2024-02-01 02:28:58,040:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-02-01 02:28:58,040:DEBUG:certbot._internal.main:Arguments: [] 2024-02-01 02:28:58,041:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-02-01 02:28:58,851:DEBUG:certbot._internal.log:Root logging level set at 20 2024-02-01 02:28:58,852:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-02-01 02:28:58,888:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-02-01 02:28:58,927:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-01 02:28:59,137:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-01 02:28:59,150:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is signed by the certificate's issuer. 2024-02-01 02:28:59,154:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is: OCSPCertStatus.GOOD 2024-02-01 02:28:59,161:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:15 UTC. 2024-02-01 02:28:59,161:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-01 02:28:59,161:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-01 02:28:59,165:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-01 02:28:59,165:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-01 02:28:59,166:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-01 02:28:59,171:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-01 02:28:59,172:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-01 02:28:59,174:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-01 02:28:59,646:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-01 02:28:59,647:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:28:57 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "c-kGdylsylk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-01 02:28:59,647:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-01 02:29:04,170:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7272_key-certbot.pem 2024-02-01 02:29:08,222:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7270_csr-certbot.pem 2024-02-01 02:29:08,222:DEBUG:acme.client:Requesting fresh nonce 2024-02-01 02:29:08,222:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-01 02:29:08,382:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-01 02:29:08,383:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:29:06 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc5oCpxSd-FnGNhsAaEFjupWBNJ-YMtpaNBy__K_L8lmQQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-01 02:29:08,383:DEBUG:acme.client:Storing nonce: R3i4Vkc5oCpxSd-FnGNhsAaEFjupWBNJ-YMtpaNBy__K_L8lmQQ 2024-02-01 02:29:08,384:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-02-01 02:29:08,390:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVvQ3B4U2QtRm5HTmhzQWFFRmp1cFdCTkotWU10cGFOQnlfX0tfTDhsbVFRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "LZzEtGgKfJK_-yOwTjzwQSz6ABkKjpwudFrSLodi0Ysjkch68MSVkGaeKX_UB1IotaPBnYtkawbzKUjIDC7dRtAB5xZ2c4pbs66DzPUoYCWad_dYNmzFt4XYGctNic0e69HlxaZaRv3Hn7qehPVZxFkTjC4vBjYwWq9aXp4RrF2hhsE5x8KAXrA5bhWZEW1OhUiApzONvPfz9PslvnhidWTWDpMlGbhTDGeUhSMKJRzK0YwxJ2Bx1iw565I1p2Qq-CLy-6CCzCx32E80-ZhTqKL6CBlMmPvx9Ptwf-zGFOYnXdK3AP4mfTSjVCFe-7lQoAkUdOkijAxsoOLuez8wQg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-01 02:29:08,572:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-02-01 02:29:08,573:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 01 Feb 2024 01:29:06 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463125096 Replay-Nonce: R3i4Vkc54M4js_50GvRmcCjxyzzIsosxuaWK65j-0Yefoo3HqVY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:45:30Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186209716" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463125096" } 2024-02-01 02:29:08,573:DEBUG:acme.client:Storing nonce: R3i4Vkc54M4js_50GvRmcCjxyzzIsosxuaWK65j-0Yefoo3HqVY 2024-02-01 02:29:08,573:DEBUG:acme.client:JWS payload: b'' 2024-02-01 02:29:08,579:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186209716: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzU0TTRqc181MEd2Um1jQ2p4eXp6SXNvc3h1YVdLNjVqLTBZZWZvbzNIcVZZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyMDk3MTYifQ", "signature": "Gj8ijdW-vwlxH4r74PzFj8jU75LcI53_L_Go55mPS1bkwWTzDsB4L1vB0nxOS3cGjLQkuglQmhoSeU3OcawndMqUVCOolMuNJNSrwfSBBipFUlOf2TEPSqsHV4p4JhRN1rlmOt2kXsrwoEmWTkS_GrlQv9n41B2fXAlOS3uo37K1FYhz6yIKTB4wPL-ykCJnYpMPvoBU-BJpmtWsfkyOpSbh936swSrUnyu8pXCxd0Kd9QCra6TxqAOrwHXZ54BuTugosrzUp8k1dKoHfeOVUMEtfNNkb6k7opMtxT0RNMxla5h-IxaAbnyhlJssmSaJnR1IZm7rBvQoojsl7GBy5Q", "payload": "" } 2024-02-01 02:29:08,766:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186209716 HTTP/1.1" 200 810 2024-02-01 02:29:08,766:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:29:06 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc5fXQUtt4DlMZ48U5gYgCjLcCWry-EJnFNKfUd0QDj6bQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:45:30Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/6f0kFQ", "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/TzPnqw", "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/f71chA", "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo" } ] } 2024-02-01 02:29:08,766:DEBUG:acme.client:Storing nonce: R3i4Vkc5fXQUtt4DlMZ48U5gYgCjLcCWry-EJnFNKfUd0QDj6bQ 2024-02-01 02:29:08,767:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-01 02:29:08,767:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-02-01 02:29:08,768:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-01 02:29:08,768:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-01 02:29:08,781:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-01 02:29:08,782:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-01 02:29:08,782:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-01 02:29:08,782:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-01 02:29:08,787:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-01 02:29:08,825:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-01 02:29:09,034:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-01 02:29:09,035:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-01 02:29:09,036:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-01 02:29:09,040:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:32 UTC. 2024-02-01 02:29:09,040:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-01 02:29:09,040:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-01 02:29:09,045:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-01 02:29:09,045:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-01 02:29:09,045:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-01 02:29:09,049:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-01 02:29:09,050:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-01 02:29:09,052:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-01 02:29:09,503:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-01 02:29:09,504:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:29:07 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "ZmW7Nz9c1vE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-01 02:29:09,504:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-01 02:29:13,138:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7273_key-certbot.pem 2024-02-01 02:29:16,710:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7271_csr-certbot.pem 2024-02-01 02:29:16,711:DEBUG:acme.client:Requesting fresh nonce 2024-02-01 02:29:16,711:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-01 02:29:16,873:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-01 02:29:16,873:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:29:14 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc5h3PILMBgJZ5qOljDD8FwygKVPV5qYPMDfOxHS2RmrIA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-01 02:29:16,873:DEBUG:acme.client:Storing nonce: R3i4Vkc5h3PILMBgJZ5qOljDD8FwygKVPV5qYPMDfOxHS2RmrIA 2024-02-01 02:29:16,874:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-02-01 02:29:16,879:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVoM1BJTE1CZ0paNXFPbGpERDhGd3lnS1ZQVjVxWVBNRGZPeEhTMlJtcklBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ky6LEgwuwpf_OTfePU51HDQMvla91Yw_xlMln0vh5N6FBapvrZH0q9NgEJV0SFK6-Sa283WHa5jjTSflN9jyPgs7OhjYKKNdDe-wnNgda_zXlLmRIXGUa0d6qRBB4OZrX-frHIISYy02_d0d_pkzUqbdHVWlvCJW_4BG1Flxh-zWfgAvRHYWVPUhOSKqkkdifGkTL6DeO_UIUnsCxhyKXnIuUUAjqwMXmc_ie-tdhv8hDtZ7OHY608Kc_URuGywoEM9ey7twaLFGRA_8E6FrGUhr3mHPb96yt4h9aVICMGQH9dR_uVx5upFqcprzxAcRlAQVKPv6osb77gOIQpMqWw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-01 02:29:17,064:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-02-01 02:29:17,065:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 01 Feb 2024 01:29:14 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463146186 Replay-Nonce: VKfU247YVLgM7JW9n9nU4T9RWLI6NGgk6s02GTmlPF4iqb6eFMo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:45:39Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186240836" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463146186" } 2024-02-01 02:29:17,066:DEBUG:acme.client:Storing nonce: VKfU247YVLgM7JW9n9nU4T9RWLI6NGgk6s02GTmlPF4iqb6eFMo 2024-02-01 02:29:17,066:DEBUG:acme.client:JWS payload: b'' 2024-02-01 02:29:17,080:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186240836: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lWTGdNN0pXOW45blU0VDlSV0xJNk5HZ2s2czAyR1RtbFBGNGlxYjZlRk1vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyNDA4MzYifQ", "signature": "aKrYQK30L0hvAI9xE9lpVemtsSuAsPhF_s2t6Xcdhd3sas6uFEDhX9FklTkfzbPTzKdtE1fa3RO_lITlaemRpruHBbU4-4SxA9mR7McBhZLL5fUGnFvwBOgWBdXJ281YlHdfryOOKMUJDV4UGy0EIR5wZbyr5QIitUgM6AP124QnwILkbNyI2c_oE44NDQL6r1RzBSbGEJqz2yjF8zPrz1zKrSOGVcsskhlyqyhcmHHL504D_S8yf9m2CjZpEcTBeZ-LlOoxH20OXluvWgI_xmYPvJ1r3vAEHc57sg_YAWOHYLuAy3FRCFRXNSjSYN4B2fy70rc0-0Gw8WRSAakr2w", "payload": "" } 2024-02-01 02:29:17,257:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186240836 HTTP/1.1" 200 804 2024-02-01 02:29:17,259:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:29:15 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YuP29kmGowR7RSftsfWGYUaaqmdWAWYknsik5qmAK2LU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:45:39Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/g8SMBA", "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/KdDipg", "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/N41DHw", "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I" } ] } 2024-02-01 02:29:17,259:DEBUG:acme.client:Storing nonce: VKfU247YuP29kmGowR7RSftsfWGYUaaqmdWAWYknsik5qmAK2LU 2024-02-01 02:29:17,260:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-01 02:29:17,260:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-02-01 02:29:17,261:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-01 02:29:17,262:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-01 02:29:17,263:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-01 02:29:17,264:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-01 02:29:17,264:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-01 02:29:17,265:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-01 02:29:17,265:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-01 02:29:17,314:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-01 02:29:17,536:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-01 02:29:17,537:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-01 02:29:17,538:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-01 02:29:17,542:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:49 UTC. 2024-02-01 02:29:17,542:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-01 02:29:17,543:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-01 02:29:17,547:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-01 02:29:17,548:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-01 02:29:17,548:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-01 02:29:17,552:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-01 02:29:17,553:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-01 02:29:17,555:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-01 02:29:18,105:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-01 02:29:18,106:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:29:15 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "4WedcDG4-ss": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-01 02:29:18,106:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-01 02:29:21,750:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7274_key-certbot.pem 2024-02-01 02:29:25,292:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7272_csr-certbot.pem 2024-02-01 02:29:25,293:DEBUG:acme.client:Requesting fresh nonce 2024-02-01 02:29:25,293:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-01 02:29:25,471:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-01 02:29:25,471:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:29:23 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCr0XoKmIdseEp1pGhBDicyKPLVcQu2C__rvkQH6jxiHE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-01 02:29:25,472:DEBUG:acme.client:Storing nonce: Wkq6jgLCr0XoKmIdseEp1pGhBDicyKPLVcQu2C__rvkQH6jxiHE 2024-02-01 02:29:25,472:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-02-01 02:29:25,479:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENyMFhvS21JZHNlRXAxcEdoQkRpY3lLUExWY1F1MkNfX3J2a1FINmp4aUhFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "X1Z_p7WpnxwFmkGze50KGXnl7SeKgKohMVCSMiSqgSjuaJn7ru3Cr2KKkkHzT4TLgiUB1Z-5UJ_5U7hGnu3lLdudhSWnB22py8qXD3v4UcS_qOCPVl5Yab5MC9embqs8udHGYsJeDGfQ0z_Rro8YJbNibH7xIjfXkSkWwkjgtW_P57KoTvtismxyDlnrKTYoML8afWF7L113zj79_Zx7sg3MpWEr8om3Kq56Rb_qi9oj2RucPVZYoNBnI1lC7EzVZ8ak5PiFtiVG-K2iiUnqYMIdlyJGpXhpc80PavwxWyCp8OB9eHdPrGiZC3NVo9-EsU3O1r3hosmXWc0qiu4wKQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-01 02:29:25,737:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-02-01 02:29:25,737:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 01 Feb 2024 01:29:23 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463167526 Replay-Nonce: Wkq6jgLCSTkDTdWqgL6HEycXZMVp-NL6aV9YQH_d1xxOXlrURNw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:45:48Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186273596" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463167526" } 2024-02-01 02:29:25,738:DEBUG:acme.client:Storing nonce: Wkq6jgLCSTkDTdWqgL6HEycXZMVp-NL6aV9YQH_d1xxOXlrURNw 2024-02-01 02:29:25,738:DEBUG:acme.client:JWS payload: b'' 2024-02-01 02:29:25,743:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186273596: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENTVGtEVGRXcWdMNkhFeWNYWk1WcC1OTDZhVjlZUUhfZDF4eE9YbHJVUk53IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyNzM1OTYifQ", "signature": "V18MwjiyUul631wwfd-hpBGQzTDiL37-zBpswrpe8HifQ8OGg1V8nEhqgkbi3hHybqYOrL3634pjW_nRksoV5QdaAOjDb8VXv_uXIRTE7Z1tdRJGDnW8DolXAJGGNzTk15ip_gpmsDNGLgdvrxG6sgnH_kIdV9ZbqwcSp2v647Xsmpok-jrURPmS63RNEIYTyoW8_eZoYRjjv22HJMwVcOwO906aGWKnJnwh5GQ4vLVTSTxhXTTWwnNsb6T27qMayVu8OHl_L2yUF_8uo-khxiAXGwW2NjvVlXrvCWKm0R-aEquFTfVkKbjPT0Hi_5wi9WELql9qWv7oxYsSyj-XcQ", "payload": "" } 2024-02-01 02:29:25,926:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186273596 HTTP/1.1" 200 807 2024-02-01 02:29:25,927:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:29:23 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCbUE3CtlPx_8k9px7YXLrmGHrdjwGl4y_1FVb4_mXcrA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:45:48Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/KNqRXQ", "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/KMda1w", "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/f-1bag", "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE" } ] } 2024-02-01 02:29:25,927:DEBUG:acme.client:Storing nonce: Wkq6jgLCbUE3CtlPx_8k9px7YXLrmGHrdjwGl4y_1FVb4_mXcrA 2024-02-01 02:29:25,927:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-01 02:29:25,928:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-02-01 02:29:25,928:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-01 02:29:25,928:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-01 02:29:25,929:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-01 02:29:25,929:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-01 02:29:25,930:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-01 02:29:25,930:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-01 02:29:25,931:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-01 02:29:25,971:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-01 02:29:26,191:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-01 02:29:26,193:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-01 02:29:26,195:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-01 02:29:26,202:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:03 UTC. 2024-02-01 02:29:26,202:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-01 02:29:26,203:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-01 02:29:26,207:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-01 02:29:26,208:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-01 02:29:26,208:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-01 02:29:26,212:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-01 02:29:26,213:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-01 02:29:26,215:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-01 02:29:26,745:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-01 02:29:26,746:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:29:24 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "UcR9S3h4OI8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-01 02:29:26,747:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-01 02:29:30,746:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7275_key-certbot.pem 2024-02-01 02:29:34,297:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7273_csr-certbot.pem 2024-02-01 02:29:34,298:DEBUG:acme.client:Requesting fresh nonce 2024-02-01 02:29:34,298:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-01 02:29:34,475:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-01 02:29:34,475:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:29:32 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCWZgaGkB6RuP_2DD_ZoONACEj00K5ilmvfT3lco2dx8Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-01 02:29:34,476:DEBUG:acme.client:Storing nonce: Wkq6jgLCWZgaGkB6RuP_2DD_ZoONACEj00K5ilmvfT3lco2dx8Q 2024-02-01 02:29:34,476:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-02-01 02:29:34,483:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENXWmdhR2tCNlJ1UF8yRERfWm9PTkFDRWowMEs1aWxtdmZUM2xjbzJkeDhRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "tvirX_4xi4QEMFkCDvbJNyGUfkSOCIWYGQ0-6fGcKU5s7g-Z-2E13W56UOwdbJ9vYt2_0Y9o1V6gv5tutrXhA6c2i9NJlV_v1OXycg5Wz8oTf_2WVLiAOzaPgsDRVEqGeWv1pG1hQ10dszhu_HF38lWjVpexYxNoCfBkD_s8PU6FN_HDOOTO3AOD5UCuUg9Q-XXQg8Hfe-zzR8fi2glcf8-TwgdKo621NAkl-aJurwVYVhJyO8pEgYTZwQ0TaKjRqi040NiL8UmIN3zxZvHv6ZyKXQtwJNQ_RaTDVvpvjzDSlp4KnHLYkoq2-uUko3pxilPoi-aNbFsLoXk_jY9HoA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-01 02:29:34,688:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-02-01 02:29:34,689:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 01 Feb 2024 01:29:32 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463187546 Replay-Nonce: Wkq6jgLClyxVNazgB0jTwjBXe-sXVL-rcIA1VW9QMQSRqXTFpXo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:45:58Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186305236" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463187546" } 2024-02-01 02:29:34,690:DEBUG:acme.client:Storing nonce: Wkq6jgLClyxVNazgB0jTwjBXe-sXVL-rcIA1VW9QMQSRqXTFpXo 2024-02-01 02:29:34,690:DEBUG:acme.client:JWS payload: b'' 2024-02-01 02:29:34,695:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186305236: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENseXhWTmF6Z0IwalR3akJYZS1zWFZMLXJjSUExVlc5UU1RU1JxWFRGcFhvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzMDUyMzYifQ", "signature": "jiJxhnNQWvnIXQr68MpUOHjMmjjFoS47DHremz7z6-4sbx8OElCkNd6lZ1lppAyg3vM7A7EKvt1BVfhPkRQjeF9U7zRGJYrXMNwtmkEbwL5bs1Zm0z9EQ6CIcJn_cYW2z6VUUC0vOfujai4EQT4LxEdq3mMooEZnV_X648UVgMQCLM3kGDnmbv8GBp3f15ZJi3yL448MXIrwUSffWvGYi4s3T7hvosM01JskVtC6FgFNFIUVUSjS5zCIhwLbaOlW42yB7JF1wU7q9Ej_E6kOeLIPmsBEllOCtYcKn8QZzmS1G9q-siLFRSkIxlb9vN6RoZYYeLAlStKrKEjngd7pHw", "payload": "" } 2024-02-01 02:29:34,891:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186305236 HTTP/1.1" 200 801 2024-02-01 02:29:34,893:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:29:32 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZFgpHS1DIqnRGX3WwvFESZFh4c1lzuZL5Uk9_OQs4k-Lo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:45:58Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/H-2NUg", "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/SPl0kw", "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/dBmW2A", "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY" } ] } 2024-02-01 02:29:34,893:DEBUG:acme.client:Storing nonce: fBfjtdZFgpHS1DIqnRGX3WwvFESZFh4c1lzuZL5Uk9_OQs4k-Lo 2024-02-01 02:29:34,894:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-01 02:29:34,895:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-02-01 02:29:34,895:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-01 02:29:34,896:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-01 02:29:34,897:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-01 02:29:34,898:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-01 02:29:34,898:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-01 02:29:34,899:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-01 02:29:34,900:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-01 02:29:34,958:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-01 02:29:35,151:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-01 02:29:35,153:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-01 02:29:35,153:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-01 02:29:35,161:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:20 UTC. 2024-02-01 02:29:35,161:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-01 02:29:35,162:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-01 02:29:35,166:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-01 02:29:35,167:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-01 02:29:35,167:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-01 02:29:35,171:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-01 02:29:35,172:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-01 02:29:35,174:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-01 02:29:35,715:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-01 02:29:35,716:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:29:33 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "YOEcNyh26k0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-01 02:29:35,717:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-01 02:29:39,331:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7276_key-certbot.pem 2024-02-01 02:29:42,894:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7274_csr-certbot.pem 2024-02-01 02:29:42,895:DEBUG:acme.client:Requesting fresh nonce 2024-02-01 02:29:42,895:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-01 02:29:43,079:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-01 02:29:43,080:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:29:40 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZFnYG23-4kmgqBGe8KqSaXIqfiabgcLxJMpzvgcynWhYA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-01 02:29:43,081:DEBUG:acme.client:Storing nonce: fBfjtdZFnYG23-4kmgqBGe8KqSaXIqfiabgcLxJMpzvgcynWhYA 2024-02-01 02:29:43,081:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-02-01 02:29:43,092:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZuWUcyMy00a21ncUJHZThLcVNhWElxZmlhYmdjTHhKTXB6dmdjeW5XaFlBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "FKPWddmO6WeB0xzb-RtL1jG9eicSpj8AjczTbzYMBOS5dCF48079HL-RbxOb8jxnL9XFMVTwuzPj_NwYAOwhokFKQn3T5z-vRW0MutLkvlKf-dSi85B8H7_68Cy7BVjzMUsrb_-VtBvYHM2amfKFZyDzd4puNsW-EIR2rWIUL91fp5IirrVjahGa73I8Z7vB80_hfAhjhhfbQBKoy29qKcDh1TG3AK-8hkfC5-2kDrU6E1ZqMKyasDVQqYnVgKVdfgGRMrWRWGUZe-Q1oIk0KSkSC81k2Tsa7929iS51ruhYymmBjkStncezXMjndHyvp0-NkaUVzxvrnnuHndrjtw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-01 02:29:43,287:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-01 02:29:43,287:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 01 Feb 2024 01:29:41 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463215876 Replay-Nonce: Wkq6jgLCS1wRLuHwilJCfheN16PFAESnfgZrZNFLLUdBqGKztJg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:07Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186343916" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463215876" } 2024-02-01 02:29:43,287:DEBUG:acme.client:Storing nonce: Wkq6jgLCS1wRLuHwilJCfheN16PFAESnfgZrZNFLLUdBqGKztJg 2024-02-01 02:29:43,288:DEBUG:acme.client:JWS payload: b'' 2024-02-01 02:29:43,292:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186343916: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENTMXdSTHVId2lsSkNmaGVOMTZQRkFFU25mZ1pyWk5GTExVZEJxR0t6dEpnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzNDM5MTYifQ", "signature": "uCgN1ZX5TV6DcBWaxeQviMmo00dgVIxVp9DMdhUL_L_66D4kYD-hN8pWgIlJ3knfQutYklCIyIIPBriFBjPo4266o5O-R6-0EJN4o_l_5oqXECCiWIcwNJAEtoK_vth56ui7dA80FKIOKSqXiGWvcdI7n4soHsP3GsX8Y05dOO_yH-qktftp3ig8MMRWAsvxgk3oB8szhtcTqTWqjTwuulu7zx_O-4c_3nOeW9HFWAyIHQF3A6JCL84nVpGWTgr2P7rPw8Z_rPlq0zJbt-3VNaSzVyu94u1hoNxuwa3yPTdfrtRAvGAhEwa4X6fMrBBKx0PsW1unCf9fiKL_Alnyaw", "payload": "" } 2024-02-01 02:29:43,478:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186343916 HTTP/1.1" 200 805 2024-02-01 02:29:43,479:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:29:41 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZFt00hJBGMTZgcfzZkKndF_yXgXcjlUKFv159E0wJvNAA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:07Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/FQmNLA", "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/nw3Heg", "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/o7wJkQ", "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE" } ] } 2024-02-01 02:29:43,479:DEBUG:acme.client:Storing nonce: fBfjtdZFt00hJBGMTZgcfzZkKndF_yXgXcjlUKFv159E0wJvNAA 2024-02-01 02:29:43,480:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-01 02:29:43,480:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-02-01 02:29:43,481:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-01 02:29:43,482:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-01 02:29:43,483:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-01 02:29:43,484:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-01 02:29:43,484:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-01 02:29:43,485:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-01 02:29:43,487:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-01 02:29:43,535:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-01 02:29:43,762:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-01 02:29:43,764:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-01 02:29:43,764:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-01 02:29:43,769:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:36 UTC. 2024-02-01 02:29:43,769:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-01 02:29:43,769:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-01 02:29:43,774:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-01 02:29:43,774:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-01 02:29:43,774:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-01 02:29:43,778:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-01 02:29:43,779:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-01 02:29:43,781:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-01 02:29:44,321:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-01 02:29:44,322:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:29:42 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "FvvLd5a0hs0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-01 02:29:44,322:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-01 02:29:48,111:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7277_key-certbot.pem 2024-02-01 02:29:51,680:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7275_csr-certbot.pem 2024-02-01 02:29:51,680:DEBUG:acme.client:Requesting fresh nonce 2024-02-01 02:29:51,680:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-01 02:29:51,861:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-01 02:29:51,863:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:29:49 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCG9ynRZx9m95g3u3eDUmV-7qxVdlHmyZURlTPwRvuEy4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-01 02:29:51,863:DEBUG:acme.client:Storing nonce: Wkq6jgLCG9ynRZx9m95g3u3eDUmV-7qxVdlHmyZURlTPwRvuEy4 2024-02-01 02:29:51,863:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-02-01 02:29:51,869:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENHOXluUlp4OW05NWczdTNlRFVtVi03cXhWZGxIbXlaVVJsVFB3UnZ1RXk0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "BDHqsuB3HUyBYz9TPB8Yc1PZhe5Yx0g9mcRfTXuvMgyqnVauDIszbpbeCLiKFoQZEeS-xH-xgkzSM2TsX9gTpGP-zI6UMtlNzD8eS5EmmgZyeki4NOY27klRTFEtqOOAGeg98OEsg1Wdgni2RnPriUEUeOks6_KHSJigy0CEb88L0LxecG5RqljvHApa8QePmN-ub5Lse6gTbo65g03ciPox0YOxGxq_QZLwkzvpL0BLe0W3TzCCnpjy0fNuUKVPQMwSlNBBBnVCvRN-w3pYMlflayJxeNJvBuxyk43Nb7f5nq_55WpGaW3ZRKfLRwFaxZ9-OsEPxA75OcYCC5PGvg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-01 02:29:52,059:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-02-01 02:29:52,060:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 01 Feb 2024 01:29:49 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463242076 Replay-Nonce: fBfjtdZFp7GCKTQejPJBiB8ueb8ROE71L3aADbFMPCaddyMuPU8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:16Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186384516" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463242076" } 2024-02-01 02:29:52,061:DEBUG:acme.client:Storing nonce: fBfjtdZFp7GCKTQejPJBiB8ueb8ROE71L3aADbFMPCaddyMuPU8 2024-02-01 02:29:52,061:DEBUG:acme.client:JWS payload: b'' 2024-02-01 02:29:52,073:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186384516: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZwN0dDS1RRZWpQSkJpQjh1ZWI4Uk9FNzFMM2FBRGJGTVBDYWRkeU11UFU4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzODQ1MTYifQ", "signature": "px9yMA0CiM4MZopp_J5b6UKDMqBIlkmFw_Y1Fn0R_wx8xVFbPeYHA-2Y5-kEQc2SzHudacRrOQ8vcEE7qVe0tpBhPruWv8s-1Jn6pwWqcSOEaJPGBvPqm9Eap_VpcZiGF7ckDl9i7aE0NBNhcEb8fiyqw1eHHsP7BlTx12gd1llg42nxhOIj6Mt2sF6xsq3LH2-ZYChdsgjl_ttgbemI8CEIIyX1xG9dLUV3ogc8d1iuggs7K1pm7Pn_NrYLWBb3PqjcULEsPwz59frIG5eMEOdPN2RdnwSDsijEiPoc7v6_dNJmYgjplUoyIycIyQbAHpb_EP1OliS4FIF8FDYrKQ", "payload": "" } 2024-02-01 02:29:52,271:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186384516 HTTP/1.1" 200 809 2024-02-01 02:29:52,271:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:29:50 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZFZRDRJRgd5fRHQA_Dy7YdIh-7SFeJNIJ1BJ-QSj-Jvz0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:16Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/iy166A", "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/FJ3duA", "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/0qWA8w", "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY" } ] } 2024-02-01 02:29:52,271:DEBUG:acme.client:Storing nonce: fBfjtdZFZRDRJRgd5fRHQA_Dy7YdIh-7SFeJNIJ1BJ-QSj-Jvz0 2024-02-01 02:29:52,272:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-01 02:29:52,272:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-02-01 02:29:52,273:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-01 02:29:52,273:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-01 02:29:52,274:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-01 02:29:52,274:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-01 02:29:52,274:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-01 02:29:52,274:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-01 02:29:52,275:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-01 02:29:52,312:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-01 02:29:52,494:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-01 02:29:52,497:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-01 02:29:52,498:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-01 02:29:52,507:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:50 UTC. 2024-02-01 02:29:52,508:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-01 02:29:52,508:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-01 02:29:52,513:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-01 02:29:52,513:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-01 02:29:52,513:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-01 02:29:52,517:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-01 02:29:52,518:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-01 02:29:52,520:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-01 02:29:52,979:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-01 02:29:52,979:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:29:50 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "CPw_rPivva8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-01 02:29:52,980:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-01 02:29:56,621:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7278_key-certbot.pem 2024-02-01 02:30:00,199:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7276_csr-certbot.pem 2024-02-01 02:30:00,200:DEBUG:acme.client:Requesting fresh nonce 2024-02-01 02:30:00,200:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-01 02:30:00,353:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-01 02:30:00,354:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:29:58 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YV0mo8mwGMxQNldL_SZq4vQCHwUVoewIuhc2iO7b8cl0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-01 02:30:00,354:DEBUG:acme.client:Storing nonce: VKfU247YV0mo8mwGMxQNldL_SZq4vQCHwUVoewIuhc2iO7b8cl0 2024-02-01 02:30:00,354:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-02-01 02:30:00,362:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lWMG1vOG13R014UU5sZExfU1pxNHZRQ0h3VVZvZXdJdWhjMmlPN2I4Y2wwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "oO-Ttb9CfSqxjPZzWWJe7T6J381mpeYo-M14ThyNY1b5LMnCRjBJniKFoJQVihZ6-5CtbmDy_G3520M3M5EBLZGRsgIpbIxMReTzjRwxV4-Ua2SwnOhTmQDMXy2cRABzhOaGKZHpMpumYVYcoE5FdxG3UomWgp0Z0FgCkp0ydi1kIItjUCeBb9w0Yt5ArJgeNusMWnzT3deeFnJcxXeG0ig10DJLBYg8RsW6fdjs6fd3NE3lled-mBrhhdxStNQkVbLoJ9K-UVRsjBgsJd_33aiqAxvspM5IOnVdIeay9rzcgheq-n37WsKAtkkVXB2BWDiSOhRguqVOkg4TbwdxqQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-01 02:30:00,527:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-02-01 02:30:00,528:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 01 Feb 2024 01:29:58 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463267436 Replay-Nonce: VKfU247YmV4871xIRKWDMA9X4NSt2s31MgczaaKwROsGQ3q296w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:25Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186423616" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463267436" } 2024-02-01 02:30:00,528:DEBUG:acme.client:Storing nonce: VKfU247YmV4871xIRKWDMA9X4NSt2s31MgczaaKwROsGQ3q296w 2024-02-01 02:30:00,528:DEBUG:acme.client:JWS payload: b'' 2024-02-01 02:30:00,534:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186423616: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1ltVjQ4NzF4SVJLV0RNQTlYNE5TdDJzMzFNZ2N6YWFLd1JPc0dRM3EyOTZ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY0MjM2MTYifQ", "signature": "cFhhRNYX9JO2ds8UNP5y_jgfYPndVcS31S6u5OSI5pOIbDFEQz6N5bj_FPs1jgOJbvGUebANp5pRcWHFOcVUjAonPt38y_qX25kWEqhPXNChhzbLniX6fy1Z_zjQ1ToSePGbuu_YWkP6Kosi4WfsvnjJCpPU_ppkpN2_d19f-NVkiwD6ElsnWxxrqhMMeXxXp6YBaR8x5L84GA4tYCB-PymBvtYqBNohLJubQOZt59m7w4wovr_WU0EqT_iJ30gp8rmdLpqUr-sWTW6Hb6suZNAq6CQBJ3wO4VwztX50QwRv30CW8nu6NRDUk3eBcNM4T5Sj8veYDCZ7yLqbJuREtA", "payload": "" } 2024-02-01 02:30:00,711:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186423616 HTTP/1.1" 200 806 2024-02-01 02:30:00,711:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:29:58 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc5j0MUvwcVJ3qx2JhCrhXKqn_LCNANdOdTki5o3lHd2so X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:25Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/sGt3LQ", "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/-siQUw", "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/rUgQOA", "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg" } ] } 2024-02-01 02:30:00,712:DEBUG:acme.client:Storing nonce: R3i4Vkc5j0MUvwcVJ3qx2JhCrhXKqn_LCNANdOdTki5o3lHd2so 2024-02-01 02:30:00,712:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-01 02:30:00,712:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-02-01 02:30:00,713:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-01 02:30:00,713:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-01 02:30:00,714:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-01 02:30:00,714:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-01 02:30:00,714:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-01 02:30:00,715:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-01 02:30:00,716:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-01 02:30:00,750:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-02-01 02:30:00,750:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-01 02:30:00,750:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-02-01 02:30:00,757:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-02-01 02:30:00,759:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-02-01 02:30:00,759:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-02-01 02:30:00,759:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-02-01 02:30:00,760:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-02-01 02:30:00,762:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-02-01 02:30:00,797:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-01 02:30:00,993:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-01 02:30:00,994:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-01 02:30:00,995:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-01 02:30:01,000:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:07 UTC. 2024-02-01 02:30:01,000:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-01 02:30:01,000:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-01 02:30:01,004:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-01 02:30:01,004:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-01 02:30:01,004:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-01 02:30:01,008:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-01 02:30:01,009:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-01 02:30:01,011:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-01 02:30:01,472:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-01 02:30:01,473:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:29:59 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "ITc163tgcxM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-01 02:30:01,474:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-01 02:30:05,195:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7279_key-certbot.pem 2024-02-01 02:30:08,756:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7277_csr-certbot.pem 2024-02-01 02:30:08,756:DEBUG:acme.client:Requesting fresh nonce 2024-02-01 02:30:08,757:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-01 02:30:08,908:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-01 02:30:08,909:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:30:06 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc5zEmwK3eflzeOMHO0pa7ZoRMFSl3JAR3oEtCqIP2fSD0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-01 02:30:08,910:DEBUG:acme.client:Storing nonce: R3i4Vkc5zEmwK3eflzeOMHO0pa7ZoRMFSl3JAR3oEtCqIP2fSD0 2024-02-01 02:30:08,910:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-02-01 02:30:08,921:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzV6RW13SzNlZmx6ZU9NSE8wcGE3Wm9STUZTbDNKQVIzb0V0Q3FJUDJmU0QwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "basSmA-jGMuQfzFTWHi_l2i2_MJIOr81fc11DX972vG0cd_wjc6lfZYBqW9CWsZAbIEhtopQLNLZQ6nDssH_f3rSGuY25NPtZPdJzVnSRQwwYz1TeR90HHc6SpAqHkMbIXDhlHJc6QTp8VhzNPCAav2DL4m24uJiQdB_Q3EQOnggo_DD-PSHM_zB4ky8ArJFN0cHvobuJOf3xbYmIs5WJTsNooUR0mNOXrC6OiX278iZW1zDXP9ujoa26JbTORPZN9c-0VgN3NGUS9jhpXQsl0E5LgcTntSIe1bT_H5tTNyisLT_zNVt4QIxMzzCJK_9s1qD2LfSxbUVaEX4ouH9CA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-01 02:30:09,091:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-02-01 02:30:09,092:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 01 Feb 2024 01:30:06 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463293726 Replay-Nonce: VKfU247YtUzVNGeYV8DF5qeWQ1SEgyTrP1pQdH61nzkriYF1LZU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:34Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186467546" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463293726" } 2024-02-01 02:30:09,093:DEBUG:acme.client:Storing nonce: VKfU247YtUzVNGeYV8DF5qeWQ1SEgyTrP1pQdH61nzkriYF1LZU 2024-02-01 02:30:09,093:DEBUG:acme.client:JWS payload: b'' 2024-02-01 02:30:09,102:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186467546: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1l0VXpWTkdlWVY4REY1cWVXUTFTRWd5VHJQMXBRZEg2MW56a3JpWUYxTFpVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY0Njc1NDYifQ", "signature": "uurIqdAVo-0jGfm0Op0KvLPwAfjOjNePqaq9nPlAQVzcO8kGEcD8rSJ8Y4xVpQlSW58bN-o8tMPQUvSy9wfV-ujrzyIVvCmVjaFUbu9whXM-6Cp3UHDlhZu-gmiC8oyPhK3hy8Fj-ZRrkRWxtLWEujUHR8YU7-RN-_TT9HpXYPCSlewsEFuDKwI5Yo2LLZ0pzmg_-skbeBXdse-LUH7G2Zf5KDPJb6pc4OJU-uXMaO_ycbCva5OFdptEf0Tl5PG94cLuPqw_WBaVcfO2je1ZZ8ThaniUfKRE1E-qdzW9tV2y2T7MrVMI60V48oV3f8HkI5nIesCOPzyHC6ikmG2M1w", "payload": "" } 2024-02-01 02:30:09,302:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186467546 HTTP/1.1" 200 811 2024-02-01 02:30:09,304:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:30:07 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc5BPAad-vobVN9slkKGgtWvHTcnNUmacyOep__BZ-Ltio X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:34Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/n-ZWjw", "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/NYrS2A", "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/g51OFg", "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU" } ] } 2024-02-01 02:30:09,304:DEBUG:acme.client:Storing nonce: R3i4Vkc5BPAad-vobVN9slkKGgtWvHTcnNUmacyOep__BZ-Ltio 2024-02-01 02:30:09,305:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-01 02:30:09,306:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-02-01 02:30:09,307:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-01 02:30:09,307:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-01 02:30:09,308:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-01 02:30:09,308:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-01 02:30:09,308:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-01 02:30:09,309:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-01 02:30:09,310:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-01 02:30:09,358:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-01 02:30:09,558:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-01 02:30:09,559:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-01 02:30:09,560:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-01 02:30:09,564:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:31 UTC. 2024-02-01 02:30:09,564:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-01 02:30:09,565:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-01 02:30:09,570:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-01 02:30:09,570:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-01 02:30:09,570:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-01 02:30:09,574:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-01 02:30:09,575:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-01 02:30:09,577:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-01 02:30:10,069:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-01 02:30:10,070:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:30:07 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "TcQiitP5ySM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-01 02:30:10,071:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-01 02:30:13,789:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7280_key-certbot.pem 2024-02-01 02:30:17,332:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7278_csr-certbot.pem 2024-02-01 02:30:17,333:DEBUG:acme.client:Requesting fresh nonce 2024-02-01 02:30:17,333:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-01 02:30:17,490:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-01 02:30:17,490:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:30:15 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247Y9DGKaempchEGDfp0ssmuqyUI0guYtU_EhKykbIr9vq0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-01 02:30:17,490:DEBUG:acme.client:Storing nonce: VKfU247Y9DGKaempchEGDfp0ssmuqyUI0guYtU_EhKykbIr9vq0 2024-02-01 02:30:17,493:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-02-01 02:30:17,498:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1k5REdLYWVtcGNoRUdEZnAwc3NtdXF5VUkwZ3VZdFVfRWhLeWtiSXI5dnEwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "PfGk44kFpgxbgaUUcdG9iW3H6KHDq3mh5d9f-IzYQPvH-VLB7FX7RFMAZGPAxm5D726-kChx6S0m9Crw_zNywKCo_i6QVhxfrtlfz5aGjphBm1cMGkkBTSQmomN4SFG2cE_cKsxZc8F6BIld9xtCVifekGwk45c7ufDg_CCYKdo0A02L7zWvL5ok8fChLk32ZQfeskdJbe0FlIqt3qEMne51jxrsj4mxip72LNA_AArhA3YN4mfIbR6buo6BRVzcU3DeH4Mnl5S1pZWN0udECvLTKvV95LxC0S0heGQkTLci6CDDdD8pn58lCWnO94aKUwLYDDIvmM71gbmorkwgHQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-02-01 02:30:17,663:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-02-01 02:30:17,664:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 01 Feb 2024 01:30:15 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463315236 Replay-Nonce: R3i4Vkc5h_XonXvMjZ9u6MM_Y_tRfdbN2ZXunJPuFjsMkFYhQg8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:43Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186500336" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463315236" } 2024-02-01 02:30:17,664:DEBUG:acme.client:Storing nonce: R3i4Vkc5h_XonXvMjZ9u6MM_Y_tRfdbN2ZXunJPuFjsMkFYhQg8 2024-02-01 02:30:17,664:DEBUG:acme.client:JWS payload: b'' 2024-02-01 02:30:17,670:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186500336: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVoX1hvblh2TWpaOXU2TU1fWV90UmZkYk4yWlh1bkpQdUZqc01rRlloUWc4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1MDAzMzYifQ", "signature": "c-za4PXCRp6H2841fS9VOnFg76_RrVEpwYnCorbFzpk0W5kvnxyxDB2G3N8U_6331i740f3JeQx8wfF5r7o2pme8fNtpHXjEzxAwsWNrFfTV34AGxLolazTMaCkMHjaOWyXYH0t4f7S0tUrk2wNBC5EUFQ48-61ZxD51Up2jShUdP3vpnihyJFPxeD-BDh3ZufDESsIbuRlHYyk97SetKj-nCeBf1hLyRC00VDtVFIRd0Bl-pE8MXeVAbRpbW-7Vd4ZqLaJ_j1orXOWeWaH4M2C1NF43YuiidfXyPrgBpGiLUIl9tIKHYP3CBBpzOt4_DA6lgUFsb95ugl8uQL1SuQ", "payload": "" } 2024-02-01 02:30:17,828:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186500336 HTTP/1.1" 200 810 2024-02-01 02:30:17,830:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:30:15 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc5EQ-tnD9ra5kS1hlA8nwNUnJteA9sZ9wQY1Yz1CGWujg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:43Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/MLFeSA", "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/NegWfw", "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/0vtuKQ", "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0" } ] } 2024-02-01 02:30:17,830:DEBUG:acme.client:Storing nonce: R3i4Vkc5EQ-tnD9ra5kS1hlA8nwNUnJteA9sZ9wQY1Yz1CGWujg 2024-02-01 02:30:17,831:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-01 02:30:17,832:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-02-01 02:30:17,833:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-01 02:30:17,834:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-01 02:30:17,835:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-01 02:30:17,836:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-01 02:30:17,836:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-01 02:30:17,837:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-01 02:30:17,839:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-01 02:30:17,886:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-01 02:30:18,091:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-01 02:30:18,093:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-02-01 02:30:18,095:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-02-01 02:30:18,101:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:09 UTC. 2024-02-01 02:30:18,101:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-01 02:30:18,102:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-01 02:30:18,106:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-01 02:30:18,107:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-01 02:30:18,107:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-01 02:30:18,111:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-01 02:30:18,112:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-01 02:30:18,114:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-01 02:30:18,663:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-01 02:30:18,664:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:30:16 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "VdQYdjrvhlU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-01 02:30:18,664:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-01 02:30:22,935:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7281_key-certbot.pem 2024-02-01 02:30:26,475:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7279_csr-certbot.pem 2024-02-01 02:30:26,475:DEBUG:acme.client:Requesting fresh nonce 2024-02-01 02:30:26,476:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-01 02:30:26,654:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-01 02:30:26,655:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:30:24 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCVDcccbXt4W-X0QCV9ewf6EkUItpOP3iUUj61AIJtbbs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-01 02:30:26,655:DEBUG:acme.client:Storing nonce: Wkq6jgLCVDcccbXt4W-X0QCV9ewf6EkUItpOP3iUUj61AIJtbbs 2024-02-01 02:30:26,655:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-02-01 02:30:26,662:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENWRGNjY2JYdDRXLVgwUUNWOWV3ZjZFa1VJdHBPUDNpVVVqNjFBSUp0YmJzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Jq9778Ra5J8VbV9EInkX1PuVu-gMoFeTY548Z3HlyqoaAcAJVmwQhZ-ywaZE8HJn7aJdUHUlCSNoMiZCA1tPy3onRI6q53jVGG32i-kELp-OfCKVu_irPWWxfoL26AtsBVRjJwlgQpC9Ukg8Lyt5gDeElNCBgjFVXzKRDHuF1b0ZZSAoUBZ-7ogIyu492UVyd3HXz3A2O06YZAPdF7K7cCRymcbYNb5_MKXQKWcEnM3rBgNU2TflUQJHMwE901UyzRsD1CrJ8O5LPFXR1wTnzb9TjSq7HTPBlmzZjISYlOxWPjUY9BiRW6mtmwMtXVxyZvqfzxPsoGLzfl7t8kfCmA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-02-01 02:30:26,852:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-02-01 02:30:26,853:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 01 Feb 2024 01:30:24 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463336576 Replay-Nonce: fBfjtdZFjjhTInOrkBGcCWmU9CNGfJ5HLnqOBGzIM8fYy36DUMo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:52Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186530456" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463336576" } 2024-02-01 02:30:26,853:DEBUG:acme.client:Storing nonce: fBfjtdZFjjhTInOrkBGcCWmU9CNGfJ5HLnqOBGzIM8fYy36DUMo 2024-02-01 02:30:26,853:DEBUG:acme.client:JWS payload: b'' 2024-02-01 02:30:26,860:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186530456: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZqamhUSW5PcmtCR2NDV21VOUNOR2ZKNUhMbnFPQkd6SU04Zll5MzZEVU1vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1MzA0NTYifQ", "signature": "Oq5s2G5L4mkdZvq5FXzs3IrjkT7EMlgHakqjeHPtWOb3DQe3JA1fgCFrE9_8ExKARJgCIpUFPVKxJCQtise4-i4kz_yYtWK7wSQue-LeoJNHec0UnKIUrgYp-mYAtiALjkBvcruXMy1I2ezuM6FEqbNyYiJ7uZW0uDJy000c_WTKJAB7PI_f2bDs6XrX9HEIaqynWCjPdsyEUkZ2uGwhRFLIfbVB2aHV5hl2EkyOI57rhxV5KV1UzDfkbcbzrWwtnHCTubAOJvNO2V5-V5nQky2ZdVNP5x0hCuW4DDhkGJgX1uqyTPqJY1RrtvtxQ2HtMtj_8pcT5fHXOGCglyh0Fw", "payload": "" } 2024-02-01 02:30:27,071:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186530456 HTTP/1.1" 200 809 2024-02-01 02:30:27,072:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:30:24 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZFZ58JOcO4Y5lxZEqBI0mfQEnbK_VB_H9JPqE8PPq8470 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:52Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/ibbbOA", "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/W42erg", "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/xDGKCQ", "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI" } ] } 2024-02-01 02:30:27,072:DEBUG:acme.client:Storing nonce: fBfjtdZFZ58JOcO4Y5lxZEqBI0mfQEnbK_VB_H9JPqE8PPq8470 2024-02-01 02:30:27,073:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-01 02:30:27,074:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-02-01 02:30:27,075:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-01 02:30:27,075:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-01 02:30:27,077:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-01 02:30:27,077:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-01 02:30:27,077:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-01 02:30:27,078:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-01 02:30:27,080:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-01 02:30:27,130:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-01 02:30:27,302:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-01 02:30:27,303:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is signed by the certificate's issuer. 2024-02-01 02:30:27,304:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD 2024-02-01 02:30:27,308:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:26 UTC. 2024-02-01 02:30:27,308:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-01 02:30:27,308:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-01 02:30:27,313:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-01 02:30:27,313:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-01 02:30:27,313:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-01 02:30:27,318:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-01 02:30:27,318:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-01 02:30:27,320:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-01 02:30:27,850:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-01 02:30:27,850:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:30:25 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "3_IT10I3kzM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-01 02:30:27,851:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-01 02:30:31,497:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7282_key-certbot.pem 2024-02-01 02:30:35,053:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7280_csr-certbot.pem 2024-02-01 02:30:35,053:DEBUG:acme.client:Requesting fresh nonce 2024-02-01 02:30:35,054:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-01 02:30:35,231:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-01 02:30:35,232:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:30:33 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZFmwTT7zB-WH9nMUKj8ifDVl9c7rTUFDLO097sCuoREP8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-01 02:30:35,233:DEBUG:acme.client:Storing nonce: fBfjtdZFmwTT7zB-WH9nMUKj8ifDVl9c7rTUFDLO097sCuoREP8 2024-02-01 02:30:35,233:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-02-01 02:30:35,246:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZtd1RUN3pCLVdIOW5NVUtqOGlmRFZsOWM3clRVRkRMTzA5N3NDdW9SRVA4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "eJV4X1XVhbEkC2F4SJy5LWkcbKUen85O1kERGdgPnaNuaiCClanFVihWClXjnLfYlsj0qj5lCblTYmVwwNbpBhTe5qYP24J7Kqp00clU4OgBSagrNZ2juUNsq1KTpYlsrFUKBnO6EWTR4KSrEvdNvE6ZFVq7X2bvPor93D00a42-D9VaXlks5dawPQWaswFR0FiH0ZC5UJ-GBH42FgvoCOLNhSUmeqL44PZ2tKBGg6GDXiF2uM5jCuZRR5lgMscIfRPTFaYG5KZwj7Fd0wgFPv72HyRPFrnsY6ZyR4mM154Lb_AQjPUBEh1AJPUITDVW9N5qZPvxP9iu7PLbKoQY-Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-01 02:30:35,433:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-01 02:30:35,434:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 01 Feb 2024 01:30:33 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463357966 Replay-Nonce: fBfjtdZFP9LpF4BT9ryT3Pjr5JCr1kvLDRBLPmcf6yYiODqzmGY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:47:01Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186562236" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463357966" } 2024-02-01 02:30:35,434:DEBUG:acme.client:Storing nonce: fBfjtdZFP9LpF4BT9ryT3Pjr5JCr1kvLDRBLPmcf6yYiODqzmGY 2024-02-01 02:30:35,434:DEBUG:acme.client:JWS payload: b'' 2024-02-01 02:30:35,439:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186562236: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZQOUxwRjRCVDlyeVQzUGpyNUpDcjFrdkxEUkJMUG1jZjZ5WWlPRHF6bUdZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1NjIyMzYifQ", "signature": "Dyuhifg7NfEbHkXR-ldZcx28rPQ_ZiOMbkbXOZLV5jL0R1LB2CBpGTK5d8PSERVDLROczki484rGef0jMSZBSfImy02SHcegwqctOPPMR-hGlsYqnXCV_SKdXCFIAiGQExARIqbjAiHU5DlWwe1QbdcfSnzTIjjpeaybWbTsz5mjVJHljGxgDZT7nCr7YNS88E_DDmVMZ96sMjZvrdEur00xFDA4FaaD3Nn9zEJZFx2P_r6rqj_9nNY4ASMJiR59qdUavge2q74oLDgNQb6T-QlPxBdVLbms7Tvs2-bbJmBE-Q33lFyRFm00ScJFufOqHE5p0T_Od6smMCthGcU_lg", "payload": "" } 2024-02-01 02:30:35,621:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186562236 HTTP/1.1" 200 805 2024-02-01 02:30:35,621:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:30:33 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZFcfEox9Ts3d7ZpzIVPIzun3kXbn08RrHlSRnif5doS70 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:47:01Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/d2C2Aw", "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/yk_m2Q", "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/2CxhFQ", "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE" } ] } 2024-02-01 02:30:35,621:DEBUG:acme.client:Storing nonce: fBfjtdZFcfEox9Ts3d7ZpzIVPIzun3kXbn08RrHlSRnif5doS70 2024-02-01 02:30:35,622:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-01 02:30:35,622:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-02-01 02:30:35,623:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-01 02:30:35,623:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-01 02:30:35,624:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-01 02:30:35,624:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-01 02:30:35,625:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-01 02:30:35,625:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-01 02:30:35,626:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-01 02:30:35,671:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-01 02:30:35,896:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-01 02:30:35,897:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-02-01 02:30:35,898:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-02-01 02:30:35,902:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:43 UTC. 2024-02-01 02:30:35,902:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-01 02:30:35,902:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-01 02:30:35,908:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-01 02:30:35,909:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-01 02:30:35,909:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-01 02:30:35,913:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-01 02:30:35,914:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-01 02:30:35,916:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-01 02:30:36,446:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-01 02:30:36,447:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:30:34 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "WI-8Vclg_YM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-01 02:30:36,448:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-01 02:30:40,027:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7283_key-certbot.pem 2024-02-01 02:30:43,596:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7281_csr-certbot.pem 2024-02-01 02:30:43,597:DEBUG:acme.client:Requesting fresh nonce 2024-02-01 02:30:43,597:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-01 02:30:43,774:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-01 02:30:43,774:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:30:41 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZFPlIlmAjzsK6evEWFBIJuxFTCVyuLvtHN2GyTS8amfEs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-01 02:30:43,775:DEBUG:acme.client:Storing nonce: fBfjtdZFPlIlmAjzsK6evEWFBIJuxFTCVyuLvtHN2GyTS8amfEs 2024-02-01 02:30:43,775:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-02-01 02:30:43,783:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZQbElsbUFqenNLNmV2RVdGQklKdXhGVENWeXVMdnRITjJHeVRTOGFtZkVzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "pxkqHw8VP4REMfxb7Kv2TEvCKS3RuDWGRjgOP6ok0f8-cEfbDQZ0ns-BE-LWXLcr5z19K4YidXHiZRctRo-nWaagUpz9esq5yr1EEcQBrINjbwogoAUpmJvktjJVar6iLaw7qHxg7uvXa26xO8tRKJ7mZMBTzBi-ESvH_NwPQP-BPFSvKBLJQPgluB0OswvOECGasihUNuTfLL0vCM_LhNllXDniMrxI3NX_5te172YWPaJR-N1UXDf8lLt96bvXoPx2vxuGs9NzwTTDRinmUG3uCY6LcA33eyVXPnlkLRoijEEiJH1wxpNm3KAzUkIxBrCAoGVltw5A3kZYuWzHAQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-01 02:30:43,975:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-01 02:30:43,976:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 01 Feb 2024 01:30:41 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463390816 Replay-Nonce: Wkq6jgLCNFxGDBYGyZ4SWwZrxRzZJt4BqzISekw_N3r2cQhQsiw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:47:11Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186609606" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463390816" } 2024-02-01 02:30:43,977:DEBUG:acme.client:Storing nonce: Wkq6jgLCNFxGDBYGyZ4SWwZrxRzZJt4BqzISekw_N3r2cQhQsiw 2024-02-01 02:30:43,977:DEBUG:acme.client:JWS payload: b'' 2024-02-01 02:30:43,990:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186609606: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENORnhHREJZR3laNFNXd1pyeFJ6Wkp0NEJxeklTZWt3X04zcjJjUWhRc2l3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY2MDk2MDYifQ", "signature": "bWg49ei78u58-Wb0xz4NP5tRyTvTZVipHpIZGbOCMhNTRVBqvfO8EIk8ebdF8wmrONG6HbC-8v_omBsUVjklD5XkAc33Athb_frrV_oN6pDFWTY7OuNuCX8HHkKSTl7IIpAoAYOQnDtjrxPX_YA7TO3D98_-T_aApQdGhO5mm8SK6Bzc6joJpbJPp9w3DgPQTTrm_M6QuYnH5WgCIlZdwS14P2tPJy8FNkXRipOV3H9XPZ0Tty5X1dWBSeaQWQcTiww5LcwMnvQIcV0Og0bKw1bLnEmf4rPkAgjCMV6Cp2laOzRFKVfpEn6XUZZAS39DDpGRNKaYQ8ZcOaLzKb3IoQ", "payload": "" } 2024-02-01 02:30:44,171:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186609606 HTTP/1.1" 200 805 2024-02-01 02:30:44,171:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:30:41 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCDcUhLEdVnJSfigOsHv6BzIjB90Aqu5Ur2NCI9dXLp5A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:47:11Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/u86J_A", "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/GMvoKw", "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/skcDcA", "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA" } ] } 2024-02-01 02:30:44,172:DEBUG:acme.client:Storing nonce: Wkq6jgLCDcUhLEdVnJSfigOsHv6BzIjB90Aqu5Ur2NCI9dXLp5A 2024-02-01 02:30:44,172:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-01 02:30:44,173:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-02-01 02:30:44,173:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-01 02:30:44,173:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-01 02:30:44,174:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-01 02:30:44,174:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-01 02:30:44,174:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-01 02:30:44,175:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-01 02:30:44,176:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-01 02:30:44,223:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-02-01 02:30:44,409:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-02-01 02:30:44,411:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-02-01 02:30:44,411:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-02-01 02:30:44,416:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:40:02 UTC. 2024-02-01 02:30:44,416:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-02-01 02:30:44,417:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-02-01 02:30:44,422:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-02-01 02:30:44,422:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-02-01 02:30:44,422:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-02-01 02:30:44,427:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-02-01 02:30:44,428:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-02-01 02:30:44,430:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-02-01 02:30:44,876:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-02-01 02:30:44,878:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:30:42 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "6K5uubDjqho": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-02-01 02:30:44,879:INFO:certbot._internal.main:Renewing an existing certificate 2024-02-01 02:30:48,578:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7284_key-certbot.pem 2024-02-01 02:30:52,133:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7282_csr-certbot.pem 2024-02-01 02:30:52,134:DEBUG:acme.client:Requesting fresh nonce 2024-02-01 02:30:52,134:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-02-01 02:30:52,286:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-02-01 02:30:52,287:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:30:50 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YzgSdnl3lRvTKVQj7HfxvGzh85piwUEXZe-PyMV0YV0E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-02-01 02:30:52,287:DEBUG:acme.client:Storing nonce: VKfU247YzgSdnl3lRvTKVQj7HfxvGzh85piwUEXZe-PyMV0YV0E 2024-02-01 02:30:52,287:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-02-01 02:30:52,292:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1l6Z1NkbmwzbFJ2VEtWUWo3SGZ4dkd6aDg1cGl3VUVYWmUtUHlNVjBZVjBFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "NkeLJ4-2Dn9lHhAznjU6JKSCELH6vZpVHwMmeUpO5UBHmxw8I8sZLTKKTtOE1BH_4X6SJ2El3i2AiWwBmlAMF7mrTAti4_Ez704c5nRPpGRPu4mmZd3P67wjQxGemPzGy9jWAaOpdudULxCPmF-PpdX2kE0DUS2ugin2GsmlUJswNA1X2vmd4rwwahMsdwBtRA1fQOsrWUYP1WnKVEM7x9mZAft71x_S4LdNQSm6KWWdzgZdfN8sEGyrTIL8394ZrHhB_9Z253h-MQ0SGxfSBPCQyBtVnuBxnLo_vI60aXfaHfPaxdh4Ca8eOTUiBTKBXqcGjFsK2YOBQfvOBdq3YA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-02-01 02:30:52,470:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-02-01 02:30:52,471:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 01 Feb 2024 01:30:50 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463415626 Replay-Nonce: R3i4Vkc5ORXMGjBfBc_YxzCV9hwe_4HBJGFdq5dzL81Eyy09G_A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:47:20Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186648386" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463415626" } 2024-02-01 02:30:52,472:DEBUG:acme.client:Storing nonce: R3i4Vkc5ORXMGjBfBc_YxzCV9hwe_4HBJGFdq5dzL81Eyy09G_A 2024-02-01 02:30:52,472:DEBUG:acme.client:JWS payload: b'' 2024-02-01 02:30:52,482:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186648386: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVPUlhNR2pCZkJjX1l4ekNWOWh3ZV80SEJKR0ZkcTVkekw4MUV5eTA5R19BIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY2NDgzODYifQ", "signature": "bUt49j8Yt-7hltz86_O1-QbpnZ5yez85I60JJwHIv7dNGJhhCU3Jq5ohVw_QhJJijWNBakjJRyuZ2lTYzcIOv0d2nAp1-j3tBJQplWSuyrjFCzA_-jjjV058aN83v8cvERDC6xfvKB0F2JU15FCPdkV_0yTC-M6rUk9InnU2NBaYvNKmQRuDatafbeIIwXIy3JpPjs4leJxwNfUIqfCR8Cw6KkR_c6tGlYk72lMpWykFpSp4E9TTIzMKjpNxikdn4AXsAjubAh6ONFFTNo61R0anWpewitCqIp_aG2-_1ON8v5RGX2RzAlypQ9O9Yc7bRkgxRe0q97Ac8ZcIIKS26g", "payload": "" } 2024-02-01 02:30:52,646:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186648386 HTTP/1.1" 200 805 2024-02-01 02:30:52,646:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 01 Feb 2024 01:30:50 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YBHHMSyrkHUF26cCDkLMbSj8EsxzY1Or4ptYdpg-BoDI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:47:20Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/AfqDTw", "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/2qup_g", "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/cLgsJg", "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE" } ] } 2024-02-01 02:30:52,646:DEBUG:acme.client:Storing nonce: VKfU247YBHHMSyrkHUF26cCDkLMbSj8EsxzY1Or4ptYdpg-BoDI 2024-02-01 02:30:52,647:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-02-01 02:30:52,647:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-02-01 02:30:52,648:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-02-01 02:30:52,648:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-02-01 02:30:52,649:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-01 02:30:52,649:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-02-01 02:30:52,649:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-02-01 02:30:52,649:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-02-01 02:30:52,651:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-02-01 02:30:52,651:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-02-01 02:30:52,651:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-02-01 02:30:52,652:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-02-01 02:30:52,653:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)