTW1QpbpXX5YuZ3H8e3PwRQy5APw37G5sWFRNPTGG5uAWF-PWr6uh62zWXO8l4GZqxHVVnimFDnan6DtxK28VvCeRxQAPwH2c_n1tqegpH3CbkyuDxBGxK3ADwyJee_0F5dANZh2qsz_gDIUrIiCBzIovYyts3OWz_LaNXCnkbp1q7e1iCD19YToiPt-yjIAO7jIEN4NJRyqK4UhK7Ms1YBof_v8oTNN9KKEaxY51mYtMf3Lz6cuAEgqojEZKLbXZ6vMygwuuX6zCvHUOPXFL_3EITCukodg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-02-01 18:47:32,768:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-02-01 18:47:32,768:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 01 Feb 2025 17:46:51 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349604024205 Replay-Nonce: UvlUZ57P3sGS3MB_xXTafGMIgjX25R1eumTjHt2OfQ2rEsXoi40 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:17:46Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613992955" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349604024205" } 2025-02-01 18:47:32,768:DEBUG:acme.client:Storing nonce: UvlUZ57P3sGS3MB_xXTafGMIgjX25R1eumTjHt2OfQ2rEsXoi40 2025-02-01 18:47:32,769:DEBUG:acme.client:JWS payload: b'' 2025-02-01 18:47:32,774:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613992955: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVXZsVVo1N1Azc0dTM01CX3hYVGFmR01JZ2pYMjVSMWV1bVRqSHQyT2ZRMnJFc1hvaTQwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM5OTI5NTUifQ", "signature": "bIDvTb-zzSxd7ajrK6FrYZubobuOqxb067zN0XWGGEdANh14K017qJk4UuxqzOqEy9gws54oE5jD9p43Ja7fMmY2g2NnZGrLlUow3SzpesTv4Qm50azlaW1KxPLpbbnlxei7BAPThDR2NzeyaumSqFNR4HgMJYPKg7R-FkeJeYu4ngXAPIkimrg8ckVLaXmehPec38hxAhyUrQpOcXUeQh1r392jDK2qWYcwxFz36O97WtQ-0ImFOXhyGybJgqxrBi8w55WZpufnQRFwkErzUPinmqv2bn2j41xKpdrLHwsEGMInRuJPy0hcBvX5xQ1QjANfqQlzjLDbswhXaIOWtg", "payload": "" } 2025-02-01 18:47:32,932:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613992955 HTTP/1.1" 200 823 2025-02-01 18:47:32,933:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:46:51 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6Xfkci8k6B8YoKQ8Xf_CG3m_uQZZSeFTkWVt26KCG4CH0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:17:46Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613992955/xSdP2A", "status": "pending", "token": "6MJOC_tlqp2eo7XHm1FAxeHMF3eocZ9KkmW5bas3nAw" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613992955/Sy2Pkg", "status": "pending", "token": "6MJOC_tlqp2eo7XHm1FAxeHMF3eocZ9KkmW5bas3nAw" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613992955/G_4bSw", "status": "pending", "token": "6MJOC_tlqp2eo7XHm1FAxeHMF3eocZ9KkmW5bas3nAw" } ] } 2025-02-01 18:47:32,933:DEBUG:acme.client:Storing nonce: TUC11O6Xfkci8k6B8YoKQ8Xf_CG3m_uQZZSeFTkWVt26KCG4CH0 2025-02-01 18:47:32,934:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-01 18:47:32,935:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2025-02-01 18:47:32,935:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-01 18:47:32,936:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-01 18:47:32,936:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 18:47:32,937:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-01 18:47:32,937:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-01 18:47:32,937:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-01 18:47:32,939:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 18:47:33,000:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-02-01 18:47:33,196:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 18:47:33,198:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2025-02-01 18:47:33,199:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2025-02-01 18:47:33,205:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:38 UTC. 2025-02-01 18:47:33,205:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-01 18:47:33,205:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 18:47:33,210:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-02-01 18:47:33,210:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-02-01 18:47:33,210:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-01 18:47:33,216:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-02-01 18:47:33,217:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-01 18:47:33,219:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-01 18:47:33,703:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-01 18:47:33,704:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:46:52 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "SPuDVGDnYkI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-02-01 18:47:33,704:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-01 18:47:41,504:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9042_key-certbot.pem 2025-02-01 18:47:48,954:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9040_csr-certbot.pem 2025-02-01 18:47:48,954:DEBUG:acme.client:Requesting fresh nonce 2025-02-01 18:47:48,955:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-01 18:47:49,117:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-01 18:47:49,118:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:47:07 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8i3Q5WzcyOQiHVerDZEn9vRExOwy_BgCnVf1gzXLF0QR0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-01 18:47:49,118:DEBUG:acme.client:Storing nonce: hXNDuA8i3Q5WzcyOQiHVerDZEn9vRExOwy_BgCnVf1gzXLF0QR0 2025-02-01 18:47:49,118:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2025-02-01 18:47:49,124:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGkzUTVXemN5T1FpSFZlckRaRW45dlJFeE93eV9CZ0NuVmYxZ3pYTEYwUVIwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "AfNKBZhrBmhe0RV8va79IHE7eQ47rqXWqqeJcocNlOxCcy1vQQxehnvdM_NqoYbQYNb0Ch4sUJZvQcHJbolY8cy-UVjEbx_zghf4he4J9NMQdNM5kETCx5Ch_GEyZKRU6-Hvrm1R3w_ZJaB25NBhkZdFAPkBy6AtDsEpNuxBeBjj478fxFexOG7nRbwOM95vzmQ1_SVZKG_yUxnL8HFbTqj-eCXC7zyzlAuGAHeW7FP0-Se7fDQFAjG-GZu8bQvWYv3c6jenPykEB2ImvSGrRB3NQdPJV6w2xgYnmwEKijk6kQ8zkHPu4wOkb3AedfN82cHlF_jYvL7XlCbkuJmSUw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-02-01 18:47:49,314:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-02-01 18:47:49,315:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 01 Feb 2025 17:47:08 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349604068465 Replay-Nonce: hXNDuA8iw9XSI4_DaOVKk3xACjG5VW83UIYrDJQOggFs33UdRgk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:18:00Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468614059925" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349604068465" } 2025-02-01 18:47:49,315:DEBUG:acme.client:Storing nonce: hXNDuA8iw9XSI4_DaOVKk3xACjG5VW83UIYrDJQOggFs33UdRgk 2025-02-01 18:47:49,315:DEBUG:acme.client:JWS payload: b'' 2025-02-01 18:47:49,322:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468614059925: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGl3OVhTSTRfRGFPVktrM3hBQ2pHNVZXODNVSVlyREpRT2dnRnMzM1VkUmdrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTQwNTk5MjUifQ", "signature": "MU1rNCcU2aPNZUlGrxm4iop_n5bhXhrJQBWeHInCQ1c7qfqGa058DlKIZNIn_jVg_9f6TcfUJp9At00TMyybPNXcSFWmXSXsG8WrJWCtBtKj-2SiGW_nJurfvEURG01s6S0atDRYcznvoNmtZdXDiRNYrP0neBvqWhAepNpOUr3BlixXU-5o-obIyiTSlad_2XUjsZaAs8SfZGq40qHZIR_paBfs1ucL3Hlmr3qcJuJHEmF4kHrjW-oWkQJGdiiqik1vFrWKL4YoHY_c9OorYj6C1zj7idB-GqVfgs_KetEIJQiiHGWro-woTn4y0UyWOhoNPEZQ4F11c7EYP_Zrlg", "payload": "" } 2025-02-01 18:47:49,489:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468614059925 HTTP/1.1" 200 823 2025-02-01 18:47:49,489:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 17:47:08 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aTttXYyyKwmDtdFik2i5h64EmTOLeS6JTAPc7Ytm0XHXn1XsRP0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:18:00Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468614059925/f-K6ug", "status": "pending", "token": "wxzPthxA_2D1WM9MuMnylOPR_2v6PcertENLY_gigks" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468614059925/YrgyBQ", "status": "pending", "token": "wxzPthxA_2D1WM9MuMnylOPR_2v6PcertENLY_gigks" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468614059925/B9cGNQ", "status": "pending", "token": "wxzPthxA_2D1WM9MuMnylOPR_2v6PcertENLY_gigks" } ] } 2025-02-01 18:47:49,490:DEBUG:acme.client:Storing nonce: aTttXYyyKwmDtdFik2i5h64EmTOLeS6JTAPc7Ytm0XHXn1XsRP0 2025-02-01 18:47:49,491:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-01 18:47:49,491:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2025-02-01 18:47:49,491:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-01 18:47:49,492:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-01 18:47:49,492:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 18:47:49,493:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-01 18:47:49,493:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-01 18:47:49,493:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-01 18:47:49,494:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 18:47:49,495:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2025-02-01 18:47:49,495:ERROR:certbot._internal.renewal: C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2025-02-01 18:47:49,496:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 11 renew failure(s), 0 parse failure(s) 2025-02-01 18:47:49,499:ERROR:certbot._internal.log:11 renew failure(s), 0 parse failure(s)