2024-01-31 20:14:51,513:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-01-31 20:14:51,514:DEBUG:certbot._internal.main:Arguments: [] 2024-01-31 20:14:51,514:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-01-31 20:14:52,327:DEBUG:certbot._internal.log:Root logging level set at 20 2024-01-31 20:14:52,327:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-01-31 20:14:52,365:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-01-31 20:14:52,404:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-31 20:14:52,596:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-31 20:14:52,598:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is signed by the certificate's issuer. 2024-01-31 20:14:52,614:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is: OCSPCertStatus.GOOD 2024-01-31 20:14:52,625:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:15 UTC. 2024-01-31 20:14:52,625:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-31 20:14:52,625:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-31 20:14:52,630:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-31 20:14:52,631:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-31 20:14:52,631:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-31 20:14:52,637:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-31 20:14:52,638:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-31 20:14:52,640:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-31 20:14:53,226:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-31 20:14:53,227:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:14:51 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Kh-qCYbN6Fk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-31 20:14:53,227:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-31 20:14:57,793:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7259_key-certbot.pem 2024-01-31 20:15:01,903:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7257_csr-certbot.pem 2024-01-31 20:15:01,903:DEBUG:acme.client:Requesting fresh nonce 2024-01-31 20:15:01,904:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-31 20:15:02,087:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-31 20:15:02,087:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:15:00 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCiK6-kfNFBRwbn233-twpIgnnV5eJ-z3v9sm1Co7qaUU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-31 20:15:02,087:DEBUG:acme.client:Storing nonce: Wkq6jgLCiK6-kfNFBRwbn233-twpIgnnV5eJ-z3v9sm1Co7qaUU 2024-01-31 20:15:02,088:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-01-31 20:15:02,095:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENpSzYta2ZORkJSd2JuMjMzLXR3cElnbm5WNWVKLXozdjlzbTFDbzdxYVVVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "BCSXNfsy2dLbXQzo-oLKgcOt9dQEArNIjCNjQzelw5-MqQbfEsbTuYO_nFscwERyx9JSGRcQuznkJ3SFD7xJ7U44A-hzBzPHek7V2KXFF7oZl_fQ_nmbKElNvdZY0j-T-8xej0ca6ulhbpY5V1oiAe1GrJKypI3p8VmxEjy8YMLGBinCNi37N6WY7f9TwjjtufVVhg0FLvqQiC8KflpTrMwPMKubsj_CcbRPQXNEqUAAVgPztxe1uYTyucXSxDOB4-SPUZGWB7t0lqmhOGmPOB0KFzHVcxa9ZxA_D1mFFou1akQEzZm-sFdS9isN_drHKhDuKnIHH-24WPtbvrN-4w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-01-31 20:15:02,288:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-01-31 20:15:02,289:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 31 Jan 2024 19:15:00 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463125096 Replay-Nonce: fBfjtdZFIxEAXQar9aNhmQ2anKJbuPSYtmZYgDds9DJbGGasyOA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:45:30Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186209716" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463125096" } 2024-01-31 20:15:02,289:DEBUG:acme.client:Storing nonce: fBfjtdZFIxEAXQar9aNhmQ2anKJbuPSYtmZYgDds9DJbGGasyOA 2024-01-31 20:15:02,289:DEBUG:acme.client:JWS payload: b'' 2024-01-31 20:15:02,297:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186209716: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZJeEVBWFFhcjlhTmhtUTJhbktKYnVQU1l0bVpZZ0RkczlESmJHR2FzeU9BIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyMDk3MTYifQ", "signature": "qftzqYVVm1fy7Tw6M9rUX0-wRuwLt6g3_oQJLPXsizp2a4b51HylWvnPWbTkTkbzQLTbG5j7QuvIkV9xqs6xXBWRN4InI0KwjlDI49bRnKY0EymqdSCn1fYmU_jJbWYR04VT0BXwY3Q6sXBNW9P1CzAPcWXhEV07fd_lJn0O6brqxWAi3HDr6WPJ1CDZNvpCNn37c3h_2Uze8FlCkP6kl_8uaIOTpxlGsnh8gYa4jw9FzK-2TyykkVhQoKWA7w6Lc0PWLtT6oNFerZfIFwhw9_eITZSIz2-UFSakw94i3RONkwEZuw78h4wtkcIlIoKOECxKgpxzbU5QSPBouJbi1Q", "payload": "" } 2024-01-31 20:15:02,481:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186209716 HTTP/1.1" 200 810 2024-01-31 20:15:02,482:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:15:00 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZFjBK_VVh3iol0YzVFT3peR1IbY0WVSFvezLbPgeuBVVY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:45:30Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/6f0kFQ", "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/TzPnqw", "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/f71chA", "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo" } ] } 2024-01-31 20:15:02,482:DEBUG:acme.client:Storing nonce: fBfjtdZFjBK_VVh3iol0YzVFT3peR1IbY0WVSFvezLbPgeuBVVY 2024-01-31 20:15:02,483:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-31 20:15:02,483:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-01-31 20:15:02,484:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-31 20:15:02,484:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-31 20:15:02,488:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-31 20:15:02,489:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-31 20:15:02,489:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-31 20:15:02,489:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-31 20:15:02,508:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-31 20:15:02,550:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-31 20:15:02,742:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-31 20:15:02,743:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-31 20:15:02,744:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-31 20:15:02,748:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:32 UTC. 2024-01-31 20:15:02,748:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-31 20:15:02,748:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-31 20:15:02,753:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-31 20:15:02,753:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-31 20:15:02,753:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-31 20:15:02,758:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-31 20:15:02,759:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-31 20:15:02,761:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-31 20:15:03,318:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-31 20:15:03,319:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:15:01 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "PglhDqtHEG8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-31 20:15:03,319:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-31 20:15:07,518:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7260_key-certbot.pem 2024-01-31 20:15:11,150:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7258_csr-certbot.pem 2024-01-31 20:15:11,150:DEBUG:acme.client:Requesting fresh nonce 2024-01-31 20:15:11,151:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-31 20:15:11,345:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-31 20:15:11,345:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:15:09 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZFkgKzNyLWN4nfhfkhYOyIY56Ke4QgnnpgG5xQ6sYOFcc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-31 20:15:11,346:DEBUG:acme.client:Storing nonce: fBfjtdZFkgKzNyLWN4nfhfkhYOyIY56Ke4QgnnpgG5xQ6sYOFcc 2024-01-31 20:15:11,346:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-01-31 20:15:11,352:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZrZ0t6TnlMV040bmZoZmtoWU95SVk1NktlNFFnbm5wZ0c1eFE2c1lPRmNjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "so7Jkzg6VtCilVCQOsRXfOuy_xGpReiireVEL8E3wK8osZWEcipHUCReRaM56W9KsHKvpg16PrUjty4azvoRJQ25uQrbDY793lPWOO55BQmbIlY2gotM4Ja4L3_NV3hcB7_Ts3pGEKd_V6iJX_HaM-rYye9vxeezXrXt3g6rKo3vNxv5A0fTc5ILQgzqfNNPbeUzgzKwTCUNMqwlTz0zK5XpW3_-t5O59V6d-YQEbK4yEJMjYy9p_yyfNxrutouvE_-8r1MIhV1ZVbXyVR7PkGYD-lqWmEZecl-ll7RtgxnpwJSCAHYRVh7UZj8QT3leTkXUZlUxUiK-R3EK8-DJ0g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-01-31 20:15:11,560:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-01-31 20:15:11,560:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 31 Jan 2024 19:15:09 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463146186 Replay-Nonce: fBfjtdZFdGJkpAj8qBvBWQhhwKIqdUm3ee7G2HH3q9VA0DAePGU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:45:39Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186240836" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463146186" } 2024-01-31 20:15:11,560:DEBUG:acme.client:Storing nonce: fBfjtdZFdGJkpAj8qBvBWQhhwKIqdUm3ee7G2HH3q9VA0DAePGU 2024-01-31 20:15:11,561:DEBUG:acme.client:JWS payload: b'' 2024-01-31 20:15:11,566:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186240836: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZkR0prcEFqOHFCdkJXUWhod0tJcWRVbTNlZTdHMkhIM3E5VkEwREFlUEdVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyNDA4MzYifQ", "signature": "Yg_n51pqyswI7tjCzrpmbN5pntLv7GSO1u5xqknGPw3CnMm5BIOF0EhE9Tj09v8D5Nii8ZZKfj4m8RNBmKbJ8Er_SFa0lysC7GgsaNkGRaYledcg-IO4VDe48yuR_Tuzst9afPz5o6OvupIGMd4M7ZeoosW3_ka64mOR2Kr_yufO9tjhcx9ZaLT08o952xH1vFDQx6qh95bczQd5tOM51EoeOj7Oy3dYbMiv4oLETQtmmX9q3tc9_TipOpRFZ0ykBD9mliGB6xlOiOSYD-2eGy8ib9994YbYfYdcmiNFQnTSX1WLujnjthIV0H_bT1ghOohrnx5yQlI3iWQiGpzjFQ", "payload": "" } 2024-01-31 20:15:11,748:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186240836 HTTP/1.1" 200 804 2024-01-31 20:15:11,749:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:15:09 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCR9XBEkZC3YxXNOm6z2lyjLxmleEvM1b_6Tt7nPPPgcs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:45:39Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/g8SMBA", "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/KdDipg", "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/N41DHw", "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I" } ] } 2024-01-31 20:15:11,749:DEBUG:acme.client:Storing nonce: Wkq6jgLCR9XBEkZC3YxXNOm6z2lyjLxmleEvM1b_6Tt7nPPPgcs 2024-01-31 20:15:11,750:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-31 20:15:11,750:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-01-31 20:15:11,750:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-31 20:15:11,751:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-31 20:15:11,751:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-31 20:15:11,751:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-31 20:15:11,751:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-31 20:15:11,752:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-31 20:15:11,753:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-31 20:15:11,793:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-31 20:15:12,027:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-31 20:15:12,028:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-01-31 20:15:12,029:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-01-31 20:15:12,034:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:49 UTC. 2024-01-31 20:15:12,035:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-31 20:15:12,035:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-31 20:15:12,039:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-31 20:15:12,039:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-31 20:15:12,039:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-31 20:15:12,055:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-31 20:15:12,055:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-31 20:15:12,057:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-31 20:15:12,513:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-31 20:15:12,514:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:15:10 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "-pphf20B3bw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-31 20:15:12,514:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-31 20:15:16,847:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7261_key-certbot.pem 2024-01-31 20:15:20,744:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7259_csr-certbot.pem 2024-01-31 20:15:20,745:DEBUG:acme.client:Requesting fresh nonce 2024-01-31 20:15:20,745:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-31 20:15:20,918:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-31 20:15:20,918:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:15:18 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc5V1WywlApushp8XM53037yBHmyn7fauOz8tPWEGjcHrg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-31 20:15:20,919:DEBUG:acme.client:Storing nonce: R3i4Vkc5V1WywlApushp8XM53037yBHmyn7fauOz8tPWEGjcHrg 2024-01-31 20:15:20,919:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-01-31 20:15:20,924:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVWMVd5d2xBcHVzaHA4WE01MzAzN3lCSG15bjdmYXVPejh0UFdFR2pjSHJnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "t2OeeTiR5Kv5u-S-8aaPUzdAmnwG5Hmx6gtxzDLI5QBwxsEiuOlT2Eaza8vFURNw7YKFbk-8G18oqSFZSIpYIoHJWxVrZWG5Fpo41Cc7RxVFSJPFRJJfCZMfTECQZAwGOK31-iNvtzYmYBE2qAmG5W7IEzYtDYtB62VTIFEwkQMftZkuznYfvi_NdUhMvQAInM9Psx0m2cBmieWI7a9HJrMnbpVPXhn1-dE6-IBVwzuNLg5T8uxseuyEdchIkkmWcIFkGRTQbgJjBwQQhJVQEAqzm56bDI86XS_klWG_zY_tx0Fr6dNLCTGN6xGiZn2WFcNHGolib-I5MRkEXg9Y6g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-01-31 20:15:21,092:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-01-31 20:15:21,092:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 31 Jan 2024 19:15:19 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463167526 Replay-Nonce: VKfU247YZ5bqzkuUKMpeD3G_t3TEya-16WGy7nRN979BV6Y1t2I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:45:48Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186273596" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463167526" } 2024-01-31 20:15:21,093:DEBUG:acme.client:Storing nonce: VKfU247YZ5bqzkuUKMpeD3G_t3TEya-16WGy7nRN979BV6Y1t2I 2024-01-31 20:15:21,093:DEBUG:acme.client:JWS payload: b'' 2024-01-31 20:15:21,101:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186273596: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1laNWJxemt1VUtNcGVEM0dfdDNURXlhLTE2V0d5N25STjk3OUJWNlkxdDJJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyNzM1OTYifQ", "signature": "s0je-6hZmMzULcgHgZau6vpciojng7G9Gpqsdn9UkgJA5yiaEHmrUCQA98TxxdVZxiDTD0Sv5UffIvXEeL0chnJMb1y7GGUAFmFEHubRdSAMJriyyK8GzW-k7gkDFjGPN5H94iPZRMQgzNhPd5-AmXI_LvDPm0o1PNGakian0eB8BWitv7hbnxg5bWCdzz478HiM5n-xw43EmFJolkUOz8aMB3QyCCtkXFcsC7cfOlDP_Y1QBmfsWu4v9mXqGikKtYZZIiOhwhTjC0vshVg9M3osP3mOnG8HOz4iGGGeywUiAW8ZUPu08VD5X8j1dtbto4sHuu7pWqm8Jy5l2n8qGA", "payload": "" } 2024-01-31 20:15:21,293:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186273596 HTTP/1.1" 200 807 2024-01-31 20:15:21,294:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:15:19 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc5S5Ep-nuu3kIrr_gbNoqyF7YqBrZzHqTQiHn_bgTR_uA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:45:48Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/KNqRXQ", "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/KMda1w", "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/f-1bag", "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE" } ] } 2024-01-31 20:15:21,294:DEBUG:acme.client:Storing nonce: R3i4Vkc5S5Ep-nuu3kIrr_gbNoqyF7YqBrZzHqTQiHn_bgTR_uA 2024-01-31 20:15:21,295:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-31 20:15:21,296:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-01-31 20:15:21,296:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-31 20:15:21,296:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-31 20:15:21,297:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-31 20:15:21,297:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-31 20:15:21,297:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-31 20:15:21,298:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-31 20:15:21,299:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-31 20:15:21,338:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-31 20:15:21,559:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-31 20:15:21,560:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-31 20:15:21,560:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-31 20:15:21,565:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:03 UTC. 2024-01-31 20:15:21,565:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-31 20:15:21,565:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-31 20:15:21,570:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-31 20:15:21,570:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-31 20:15:21,570:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-31 20:15:21,586:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-31 20:15:21,587:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-31 20:15:21,589:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-31 20:15:22,149:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-31 20:15:22,149:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:15:20 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "cup1xrYZE2I": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-31 20:15:22,149:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-31 20:15:26,285:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7262_key-certbot.pem 2024-01-31 20:15:30,228:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7260_csr-certbot.pem 2024-01-31 20:15:30,229:DEBUG:acme.client:Requesting fresh nonce 2024-01-31 20:15:30,229:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-31 20:15:30,412:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-31 20:15:30,412:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:15:28 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCgBVQMgk41O6n1arivLMswnRE9af_fJvomR0yf4V2gbY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-31 20:15:30,412:DEBUG:acme.client:Storing nonce: Wkq6jgLCgBVQMgk41O6n1arivLMswnRE9af_fJvomR0yf4V2gbY 2024-01-31 20:15:30,413:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-01-31 20:15:30,418:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENnQlZRTWdrNDFPNm4xYXJpdkxNc3duUkU5YWZfZkp2b21SMHlmNFYyZ2JZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "YHIwq0iV60m1-3O6eo5bG7839Dg96f8EmWgw68G2tNTk9ZcqvCKHfDcNHwJBcttKhpySCJUR7hT6ZUW2BFEQXLA0038XV1sp7q8lMgRhb2cwqt5W2Bl2RO2G3U8LXmOfZ4tcvaiPXG2EzScFk5zNQTkYxG9c2Nm7lz4XpEy16BDjXvha7C-KWuoEUmvJZf83GUvJuqo8uqY9XMwx60HqrqV6Vk9E7wkR2DRRb-q36xQJCcZW2nU_fqHIRmKmKVglnZvejweU7y7zUbbchjHPy9kZSUaFqYpyOYVqatpYfIKlxmn8bt0ZvMe_x-9OBczv3u7D8ES9hWqUO4ivOIxagg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-01-31 20:15:30,612:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-01-31 20:15:30,613:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 31 Jan 2024 19:15:28 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463187546 Replay-Nonce: fBfjtdZF6vZ_QJf4EqAWpbsaHBnx-wlaoZPGsUWLigO6xcuj6tk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:45:58Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186305236" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463187546" } 2024-01-31 20:15:30,613:DEBUG:acme.client:Storing nonce: fBfjtdZF6vZ_QJf4EqAWpbsaHBnx-wlaoZPGsUWLigO6xcuj6tk 2024-01-31 20:15:30,613:DEBUG:acme.client:JWS payload: b'' 2024-01-31 20:15:30,618:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186305236: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkY2dlpfUUpmNEVxQVdwYnNhSEJueC13bGFvWlBHc1VXTGlnTzZ4Y3VqNnRrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzMDUyMzYifQ", "signature": "XXk72ONYUDln-g1i6pCGEigUltlYEY3lZGnQhBWThpNf40F6DCqfgiAtZkCadD2lx7faeVJioeyFCZdqS9iEHEEWJ23lIYENrw_agTou-L0nGCp3C6ECw6t4igOMwfgvGrLxrCUHgOT1Ky7L58ySSRRpqMl6T5U6fF_PYVKxbfxRrelYLjMU7slzDDA4MEDOtSbLgCErnwOAIvYrzdO-INeFRr6SCxxL09gpCvMwltxKj7UvOlUCFMkIrRr_woewQfwSYaXufLrsgzFwTW8OoLLd7DrnJQgLM7iXMp9GUDiWnYuoXKhVv6U9WiH3YTmMUwb2ctgxj_kJ0IHUKvSFxQ", "payload": "" } 2024-01-31 20:15:30,815:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186305236 HTTP/1.1" 200 801 2024-01-31 20:15:30,816:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:15:28 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCVtI7E-PYyyWJ21FuyFOWw2syixvgqO2Y86BPLzroijU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:45:58Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/H-2NUg", "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/SPl0kw", "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/dBmW2A", "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY" } ] } 2024-01-31 20:15:30,816:DEBUG:acme.client:Storing nonce: Wkq6jgLCVtI7E-PYyyWJ21FuyFOWw2syixvgqO2Y86BPLzroijU 2024-01-31 20:15:30,817:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-31 20:15:30,817:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-01-31 20:15:30,817:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-31 20:15:30,818:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-31 20:15:30,818:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-31 20:15:30,818:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-31 20:15:30,818:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-31 20:15:30,819:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-31 20:15:30,820:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-31 20:15:30,857:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-31 20:15:31,064:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-31 20:15:31,065:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-31 20:15:31,065:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-31 20:15:31,069:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:20 UTC. 2024-01-31 20:15:31,069:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-31 20:15:31,069:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-31 20:15:31,074:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-31 20:15:31,074:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-31 20:15:31,074:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-31 20:15:31,079:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-31 20:15:31,080:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-31 20:15:31,082:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-31 20:15:31,645:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-31 20:15:31,646:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:15:29 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "BCusuWqMh20": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-31 20:15:31,646:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-31 20:15:35,941:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7263_key-certbot.pem 2024-01-31 20:15:39,974:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7261_csr-certbot.pem 2024-01-31 20:15:39,975:DEBUG:acme.client:Requesting fresh nonce 2024-01-31 20:15:39,975:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-31 20:15:40,198:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-31 20:15:40,199:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:15:38 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCD_hX5Ip2KFr_HI3hDGGTF6I3aYkEjBR6AyHQzpr_l_o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-31 20:15:40,199:DEBUG:acme.client:Storing nonce: Wkq6jgLCD_hX5Ip2KFr_HI3hDGGTF6I3aYkEjBR6AyHQzpr_l_o 2024-01-31 20:15:40,199:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-01-31 20:15:40,205:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENEX2hYNUlwMktGcl9ISTNoREdHVEY2STNhWWtFakJSNkF5SFF6cHJfbF9vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "tTJMu0_qx78EPDrUQd4CDDXvhOmSwK--MtqHOwOqq9uV49199QBpBoT1sVvm1x592-CIhVdSkOrOAQS3l_rbX023_TCjhUJfTijQGVoRDjrqBGE12y2VIEcbNeDxyt30pZgQjoG4lY1lqgm00l-_9WZOilLdJxCJl2OYpRCvC64jqmPAiYJb8i1CyqBWxPfkLSgMni3xGSvQdoxIaP5BLjkNvvc9b22Vgt3tSwKfedS7UB38wCaKTO7Hq82LEtD2xnCaJyFyHavlwjPm3bLDVfP-Av2hA5ViaQNiypaT33_b0qrfiThVv4OW5TswRbWYKoP6GyhAdloRffiBL-uC5w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-01-31 20:15:40,397:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-01-31 20:15:40,398:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 31 Jan 2024 19:15:38 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463215876 Replay-Nonce: Wkq6jgLCnUNtS5s3R50RMcsqxFkTDJYaEmICV0neurPIPqXOnhQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:07Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186343916" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463215876" } 2024-01-31 20:15:40,398:DEBUG:acme.client:Storing nonce: Wkq6jgLCnUNtS5s3R50RMcsqxFkTDJYaEmICV0neurPIPqXOnhQ 2024-01-31 20:15:40,399:DEBUG:acme.client:JWS payload: b'' 2024-01-31 20:15:40,412:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186343916: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENuVU50UzVzM1I1MFJNY3NxeEZrVERKWWFFbUlDVjBuZXVyUElQcVhPbmhRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzNDM5MTYifQ", "signature": "Yn9o4taVG0dh_xD_0Ut3SvMg2ysSE_-3I2Qd6rKZH1Wa8aJs4M9JQ4boWJrQiLhKBfkFF-R2msfcoCXAAMu4NgT489VSA3HXl8Y-l3CzXf8TVcXJMVze4MGrsKP8REwHZVvryxjwx9eCxTTTPbIJcie3eAmRZm_-OQa1UQ6Pos3ZqNpWfJ6ZbW8qC4CnBjdE9aEyQERz5sbpYjZiigVJqzF6d5M72j1mpoC1uNDtpWnS8eN7WDLlYkjIMVsw4AuPZYY9uxRqpfh01ycPsV6BgUD11Kc2f--aYpwtRMQMHRCJf69aBENplVyOPgSBojDjVJ-qcgdy-fjaWRoWgDRHLA", "payload": "" } 2024-01-31 20:15:40,625:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186343916 HTTP/1.1" 200 805 2024-01-31 20:15:40,626:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:15:38 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCtiFHdeBjRZcJdqeFyghUhHcF2_xZ2DR_Ue-tw0lcHks X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:07Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/FQmNLA", "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/nw3Heg", "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/o7wJkQ", "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE" } ] } 2024-01-31 20:15:40,626:DEBUG:acme.client:Storing nonce: Wkq6jgLCtiFHdeBjRZcJdqeFyghUhHcF2_xZ2DR_Ue-tw0lcHks 2024-01-31 20:15:40,627:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-31 20:15:40,627:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-01-31 20:15:40,628:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-31 20:15:40,628:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-31 20:15:40,628:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-31 20:15:40,629:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-31 20:15:40,629:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-31 20:15:40,629:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-31 20:15:40,630:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-31 20:15:40,676:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-31 20:15:40,877:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-31 20:15:40,878:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-01-31 20:15:40,878:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-01-31 20:15:40,883:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:36 UTC. 2024-01-31 20:15:40,883:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-31 20:15:40,883:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-31 20:15:40,888:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-31 20:15:40,888:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-31 20:15:40,888:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-31 20:15:40,905:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-31 20:15:40,905:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-31 20:15:40,908:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-31 20:15:41,357:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-31 20:15:41,358:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:15:39 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "_Ju6YZWnZnc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-31 20:15:41,358:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-31 20:15:45,513:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7264_key-certbot.pem 2024-01-31 20:15:49,597:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7262_csr-certbot.pem 2024-01-31 20:15:49,598:DEBUG:acme.client:Requesting fresh nonce 2024-01-31 20:15:49,598:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-31 20:15:49,753:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-31 20:15:49,753:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:15:47 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247Yb5cCykq33yv8I6_Jl-HV6ETe_WpmfRQDkaIQ2lWgGGU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-31 20:15:49,753:DEBUG:acme.client:Storing nonce: VKfU247Yb5cCykq33yv8I6_Jl-HV6ETe_WpmfRQDkaIQ2lWgGGU 2024-01-31 20:15:49,754:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-01-31 20:15:49,761:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1liNWNDeWtxMzN5djhJNl9KbC1IVjZFVGVfV3BtZlJRRGthSVEybFdnR0dVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "SrOyZfqhc5vSUDZ0EKWE0c4qavUB0QURxYFku8s8ZLMwMBMtr7N0Z-ZZJ3BoUc4XuaN3dZ8EPEsL-zHcu5PJZ_Si19tkAQQXiuG07SqVQU07FJb_1O1uQpZGFw33owlr6rCCS85i8n5njArf1yAAbTISB4UYaJ0EQlGAcY2XLMjifV_i-9bSeMTyaePaFV1drC_eRBcbYnRvUGlPXRDobX2PYGTuDprViijlV4T-n2E5mbDWx5g6f4GDXjGflTO-DRY8--neazudKrsVwp6TcR5y6tuikkWuTfLs9EXxLCAUzIaWHw4Q8btu8i8Hj5MqLJPNhFBRb2R8rofnnCty2A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-01-31 20:15:49,961:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-01-31 20:15:49,962:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 31 Jan 2024 19:15:47 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463242076 Replay-Nonce: VKfU247YQtRFjmvCHNdENozsVXq9xxi1z2TL6yYA1q9MCDColss X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:16Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186384516" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463242076" } 2024-01-31 20:15:49,962:DEBUG:acme.client:Storing nonce: VKfU247YQtRFjmvCHNdENozsVXq9xxi1z2TL6yYA1q9MCDColss 2024-01-31 20:15:49,962:DEBUG:acme.client:JWS payload: b'' 2024-01-31 20:15:49,968:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186384516: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lRdFJGam12Q0hOZEVOb3pzVlhxOXh4aTF6MlRMNnlZQTFxOU1DRENvbHNzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzODQ1MTYifQ", "signature": "Q2QrK7ndIJuF3plShz1YWI3BllG0xbJvYCqFPfs6XsdQui7Qpqd04wnNT-tVUkTxpZykSLYy_Mlng0jBzerBvfhoC-C8c-kjrpy__5KHsF-zyYXPvFyflwUfLVPwC6HJ6NjBqU8dzdyUgwjz4aHSMgspxo3ZqUIlgbGfNWwbxHtUD_8NMc7Z5rYdYawYDDolYL3X0LA5CZyCPXT5Vlk-GqGgTndGyPbZsjh0ltt6YhnR-vAdWdM1C5ShEHlj9uv0rwKadMRnuwSyaZ7ULOYRjKcq1I7q3KhMwg_BiXR0G67zMtWvnBexcB0rt_eTpjZCRRPGay-tsR8m8RJvtCrUYw", "payload": "" } 2024-01-31 20:15:50,150:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186384516 HTTP/1.1" 200 809 2024-01-31 20:15:50,151:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:15:48 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc5XOPctegq45opmix1qt6vPMyCJgRAZDdeNGvKCg7U_fk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:16Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/iy166A", "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/FJ3duA", "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/0qWA8w", "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY" } ] } 2024-01-31 20:15:50,151:DEBUG:acme.client:Storing nonce: R3i4Vkc5XOPctegq45opmix1qt6vPMyCJgRAZDdeNGvKCg7U_fk 2024-01-31 20:15:50,152:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-31 20:15:50,152:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-01-31 20:15:50,152:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-31 20:15:50,153:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-31 20:15:50,153:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-31 20:15:50,153:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-31 20:15:50,154:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-31 20:15:50,154:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-31 20:15:50,155:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-31 20:15:50,205:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-31 20:15:50,492:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-31 20:15:50,493:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-31 20:15:50,494:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-31 20:15:50,498:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:50 UTC. 2024-01-31 20:15:50,498:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-31 20:15:50,499:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-31 20:15:50,504:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-31 20:15:50,504:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-31 20:15:50,504:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-31 20:15:50,521:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-31 20:15:50,522:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-31 20:15:50,523:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-31 20:15:50,972:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-31 20:15:50,973:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:15:49 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "tsqZ2uY1gsg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-01-31 20:15:50,973:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-31 20:15:55,227:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7265_key-certbot.pem 2024-01-31 20:15:59,210:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7263_csr-certbot.pem 2024-01-31 20:15:59,211:DEBUG:acme.client:Requesting fresh nonce 2024-01-31 20:15:59,211:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-31 20:15:59,360:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-31 20:15:59,361:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:15:57 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc5mSEGlUWZilhBao6qvAQqgvtNe4ZjVAZjuIoI8j0bzvY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-31 20:15:59,361:DEBUG:acme.client:Storing nonce: R3i4Vkc5mSEGlUWZilhBao6qvAQqgvtNe4ZjVAZjuIoI8j0bzvY 2024-01-31 20:15:59,361:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-01-31 20:15:59,367:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVtU0VHbFVXWmlsaEJhbzZxdkFRcWd2dE5lNFpqVkFaanVJb0k4ajBienZZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "PfLTLZCg0AHwrjNNnygRoIaNGM_HCrTwOL9So51NGx0DOi_EIOG6m50waT9nOpwTfUO54_YJkqMMrwB7fK8phsMP6P_a6dGEDuaVpjedDw1RdthMqbNJhzOG4gifDr9ymCUr4xCmjNhED5k3mBie1_tf9eBnp2HkYcDYgdW5bRlKKV6HTd2_E01olW6VwuPqmzawF30STzk77A48yYdiDohbOxdSrSBNCdfzPqEjWXRFrZzjpNQLjlaQPOn6bY4WHhJSlcRjpDeEqYaxy1MRbAAcBQT5CDIOzqMBa6Orlmcol1G2zmb9Wy-hZluX7S2f0ZjpGplcsHzX2UgFfFd0zw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-01-31 20:15:59,549:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-01-31 20:15:59,549:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 31 Jan 2024 19:15:57 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463267436 Replay-Nonce: R3i4Vkc56wGvRfjSfOx4uafypDpjHDU9EXB8EMp-4qpv2S9TURY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:25Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186423616" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463267436" } 2024-01-31 20:15:59,550:DEBUG:acme.client:Storing nonce: R3i4Vkc56wGvRfjSfOx4uafypDpjHDU9EXB8EMp-4qpv2S9TURY 2024-01-31 20:15:59,550:DEBUG:acme.client:JWS payload: b'' 2024-01-31 20:15:59,556:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186423616: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzU2d0d2UmZqU2ZPeDR1YWZ5cERwakhEVTlFWEI4RU1wLTRxcHYyUzlUVVJZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY0MjM2MTYifQ", "signature": "p35jnTtAKasJtYNk4VYQS14xtf9ZzrUYaXUhM-uVdkm7cWrLQ1eywdHs-IdNQymH3TlT3Hi0o4u0nMe6ACGWrMNBAWcirs556nG4GHVSUGW1gwEqznMiU8BFNOYjCPWS_GL9O_w0l5fk4MqkP8vekdcqKEuuQNSju_PAf7yIKuiyayafvP9GepIfjpQvJptKkTObmCcfbEfpsoUSLREORBAatLT4yBbWzYA7z1cUhRgROQJlk4eb5flakyIvn01On0BQqaVlpcYqGNWvz1hYv3Y_-XUbYOC73zbSOR1QkGP0Oxr-2KpQajfL-wtQvb5hmVkXjlBwseOZq__heivkTA", "payload": "" } 2024-01-31 20:15:59,730:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186423616 HTTP/1.1" 200 806 2024-01-31 20:15:59,731:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:15:57 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc5kk2wqDZYqylxb7-_CsaEGia9mSnSP-v-ZVNAaxDu028 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:25Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/sGt3LQ", "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/-siQUw", "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/rUgQOA", "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg" } ] } 2024-01-31 20:15:59,731:DEBUG:acme.client:Storing nonce: R3i4Vkc5kk2wqDZYqylxb7-_CsaEGia9mSnSP-v-ZVNAaxDu028 2024-01-31 20:15:59,731:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-31 20:15:59,732:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-01-31 20:15:59,732:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-31 20:15:59,732:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-31 20:15:59,733:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-31 20:15:59,733:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-31 20:15:59,733:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-31 20:15:59,734:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-31 20:15:59,735:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-31 20:15:59,781:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-01-31 20:15:59,781:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-31 20:15:59,781:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-01-31 20:15:59,791:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-01-31 20:15:59,793:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-01-31 20:15:59,793:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-01-31 20:15:59,793:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-01-31 20:15:59,794:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-01-31 20:15:59,796:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-01-31 20:15:59,836:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-31 20:16:00,084:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-31 20:16:00,085:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-31 20:16:00,086:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-31 20:16:00,090:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:07 UTC. 2024-01-31 20:16:00,090:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-31 20:16:00,091:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-31 20:16:00,096:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-31 20:16:00,096:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-31 20:16:00,096:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-31 20:16:00,101:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-31 20:16:00,102:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-31 20:16:00,104:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-31 20:16:00,656:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-31 20:16:00,657:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:15:58 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "hOptoSVKLAs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-31 20:16:00,658:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-31 20:16:04,876:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7266_key-certbot.pem 2024-01-31 20:16:08,983:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7264_csr-certbot.pem 2024-01-31 20:16:08,984:DEBUG:acme.client:Requesting fresh nonce 2024-01-31 20:16:08,984:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-31 20:16:09,165:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-31 20:16:09,166:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:16:07 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZF9zTyM0CuwL5_gc-c8XBnaLhr6eE2C51ir1EKYfyzS9I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-31 20:16:09,166:DEBUG:acme.client:Storing nonce: fBfjtdZF9zTyM0CuwL5_gc-c8XBnaLhr6eE2C51ir1EKYfyzS9I 2024-01-31 20:16:09,166:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-01-31 20:16:09,174:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkY5elR5TTBDdXdMNV9nYy1jOFhCbmFMaHI2ZUUyQzUxaXIxRUtZZnl6UzlJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "sBKUojIcrvZr_g6RGWKp4pJpcTtRoAtkhAmW1ecEdJQg4_QLoajjqc_qaZoAcdEjE_KhOArKty_dliiAEzyGh7YDkfpv8yZranwBFJ0hvvLQf2Fy_PuzT-nGPyPV1dXScdH8dkWBi4plySZdrVuJ8wUq1UJUtnV6L4V1l3wdLFCt73I61mtA8Cm5D7VJTufI7w_dP5XBetz918u6XzSHxsG6W1kTx2dBVMDCeHlScJh0MMAxxo6whXKsZINMlQiarw5wccFaw9ZK8wE5GmgOJfvrJvLN5qZRUYUFo1_CaR1bCl1F30gnI_5_lIOJrRZQvUQ8poPD3bQsgRbgqEFvLw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-01-31 20:16:09,381:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-01-31 20:16:09,382:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 31 Jan 2024 19:16:07 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463293726 Replay-Nonce: Wkq6jgLCQCAno1UhismEZ2J-ab0CqHh_lnX0NTHb7qJyHyFwpbU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:34Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186467546" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463293726" } 2024-01-31 20:16:09,382:DEBUG:acme.client:Storing nonce: Wkq6jgLCQCAno1UhismEZ2J-ab0CqHh_lnX0NTHb7qJyHyFwpbU 2024-01-31 20:16:09,382:DEBUG:acme.client:JWS payload: b'' 2024-01-31 20:16:09,390:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186467546: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENRQ0FubzFVaGlzbUVaMkotYWIwQ3FIaF9sblgwTlRIYjdxSnlIeUZ3cGJVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY0Njc1NDYifQ", "signature": "LDQFwY1SyGRCU-bdjX7pQs1g3YmOTlsQE9bQxVoZfrSFXY6-h3W-h0Zv8TytHcYU3C5mp13hcxQSdlTXLDYVbqiMip-2Pw255Em5mlXbJ4kkre9q5p4RMgWNVajMQAZCZYhPGDMeEYx5lgLtTFHElgfChMTQfixD7-z-_096Z3sfHKAJnfNGIZuHaDO0sokBnema8k-rZ89xoXTDz3tWQaE94iX1Mz83F9_TNHB3Lnd5c639wTg3HwlZnlsiufR0hNmToX4kcvtXakFMECY2JsIHa3MPm6scOOv1b--VSUic6XnDFkzN7LslX3oyEz6AmBM2PxzFd23Vos2WWcQZPg", "payload": "" } 2024-01-31 20:16:09,577:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186467546 HTTP/1.1" 200 811 2024-01-31 20:16:09,578:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:16:07 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZFgrAMAp7XGS0dqjK3a9Rgzrmbv82iCeXhW1oX8cuElFA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:34Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/n-ZWjw", "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/NYrS2A", "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/g51OFg", "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU" } ] } 2024-01-31 20:16:09,578:DEBUG:acme.client:Storing nonce: fBfjtdZFgrAMAp7XGS0dqjK3a9Rgzrmbv82iCeXhW1oX8cuElFA 2024-01-31 20:16:09,578:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-31 20:16:09,579:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-01-31 20:16:09,579:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-31 20:16:09,579:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-31 20:16:09,580:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-31 20:16:09,580:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-31 20:16:09,580:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-31 20:16:09,581:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-31 20:16:09,582:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-31 20:16:09,619:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-31 20:16:09,809:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-31 20:16:09,810:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-31 20:16:09,810:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-31 20:16:09,815:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:31 UTC. 2024-01-31 20:16:09,815:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-31 20:16:09,815:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-31 20:16:09,821:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-31 20:16:09,821:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-31 20:16:09,821:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-31 20:16:09,826:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-31 20:16:09,827:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-31 20:16:09,829:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-31 20:16:10,472:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-31 20:16:10,472:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:16:08 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "NB1X59OxyPE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-31 20:16:10,473:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-31 20:16:14,864:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7267_key-certbot.pem 2024-01-31 20:16:19,010:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7265_csr-certbot.pem 2024-01-31 20:16:19,010:DEBUG:acme.client:Requesting fresh nonce 2024-01-31 20:16:19,010:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-31 20:16:19,191:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-31 20:16:19,191:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:16:17 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZF1IkpscVI-MgHOH3VVA_ZvFYjx8JFe1RtR16ApPiJv2g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-31 20:16:19,191:DEBUG:acme.client:Storing nonce: fBfjtdZF1IkpscVI-MgHOH3VVA_ZvFYjx8JFe1RtR16ApPiJv2g 2024-01-31 20:16:19,192:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-01-31 20:16:19,198:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkYxSWtwc2NWSS1NZ0hPSDNWVkFfWnZGWWp4OEpGZTFSdFIxNkFwUGlKdjJnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ky-8eByglPe5K8Nog_O_aj_7KbiTXynnS-wVJa4eX4NOXqII7JSkRo3CtA8lw5Cu3WNXSO1XvO-Junqcqa5V4GuSONONt9BfMMV4r8N-ISQ5tWqg4bahUdqnEReMGOhPuBE3lXHodZSF0L0tR5URHP1IwCSGOmXxSQOejzJOtpPbkFSEswrw2qOS5GpwKDVRBpoCibq8fELSpZfk87JF9Cz1B0SZZ2FKzS1SP4Q7d01jB8CxZWCctlhU53eVeL1cfKdeancK3K78FLfJtOhzfAcdOjFmiBoLXTMn27VbIBKlrPDbb5ryVpyJTB62cxcSjOaRqR919pn6j1SMA8yZTQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-01-31 20:16:19,393:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-01-31 20:16:19,393:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 31 Jan 2024 19:16:17 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463315236 Replay-Nonce: fBfjtdZFZDiBJY2vhdTK4Skzdhxu3N0ybQaOhbMWPbmwN5_x-As X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:43Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186500336" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463315236" } 2024-01-31 20:16:19,394:DEBUG:acme.client:Storing nonce: fBfjtdZFZDiBJY2vhdTK4Skzdhxu3N0ybQaOhbMWPbmwN5_x-As 2024-01-31 20:16:19,394:DEBUG:acme.client:JWS payload: b'' 2024-01-31 20:16:19,399:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186500336: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZaRGlCSlkydmhkVEs0U2t6ZGh4dTNOMHliUWFPaGJNV1BibXdONV94LUFzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1MDAzMzYifQ", "signature": "QKr5zoiGRhxYzNVrm06eBHc189UT-QID-RMSIPqB-K3Sb6pXZe5lRTr7mnPfZAVJzeGZ4oulaK7fehU4vFJG12IPew6YUflaD17WgJmgK6NVXg92KHHMXfFwciLx6RpiGjni10lnVO_QMXZ6Q4Ijr3nyid0UwFUfycA_YXpZlVOnVENm82zBgxxH7PXvI87Npio1dWpz4H6YOA7Gqh8q_jLksz8thqgWXtUsOVoOAFQC0hodn7Fvsrek0idJL6tvIjuvoTxErbt0Zavb_a9c_xF2LHt7vR8B-TBqystlTOZTnNLUG_92i3oYYVbjJWlsOM0ZzYmLPP0Xg_pDQqWZXQ", "payload": "" } 2024-01-31 20:16:19,616:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186500336 HTTP/1.1" 200 810 2024-01-31 20:16:19,617:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:16:17 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZFzbpnBGcwgBowOad_CCuXvfDx51ii8rU9oTpj_Wdksfk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:43Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/MLFeSA", "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/NegWfw", "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/0vtuKQ", "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0" } ] } 2024-01-31 20:16:19,617:DEBUG:acme.client:Storing nonce: fBfjtdZFzbpnBGcwgBowOad_CCuXvfDx51ii8rU9oTpj_Wdksfk 2024-01-31 20:16:19,617:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-31 20:16:19,618:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-01-31 20:16:19,618:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-31 20:16:19,619:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-31 20:16:19,619:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-31 20:16:19,619:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-31 20:16:19,620:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-31 20:16:19,620:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-31 20:16:19,621:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-31 20:16:19,669:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-31 20:16:19,915:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-31 20:16:19,916:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-01-31 20:16:19,917:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-01-31 20:16:19,921:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:09 UTC. 2024-01-31 20:16:19,921:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-31 20:16:19,921:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-31 20:16:19,926:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-31 20:16:19,926:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-31 20:16:19,926:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-31 20:16:19,931:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-31 20:16:19,932:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-31 20:16:19,934:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-31 20:16:20,502:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-31 20:16:20,502:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:16:18 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "w2LTSznoSnQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-01-31 20:16:20,502:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-31 20:16:24,668:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7268_key-certbot.pem 2024-01-31 20:16:28,724:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7266_csr-certbot.pem 2024-01-31 20:16:28,725:DEBUG:acme.client:Requesting fresh nonce 2024-01-31 20:16:28,725:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-31 20:16:28,912:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-31 20:16:28,913:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:16:26 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLChbzBmRkf-QVM_cJeST7A4e8ym6MPAswZOxKMbnkHL6w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-31 20:16:28,913:DEBUG:acme.client:Storing nonce: Wkq6jgLChbzBmRkf-QVM_cJeST7A4e8ym6MPAswZOxKMbnkHL6w 2024-01-31 20:16:28,913:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-01-31 20:16:28,918:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENoYnpCbVJrZi1RVk1fY0plU1Q3QTRlOHltNk1QQXN3Wk94S01ibmtITDZ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "qCpYRTptO0XaWkvj1LVMN8W0nuSc2Tq9reOXvkFos3bBclEe2vFoOtwkqLNx70G2h-fLZACDG7x0eM_9ZY3LPE6BQHgbcCyC7q4npH90MYAx-NSC2FM9Fp_ptykka1eY8--jw4O46JQc2fRx10ORBTizK5L8lxTWdEAJNPNgJt6DHrI31pQNXqbS9wc7ilJB95hav6JF5vEUGBN4tOZBopuhenNMAg8GcBsQEq9WpG0jDBBqn9yaSzPEq2HoNOM-vkIA-7s8P9dG3JxdiF_tqWJfhNc8IDjp7u53LksjuhZp0zPDm-vp3mcubT2jYPDQ_zmo1ZGRxqmkuVrjIZvY9Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-01-31 20:16:29,114:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-01-31 20:16:29,115:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 31 Jan 2024 19:16:27 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463336576 Replay-Nonce: Wkq6jgLCVTUoXqKxZzui5Ep8e4s6BpVj4GFumdY6wWONPihQdbA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:52Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186530456" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463336576" } 2024-01-31 20:16:29,115:DEBUG:acme.client:Storing nonce: Wkq6jgLCVTUoXqKxZzui5Ep8e4s6BpVj4GFumdY6wWONPihQdbA 2024-01-31 20:16:29,115:DEBUG:acme.client:JWS payload: b'' 2024-01-31 20:16:29,121:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186530456: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENWVFVvWHFLeFp6dWk1RXA4ZTRzNkJwVmo0R0Z1bWRZNndXT05QaWhRZGJBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1MzA0NTYifQ", "signature": "hknBkWmbUtr5dUJOjlEMKaMq97a4E9N_273vkzNH0iKNU5ke_6DxjiF8joHt9SBZxx1jPW69LnDOrVNo8ty5IlLys83m6OsynRBB3sBGSP8rjGqV4IE6RKxFii5YSd7I-YncNY1qwFFJuAvleFRPxqZrst13QdAtakuc4wIS7DDqKbywPP7Km0iShLxjuwab7P50aRkEolPRFcbMn2r0HUtoIIbojN3YPxexg1ttwSBc3SwXd8t0SLRNYy8nzMlnK5LmhHEkpunTTmJ_rDXXtMYHOM64DX0GWl93z8-_7vdiAo5iGrpXF9oNpgMT8VlheUDV_iwPl1rLKUUyRS81Jw", "payload": "" } 2024-01-31 20:16:29,312:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186530456 HTTP/1.1" 200 809 2024-01-31 20:16:29,313:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:16:27 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZFQuCmtrY6kLdD-KjQYdwkLFUuo7yXw7wwe85GyIbtiuY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:52Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/ibbbOA", "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/W42erg", "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/xDGKCQ", "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI" } ] } 2024-01-31 20:16:29,313:DEBUG:acme.client:Storing nonce: fBfjtdZFQuCmtrY6kLdD-KjQYdwkLFUuo7yXw7wwe85GyIbtiuY 2024-01-31 20:16:29,313:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-31 20:16:29,316:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-01-31 20:16:29,317:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-31 20:16:29,317:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-31 20:16:29,318:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-31 20:16:29,318:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-31 20:16:29,318:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-31 20:16:29,319:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-31 20:16:29,320:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-31 20:16:29,360:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-31 20:16:29,521:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-31 20:16:29,522:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is signed by the certificate's issuer. 2024-01-31 20:16:29,523:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD 2024-01-31 20:16:29,528:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:26 UTC. 2024-01-31 20:16:29,528:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-31 20:16:29,528:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-31 20:16:29,533:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-31 20:16:29,533:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-31 20:16:29,533:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-31 20:16:29,537:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-31 20:16:29,538:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-31 20:16:29,540:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-31 20:16:29,989:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-31 20:16:29,990:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:16:28 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "S6uzaiBGka4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-31 20:16:29,990:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-31 20:16:34,074:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7269_key-certbot.pem 2024-01-31 20:16:38,181:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7267_csr-certbot.pem 2024-01-31 20:16:38,182:DEBUG:acme.client:Requesting fresh nonce 2024-01-31 20:16:38,182:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-31 20:16:38,339:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-31 20:16:38,339:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:16:36 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc55-oidCwjEcKhwiLkeUoa-YqMjW5eR3KJV3xpKbhVLJo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-31 20:16:38,339:DEBUG:acme.client:Storing nonce: R3i4Vkc55-oidCwjEcKhwiLkeUoa-YqMjW5eR3KJV3xpKbhVLJo 2024-01-31 20:16:38,340:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-01-31 20:16:38,344:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzU1LW9pZEN3akVjS2h3aUxrZVVvYS1ZcU1qVzVlUjNLSlYzeHBLYmhWTEpvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "dPjuXAPVS19tMxPlyMrjBR-_hXB8AyyPHRyaxJ4DSI4uQj5mvr_WIfcBuo905C5Y0cV-9X3O-9K9j1H9ic7R39Uf3qjSmATQn1TNcteUi4XIbDGpU0XDMBzp9V2UdEKANjTstj0WEOi6O6IYTM0fOfs1lysZdG0a---WZsgZC4n0Bz1v7GXL3wSFLKR54Ed-BztDOs8BOBD4X525StDzwXsnV0fC117Yh6vJQg34z-8Tz-CMZFh-V8p_OEWoek15QhMn3jWk-AMfQyq7lSbmW492dtKe-0Pa_UoyYfqQtckvYNHkrOJEDlY7am2MJvElxXTMAMTfqrXw5PvfQkNajA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-01-31 20:16:38,536:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-01-31 20:16:38,537:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 31 Jan 2024 19:16:36 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463357966 Replay-Nonce: VKfU247YNE1WXzyqVHll2sD4FWp-DqL2jIphQhF3bo3xFJSOdB4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:47:01Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186562236" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463357966" } 2024-01-31 20:16:38,537:DEBUG:acme.client:Storing nonce: VKfU247YNE1WXzyqVHll2sD4FWp-DqL2jIphQhF3bo3xFJSOdB4 2024-01-31 20:16:38,537:DEBUG:acme.client:JWS payload: b'' 2024-01-31 20:16:38,542:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186562236: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lORTFXWHp5cVZIbGwyc0Q0RldwLURxTDJqSXBoUWhGM2JvM3hGSlNPZEI0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1NjIyMzYifQ", "signature": "iZA2qe_AftJByYs7olMHE7qxv-hGFyRslxfkF_KNUtVbgEYosRCkRJwkw6oSMnVZQpLqsplpmv5S9cyshEsYH8IF9_NrHrybXI37G1u2XDP3WfqWP-D5R_EhjQobi_MdjP990D68ch3GI8rInqS99EnlsROvQW2zHZmaGAznsD68a3g0FdED8DUMNOnVqi0XfG90LJ0RQUDFjFKGdRDVqqj0dstW-crT-p-v4lHJux3_0ZnqnBapRQRgHLCYR5gYus7izTwaPAhYD4-JbLB7NX1VMiHjw5Wi8ngdLJ1ykT7Hu3QOm3ZrhYzon6iXwWy4rK3HyGXeXJp_YmQFcfAK5Q", "payload": "" } 2024-01-31 20:16:38,707:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186562236 HTTP/1.1" 200 805 2024-01-31 20:16:38,707:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:16:36 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc57StShqf4JylklP1FgKIAqPuOb3IkXR-gpDpBmaeobPw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:47:01Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/d2C2Aw", "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/yk_m2Q", "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/2CxhFQ", "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE" } ] } 2024-01-31 20:16:38,708:DEBUG:acme.client:Storing nonce: R3i4Vkc57StShqf4JylklP1FgKIAqPuOb3IkXR-gpDpBmaeobPw 2024-01-31 20:16:38,708:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-31 20:16:38,708:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-01-31 20:16:38,709:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-31 20:16:38,709:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-31 20:16:38,710:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-31 20:16:38,710:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-31 20:16:38,710:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-31 20:16:38,711:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-31 20:16:38,712:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-31 20:16:38,749:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-31 20:16:39,836:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-31 20:16:39,837:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-31 20:16:39,838:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-31 20:16:39,855:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:43 UTC. 2024-01-31 20:16:39,855:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-31 20:16:39,856:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-31 20:16:39,866:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-31 20:16:39,866:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-31 20:16:39,867:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-31 20:16:39,873:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-31 20:16:39,874:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-31 20:16:39,876:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-31 20:16:40,350:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-31 20:16:40,350:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:16:38 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "X5Z52B6WBkc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-31 20:16:40,351:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-31 20:16:44,417:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7270_key-certbot.pem 2024-01-31 20:16:48,507:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7268_csr-certbot.pem 2024-01-31 20:16:48,508:DEBUG:acme.client:Requesting fresh nonce 2024-01-31 20:16:48,508:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-31 20:16:48,669:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-31 20:16:48,669:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:16:46 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247Y_o2lNHPn7Sng3r10Urmx5OSBy6tgamvxGaMu-uWyJD4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-31 20:16:48,670:DEBUG:acme.client:Storing nonce: VKfU247Y_o2lNHPn7Sng3r10Urmx5OSBy6tgamvxGaMu-uWyJD4 2024-01-31 20:16:48,670:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-01-31 20:16:48,675:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lfbzJsTkhQbjdTbmczcjEwVXJteDVPU0J5NnRnYW12eEdhTXUtdVd5SkQ0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Md0S9drYeckRS9ZCRk4B67GCOfAC7sqv8dWQKTj0J3US6aL1ssvBtlTi22_WjoNbokQ-0huW2aI8JmspGHcF7r2RBie3JZGqtWCWA6Z8pOtaG77M6bBbbrrEEUSSnMGN4Fly7eQgriRToFSp7A-nZFCwE5m_Ids-gzZIpzOqfIEahhgVaKPwVr0wS7mS6mvMoIVHwcWoOrbFtWqRE2SSLy5kPIJC4_QSvvq4BxFHSeDqqYkB1MmiYXX1-5FTyPVztN36EtPEuwXEMiqNjn5Y9iJrmZXvHJNH95WHkKe2GTaBhdzbV-tzTzEdYaJ0OCI31gtSktJlbS_eJIBB_x75lg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-01-31 20:16:48,844:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-01-31 20:16:48,845:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 31 Jan 2024 19:16:46 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463390816 Replay-Nonce: R3i4Vkc5hk7-9hy690Cyj_fWcDGaO2s82fH28ZsoGhvQWOiyUOo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:47:11Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186609606" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463390816" } 2024-01-31 20:16:48,845:DEBUG:acme.client:Storing nonce: R3i4Vkc5hk7-9hy690Cyj_fWcDGaO2s82fH28ZsoGhvQWOiyUOo 2024-01-31 20:16:48,845:DEBUG:acme.client:JWS payload: b'' 2024-01-31 20:16:48,850:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186609606: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVoazctOWh5NjkwQ3lqX2ZXY0RHYU8yczgyZkgyOFpzb0dodlFXT2l5VU9vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY2MDk2MDYifQ", "signature": "ZxVn74HpOKc2SVwqYX5cqW52HOSUhRLxhrOT1NASwd7VV8yHb4lXHW7UoLU129IeQ1vLrUfJge8uQU1NyE_fynfG6K7LCVTN5F4xUJqUF39MU1fWIjXu35Sdoem2HmyJqMv76Yf1a0YnV9gD79u66pp1oiF-JIbnNdiL1luKuCCHBuTcLQlosjF1LNE5OrFyYIq1MaJkXlJCZBvrUpqr6ZpnIQ9rsDxin51t3YcoAVEGxOjPeYAGMqHQRMJQGK7BrcN4C6t6daAqWqgAcC6SjA9lD6c6shKeA1K8xTOq7CoNTN9Ao9wdcAnQCI456CDuAnONlVmoNTF43F0LX0W6AQ", "payload": "" } 2024-01-31 20:16:49,034:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186609606 HTTP/1.1" 200 805 2024-01-31 20:16:49,035:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:16:47 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YC--Ftvc96k9xn9cN1MvpQoDGeexBFPLHn1B-7Vky_p4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:47:11Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/u86J_A", "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/GMvoKw", "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/skcDcA", "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA" } ] } 2024-01-31 20:16:49,035:DEBUG:acme.client:Storing nonce: VKfU247YC--Ftvc96k9xn9cN1MvpQoDGeexBFPLHn1B-7Vky_p4 2024-01-31 20:16:49,036:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-31 20:16:49,036:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-01-31 20:16:49,037:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-31 20:16:49,037:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-31 20:16:49,038:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-31 20:16:49,038:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-31 20:16:49,038:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-31 20:16:49,038:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-31 20:16:49,039:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-31 20:16:49,088:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-31 20:16:49,324:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-31 20:16:49,325:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-01-31 20:16:49,326:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-01-31 20:16:49,329:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:40:02 UTC. 2024-01-31 20:16:49,330:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-31 20:16:49,330:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-31 20:16:49,335:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-31 20:16:49,335:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-31 20:16:49,335:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-31 20:16:49,350:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-31 20:16:49,350:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-31 20:16:49,352:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-31 20:16:49,820:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-31 20:16:49,821:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:16:47 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "ALu2hAZztr8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-31 20:16:49,821:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-31 20:16:54,371:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7271_key-certbot.pem 2024-01-31 20:16:58,486:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7269_csr-certbot.pem 2024-01-31 20:16:58,487:DEBUG:acme.client:Requesting fresh nonce 2024-01-31 20:16:58,487:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-31 20:16:58,656:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-31 20:16:58,657:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:16:56 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YF4bG62VLncpB-_0_ccL_sr-xEnCI_u8g16lAa5HL3BQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-31 20:16:58,657:DEBUG:acme.client:Storing nonce: VKfU247YF4bG62VLncpB-_0_ccL_sr-xEnCI_u8g16lAa5HL3BQ 2024-01-31 20:16:58,657:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-01-31 20:16:58,665:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lGNGJHNjJWTG5jcEItXzBfY2NMX3NyLXhFbkNJX3U4ZzE2bEFhNUhMM0JRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "JJUJhJxYIa7ELJ7ut-tVynfzqWThmpHHTycWs6Y_fxKXGmN5JCOg_bM0BFiKKrGIpw83s7v-JwD5YSvk7taZpIJEAIT3PdVX9PBszL9t6IDsZoKevWZ3xasKYImB44rCOC7PA3C6NLjH1bjrrevFhiBJo8H_qYIqIYtpzVWRj943Vchx42gv-t2PCIVjfzC9Di3yhox6KWToNoNvKn9fU6xCeMYYuX6gr_SSOFlv4Y1Xp_spCGxEeT8GwFVj3uDxb_qM9TPNvhq_SSIRspWYqwqL8BM2WdpFY2-7petNx1oaBKp2c3PGF8m7s8JlT_iJyFmtS8cwndqCS0fvV9tj-A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-01-31 20:16:58,832:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-01-31 20:16:58,832:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 31 Jan 2024 19:16:56 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463415626 Replay-Nonce: VKfU247YoyntWi8S7FI-vVvV124rV6T4-4qSLJIDRHlOhT0I6RE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:47:20Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186648386" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463415626" } 2024-01-31 20:16:58,833:DEBUG:acme.client:Storing nonce: VKfU247YoyntWi8S7FI-vVvV124rV6T4-4qSLJIDRHlOhT0I6RE 2024-01-31 20:16:58,833:DEBUG:acme.client:JWS payload: b'' 2024-01-31 20:16:58,838:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186648386: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lveW50V2k4UzdGSS12VnZWMTI0clY2VDQtNHFTTEpJRFJIbE9oVDBJNlJFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY2NDgzODYifQ", "signature": "Qnf7lMXfH7jPpWot1sJDdSylbLc5lW0Zk3bHG1MlFBTYel6fq2Z4LHcFlQ9NXinCvnqieZYf-sLy3RvYtLrkinMPrkloQ-Up83dV0dG_iJd9dMgfM6NkFRFM8ciQQc8jwhSRKwn89ymI_jOtj9oRrx6o4L3kaemayARiHJTL97T78fKPBGbJhXKCpf76SUjXi3C96ptxrwxiAHYsSOXiVB3nT5nTZdEZVTWK4CD1kL7aEPJNKeEtkmSNdwOmDKeW53zMFKfQPWR2dzOStRbAsU_IJnFOWLtoQqcmRBSr3xpJIm0mIwKeceE_QtdV83xVtWZQ2nmpqp39U9F0zOyV7g", "payload": "" } 2024-01-31 20:16:58,997:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186648386 HTTP/1.1" 200 805 2024-01-31 20:16:58,998:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 31 Jan 2024 19:16:57 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YQlk5NY4urW1zJ3ZqMsdYhNDpu8jY9OwVF1C5ST1vxAM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:47:20Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/AfqDTw", "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/2qup_g", "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/cLgsJg", "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE" } ] } 2024-01-31 20:16:58,998:DEBUG:acme.client:Storing nonce: VKfU247YQlk5NY4urW1zJ3ZqMsdYhNDpu8jY9OwVF1C5ST1vxAM 2024-01-31 20:16:58,999:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-31 20:16:58,999:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-01-31 20:16:59,000:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-31 20:16:59,000:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-31 20:16:59,001:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-31 20:16:59,001:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-31 20:16:59,001:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-31 20:16:59,002:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-31 20:16:59,003:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-31 20:16:59,003:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-01-31 20:16:59,004:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-01-31 20:16:59,014:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-01-31 20:16:59,015:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)