2024-01-30 12:54:07,029:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-01-30 12:54:07,029:DEBUG:certbot._internal.main:Arguments: [] 2024-01-30 12:54:07,029:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-01-30 12:54:07,704:DEBUG:certbot._internal.log:Root logging level set at 20 2024-01-30 12:54:07,705:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-01-30 12:54:07,740:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-01-30 12:54:07,781:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-30 12:54:07,814:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-30 12:54:07,816:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is signed by the certificate's issuer. 2024-01-30 12:54:07,821:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is: OCSPCertStatus.GOOD 2024-01-30 12:54:07,831:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:15 UTC. 2024-01-30 12:54:07,831:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-30 12:54:07,831:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-30 12:54:07,835:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-30 12:54:07,836:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-30 12:54:07,836:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-30 12:54:07,842:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-30 12:54:07,843:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-30 12:54:07,845:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-30 12:54:08,321:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-30 12:54:08,321:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:54:07 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "qzZlWZW3ghw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-30 12:54:08,322:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-30 12:54:12,591:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7233_key-certbot.pem 2024-01-30 12:54:16,252:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7231_csr-certbot.pem 2024-01-30 12:54:16,253:DEBUG:acme.client:Requesting fresh nonce 2024-01-30 12:54:16,253:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-30 12:54:16,410:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-30 12:54:16,411:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:54:15 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YvNqN2-YZpRG-oefkwY9-VnEt37ll8dKjPx1udVwe6Yk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-30 12:54:16,411:DEBUG:acme.client:Storing nonce: VKfU247YvNqN2-YZpRG-oefkwY9-VnEt37ll8dKjPx1udVwe6Yk 2024-01-30 12:54:16,412:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-01-30 12:54:16,423:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1l2TnFOMi1ZWnBSRy1vZWZrd1k5LVZuRXQzN2xsOGRLalB4MXVkVndlNllrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "nFK3cbnJsQz7MMzuu2dr39XImpz7EBSvzis-Gq1DotDHr_llR-WzPsv5YOODpdq0VJ_q32TvPh2dRAwG23iHQBIYfZpaf5fuxJH7JZjNDugQCoMN99g398dc4WiQkrbz6YRMdG914v5gnX05pPhjXLl-Js8vCwddbWZby-CrKrXR8wnR00UnGHPg_het92SoTsVGaqo9VoOtE-zIvid0bWQ-QOKpuFhWZ6P2IVxQ3HJjM71om4vcgPxaWxbDf6QJebBkeyyr1icCIvyhIGa6C2OO9nuV54i7caDgnF2k59HD2RZKT-om8AqrBNi6ltBArdCUBATROl7FeDjbSppi0g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-01-30 12:54:16,616:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-01-30 12:54:16,617:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 30 Jan 2024 11:54:15 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463125096 Replay-Nonce: VKfU247Y0f6yXvG5dbEUwwvOtWs758KqUcAlyqdKt4Nn_fMA2SA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:45:30Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186209716" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463125096" } 2024-01-30 12:54:16,618:DEBUG:acme.client:Storing nonce: VKfU247Y0f6yXvG5dbEUwwvOtWs758KqUcAlyqdKt4Nn_fMA2SA 2024-01-30 12:54:16,618:DEBUG:acme.client:JWS payload: b'' 2024-01-30 12:54:16,624:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186209716: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1kwZjZ5WHZHNWRiRVV3d3ZPdFdzNzU4S3FVY0FseXFkS3Q0Tm5fZk1BMlNBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyMDk3MTYifQ", "signature": "OJR4N9frFaEbEwlmCR9D_nRw8eOa-n_iPaTqtQ8fWzGSgsvhVr2-oO65AHjrwqpyK6QfFSdE0__dk6D5vCMJUnUpA3vqkmVSghycj1WnANDyzDM0uxiy5Iq7Bn8jCVD_zIl78VU_1Dd0lCB9Zwmj7cK_wP8RAc4AtVSKFTjjYAYMp5jrFKczXLE_aWPZIeIlUd5JIPOphjtXPZNRrrUmpOFNJqRJTa_rD0I_t-XUmdMXJqA7bGvlndPZgScNT50xVLjk0hkaQTsqlw1ozPwtjElL9SmhvczGwGQa_slCMhRz6hzWI7CLkaLLK6mwSARSZvveLbz4O562aWUvLoxQIQ", "payload": "" } 2024-01-30 12:54:16,796:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186209716 HTTP/1.1" 200 810 2024-01-30 12:54:16,797:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:54:15 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc5hYo3kOtvT6WWYlGzx2YvkbIGJ4NFRvs5LKrdOa-Pny8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:45:30Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/6f0kFQ", "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/TzPnqw", "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/f71chA", "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo" } ] } 2024-01-30 12:54:16,798:DEBUG:acme.client:Storing nonce: R3i4Vkc5hYo3kOtvT6WWYlGzx2YvkbIGJ4NFRvs5LKrdOa-Pny8 2024-01-30 12:54:16,799:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-30 12:54:16,800:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-01-30 12:54:16,801:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-30 12:54:16,801:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-30 12:54:16,816:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-30 12:54:16,817:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-30 12:54:16,817:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-30 12:54:16,817:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-30 12:54:16,821:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-30 12:54:16,860:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-30 12:54:16,896:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-30 12:54:16,897:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-30 12:54:16,898:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-30 12:54:16,903:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:32 UTC. 2024-01-30 12:54:16,903:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-30 12:54:16,903:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-30 12:54:16,908:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-30 12:54:16,908:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-30 12:54:16,908:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-30 12:54:16,913:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-30 12:54:16,914:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-30 12:54:16,916:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-30 12:54:17,368:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-30 12:54:17,369:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:54:16 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "v1Prvm-Q_Bw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-01-30 12:54:17,370:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-30 12:54:21,549:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7234_key-certbot.pem 2024-01-30 12:54:25,170:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7232_csr-certbot.pem 2024-01-30 12:54:25,171:DEBUG:acme.client:Requesting fresh nonce 2024-01-30 12:54:25,171:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-30 12:54:25,321:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-30 12:54:25,322:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:54:24 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YIsfpv5icMafv2A4JiRyaGQbgvE8FOn1NYMeP1wGPxck X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-30 12:54:25,322:DEBUG:acme.client:Storing nonce: VKfU247YIsfpv5icMafv2A4JiRyaGQbgvE8FOn1NYMeP1wGPxck 2024-01-30 12:54:25,323:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-01-30 12:54:25,334:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lJc2ZwdjVpY01hZnYyQTRKaVJ5YUdRYmd2RThGT24xTllNZVAxd0dQeGNrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "pKhhV9cMPUaOAzEoJAfrxf_gZXbRIJ7PL5Q4_kDA5XSOVr2WecaUUO62c0ALMZjjn1ta0WSRH-m9MtuI3hAvpGTEeIJvAYnRMYf1lVmDhUYT8ex990TJBOd0R7ZHoMlCVOtegiKTrrTGTsesZ6QXQr9MND8_dYr1VW1WctoRSkV64XkxIPK5D_W3YUhGI3t2oO5GTb18qFtJtbspExJ4F_EqvRSeAkXznrmIJJnXGxhk64YGg0zph4l48XTDMKNB0z6PRJvlWx6siYjBBZCKoegnGmEbYoAXWd7uthgvVtfHe04g5GocHfVWpsMyAiVH3Xcsa0kIaY5CxAd3TP4c1A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-01-30 12:54:25,503:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-01-30 12:54:25,504:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 30 Jan 2024 11:54:24 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463146186 Replay-Nonce: VKfU247Y-P9bQ0XdduZ2eDG1KmI2l-h5d4-jmDqy62M6UTztOq0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:45:39Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186240836" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463146186" } 2024-01-30 12:54:25,505:DEBUG:acme.client:Storing nonce: VKfU247Y-P9bQ0XdduZ2eDG1KmI2l-h5d4-jmDqy62M6UTztOq0 2024-01-30 12:54:25,505:DEBUG:acme.client:JWS payload: b'' 2024-01-30 12:54:25,516:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186240836: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1ktUDliUTBYZGR1WjJlREcxS21JMmwtaDVkNC1qbURxeTYyTTZVVHp0T3EwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyNDA4MzYifQ", "signature": "ngfpgsL_7YH_YqZH7mL3grunBR9lDcDL901x_gpXEOdP3clAGm5kB9TC0qEidZaFsb_5WlleQTcJkuTgL0SnIOR1cQYIGQvzn25QY_I9rZY16_zAK_8JqcV7EM2nVFRRyNEEGqH55p84puLrSX-pewr6glkbC92wIBMO38SfN1KqSKy4wu6EjyPwEpXqtsNKGDxdH6N7ABUXcV2qlBAPSWcEjab2Z54SOpKDOL0tjQIwIBGR3ncUj9C1_mfoWzTqCCHBc5O9pHauVlU-6rx7dYtQlX0ylueLt4XEzYcBqf5rJEwIcQm51y2kTLrtAyTmkUZarmWSZ_bBHlrUJnz8Zg", "payload": "" } 2024-01-30 12:54:25,670:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186240836 HTTP/1.1" 200 804 2024-01-30 12:54:25,671:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:54:24 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc5qExGwgeUGy9CeOB6TLoWIWu6p7rNTDqxL1S8U6BqJjo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:45:39Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/g8SMBA", "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/KdDipg", "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/N41DHw", "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I" } ] } 2024-01-30 12:54:25,672:DEBUG:acme.client:Storing nonce: R3i4Vkc5qExGwgeUGy9CeOB6TLoWIWu6p7rNTDqxL1S8U6BqJjo 2024-01-30 12:54:25,673:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-30 12:54:25,674:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-01-30 12:54:25,674:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-30 12:54:25,675:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-30 12:54:25,676:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-30 12:54:25,677:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-30 12:54:25,677:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-30 12:54:25,678:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-30 12:54:25,679:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-30 12:54:25,717:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-30 12:54:25,765:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-30 12:54:25,767:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-01-30 12:54:25,769:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-01-30 12:54:25,778:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:49 UTC. 2024-01-30 12:54:25,778:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-30 12:54:25,779:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-30 12:54:25,786:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-30 12:54:25,786:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-30 12:54:25,787:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-30 12:54:25,791:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-30 12:54:25,792:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-30 12:54:25,793:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-30 12:54:26,322:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-30 12:54:26,323:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:54:25 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "hiVtrj1gauc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-30 12:54:26,324:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-30 12:54:30,136:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7235_key-certbot.pem 2024-01-30 12:54:33,751:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7233_csr-certbot.pem 2024-01-30 12:54:33,751:DEBUG:acme.client:Requesting fresh nonce 2024-01-30 12:54:33,751:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-30 12:54:33,927:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-30 12:54:33,928:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:54:33 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLClFUJSUNaTNP6pDzKCs8SzPqH7rwYQJREcRzHKlktx7Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-30 12:54:33,928:DEBUG:acme.client:Storing nonce: Wkq6jgLClFUJSUNaTNP6pDzKCs8SzPqH7rwYQJREcRzHKlktx7Q 2024-01-30 12:54:33,929:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-01-30 12:54:33,942:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENsRlVKU1VOYVROUDZwRHpLQ3M4U3pQcUg3cndZUUpSRWNSekhLbGt0eDdRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Hj4RmGuC1bfos02djGc1dBrxFm8df9cCgAQ_AYke0-JAyVEDSTtVfEJsA5q8Gmz5goUJ_LF6ZfLnlnehMfynYhtuY2Xuw2ngyelFJYM6x7Mvalz6BH6Xgya2y7mDGVFGaVCo8VdeXFMVMzBepEr_h3U99FBY3eQ0SY3JlEb0TCTIUHbNXpXdlHyWgvaAG0HialjGRSlQfQDrkh4xONta4b0fIzKXkUJimi1eBJAzTVQugcp6R8ZpGOgL3gCZLkuR4YnyrheAejZDZ0w7i9VQHoOACeY2DrJvOX3E-zUrTMK_4RDxIFY-GwylVRMpKeVulxK9VnsSUvp-2v3KheytOQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-01-30 12:54:34,130:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-01-30 12:54:34,131:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 30 Jan 2024 11:54:33 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463167526 Replay-Nonce: Wkq6jgLCspdDHS43mD3LmNj6BptC-5sdzKDoVZLfhDkMYehIK_I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:45:48Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186273596" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463167526" } 2024-01-30 12:54:34,131:DEBUG:acme.client:Storing nonce: Wkq6jgLCspdDHS43mD3LmNj6BptC-5sdzKDoVZLfhDkMYehIK_I 2024-01-30 12:54:34,132:DEBUG:acme.client:JWS payload: b'' 2024-01-30 12:54:34,140:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186273596: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENzcGRESFM0M21EM0xtTmo2QnB0Qy01c2R6S0RvVlpMZmhEa01ZZWhJS19JIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyNzM1OTYifQ", "signature": "eZBSXoXFZ75oryj5I-2ZNTay-lt8kV9Q4ntjET-4Y-HWZux3a9w7ic7beHUev6EIP_uqKfzRLw1dhLDchJkpf8KrxIqv41UQcQ87UxmWxd8VxLanP0gNo5xznKBMBal_KTf7gVI7dYnBI38rMPPXn326m0wySAYoW1T2YLZh6ycjuvxYdRMwtpBmajTAidnEkNpT2_wMlFJljXv2AVJMdv_JyxpoX-BH8epw8cLpYGi8Hw87KCqnccjHMMCiqJShy1a9W73IMNsEpg3IOA6481xJdzknvMZfio-VWRf1dHRIAjkwQTVujRKANSSosbQHC-_oBKivAYS3zFOp-Z0wQQ", "payload": "" } 2024-01-30 12:54:34,367:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186273596 HTTP/1.1" 200 807 2024-01-30 12:54:34,369:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:54:33 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZFY54189FgpExvmCOiZRhrnVGHxVNvNmtNrvtXiGozp1E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:45:48Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/KNqRXQ", "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/KMda1w", "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/f-1bag", "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE" } ] } 2024-01-30 12:54:34,369:DEBUG:acme.client:Storing nonce: fBfjtdZFY54189FgpExvmCOiZRhrnVGHxVNvNmtNrvtXiGozp1E 2024-01-30 12:54:34,371:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-30 12:54:34,371:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-01-30 12:54:34,372:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-30 12:54:34,373:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-30 12:54:34,374:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-30 12:54:34,375:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-30 12:54:34,375:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-30 12:54:34,376:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-30 12:54:34,378:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-30 12:54:34,417:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-30 12:54:34,454:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-30 12:54:34,456:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-30 12:54:34,457:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-30 12:54:34,462:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:03 UTC. 2024-01-30 12:54:34,462:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-30 12:54:34,463:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-30 12:54:34,468:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-30 12:54:34,469:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-30 12:54:34,469:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-30 12:54:34,473:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-30 12:54:34,473:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-30 12:54:34,475:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-30 12:54:34,931:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-30 12:54:34,932:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:54:34 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Ip3ebLGrn_Y": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-30 12:54:34,933:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-30 12:54:38,602:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7236_key-certbot.pem 2024-01-30 12:54:42,163:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7234_csr-certbot.pem 2024-01-30 12:54:42,164:DEBUG:acme.client:Requesting fresh nonce 2024-01-30 12:54:42,164:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-30 12:54:42,318:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-30 12:54:42,319:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:54:41 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247Yy3RIKE18ho5gZYEyiPZ5_xkJXusG3wn1C-uForwKODs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-30 12:54:42,320:DEBUG:acme.client:Storing nonce: VKfU247Yy3RIKE18ho5gZYEyiPZ5_xkJXusG3wn1C-uForwKODs 2024-01-30 12:54:42,320:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-01-30 12:54:42,329:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1l5M1JJS0UxOGhvNWdaWUV5aVBaNV94a0pYdXNHM3duMUMtdUZvcndLT0RzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "OEmyTPUa3WEoRcJGFq0uH5LC7jIXQRfCYgKKUniQsi8cuh5nKUv3xQz6sz36KbqdKFQb3MTANxkLGHWHPQCt9sz1nEyQDpJp-AsBlXKGXUU__RKiY2MOQwh0lSeZwcDLYMNHQb3XY3D9eCKFpQHuKwG6yNzT1p4vWpVLJmilRfD_q-6dH7b88dgg8hMG-zQH0D0z4KtMVEmgYbmmClFM7sAeEtRwBCQgEUWSCAJ1kIHKI6MFJjZBK8UJGnaKUgWkKhFqP-bIX9ziNUqXd29x2qRqXTpbQdtOfxbbd4Ey4SgX228V7mKLzgIjQqh1TkQ8ZZsPjAFQKbBdua2F2NliTA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-01-30 12:54:42,509:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-01-30 12:54:42,511:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 30 Jan 2024 11:54:41 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463187546 Replay-Nonce: VKfU247YolVJuoRBaj0vYrDnUY4KDkhFsAOcHOAJ0QZGNdYXeC4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:45:58Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186305236" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463187546" } 2024-01-30 12:54:42,512:DEBUG:acme.client:Storing nonce: VKfU247YolVJuoRBaj0vYrDnUY4KDkhFsAOcHOAJ0QZGNdYXeC4 2024-01-30 12:54:42,512:DEBUG:acme.client:JWS payload: b'' 2024-01-30 12:54:42,525:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186305236: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lvbFZKdW9SQmFqMHZZckRuVVk0S0RraEZzQU9jSE9BSjBRWkdOZFlYZUM0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzMDUyMzYifQ", "signature": "WHsSSb933p2D9RcXVTLf2qUvZfMVYog0MVZonxHT_JIzI6L6JDgzvS1j3t1bYxPI9M3TDKHq1i61cfGlO1U7AMtRB21OpE0AxvrZT7niWolq3t0IpvNHeQn7RLzXecS4C22yEbJ2FxPPkXQsZ85WHYw8L7LwyoNi9hrIbsscQzZoaY63VqyWUNLYpJebtcE-RbUABpIHp1tCYBYsctkFpJn2nVm26z0xzefDBs_8rO6aFM-bt9WqKXEzi8UgPV8Og4utBpDzmlVS1B1jfJeo4CtNr5L30yQ_TBro2SG3aoJ-Vi3c4jr4whg9nGekxxfKiyML1p7roPdqGrOPyJCUEg", "payload": "" } 2024-01-30 12:54:42,692:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186305236 HTTP/1.1" 200 801 2024-01-30 12:54:42,692:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:54:41 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc5nFb1SnIU-HhasA1aflDR-404rRHX2WlQAYydghapnAg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:45:58Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/H-2NUg", "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/SPl0kw", "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/dBmW2A", "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY" } ] } 2024-01-30 12:54:42,693:DEBUG:acme.client:Storing nonce: R3i4Vkc5nFb1SnIU-HhasA1aflDR-404rRHX2WlQAYydghapnAg 2024-01-30 12:54:42,693:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-30 12:54:42,693:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-01-30 12:54:42,694:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-30 12:54:42,694:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-30 12:54:42,695:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-30 12:54:42,695:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-30 12:54:42,695:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-30 12:54:42,695:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-30 12:54:42,696:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-30 12:54:42,743:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-30 12:54:42,815:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-30 12:54:42,818:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-30 12:54:42,819:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-30 12:54:42,826:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:20 UTC. 2024-01-30 12:54:42,826:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-30 12:54:42,826:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-30 12:54:42,831:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-30 12:54:42,831:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-30 12:54:42,832:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-30 12:54:42,836:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-30 12:54:42,837:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-30 12:54:42,838:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-30 12:54:43,288:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-30 12:54:43,289:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:54:42 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "lHRiErF1INc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-30 12:54:43,289:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-30 12:54:47,338:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7237_key-certbot.pem 2024-01-30 12:54:50,897:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7235_csr-certbot.pem 2024-01-30 12:54:50,897:DEBUG:acme.client:Requesting fresh nonce 2024-01-30 12:54:50,898:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-30 12:54:51,048:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-30 12:54:51,048:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:54:50 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc57dTK9qq6T_8TFScyL_glVLxvdwiCIhPI8Q6xrYhUw1Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-30 12:54:51,049:DEBUG:acme.client:Storing nonce: R3i4Vkc57dTK9qq6T_8TFScyL_glVLxvdwiCIhPI8Q6xrYhUw1Y 2024-01-30 12:54:51,049:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-01-30 12:54:51,054:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzU3ZFRLOXFxNlRfOFRGU2N5TF9nbFZMeHZkd2lDSWhQSThRNnhyWWhVdzFZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Y0RhJbwR39vafz8ChCfGQhsDJHKceg_Y96l2RIKtrvr-dlofw1S9bmohXIk1ozGdrLyamKNOlxxRvJvX-5rR2bLl2HT13e9LK7R2qqvsZE62jtAaNwkcUXlkkzaTDuwkdQub21WbwIDvlP4Vg1y4MMrsOcQddiLahUFch6ok5WvOOodCHf7cZBX0NckNtOg9YaaLwk9IKo6fjVxrcey-GvqW17zI1ShksT_6S1pQmPzdLYkSTYTtlkMWlyrCv6azCRQ9sJnwgTuFo7CZaDpsIBSAbATET4WztaaBwyevNGV7xteVo0wDjMLYs6YL05VeEU4c7-TWeeFV2bfxXW5d5A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-01-30 12:54:51,217:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-01-30 12:54:51,219:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 30 Jan 2024 11:54:50 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463215876 Replay-Nonce: VKfU247Ym4eabTAT7aDSRFL1MqnyIkxw5Xv12SbbrBcNOQYkvuc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:07Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186343916" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463215876" } 2024-01-30 12:54:51,219:DEBUG:acme.client:Storing nonce: VKfU247Ym4eabTAT7aDSRFL1MqnyIkxw5Xv12SbbrBcNOQYkvuc 2024-01-30 12:54:51,220:DEBUG:acme.client:JWS payload: b'' 2024-01-30 12:54:51,228:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186343916: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1ltNGVhYlRBVDdhRFNSRkwxTXFueUlreHc1WHYxMlNiYnJCY05PUVlrdnVjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzNDM5MTYifQ", "signature": "ID1wA0YhxvLqCRfu73605RF7cm4oyXY0aFwPdmDmnZ1bNgtIxC1ykgyzIbKbH0ZrVbIObafyfCE6yZddV2jlx68LYiE5OGuxw8t236EWEuqkjYPuDxEmNnOe5cXZShh3xBlmk_rd1pUQ0M2zdccnrLx6j-koTvTUsYZCXczjy0MgEwWLdZWvBCCGsT4gnJiibZSp2ZyA7JNlD6HemhN-X5IFHjfVPdsLAu-s79ueHfTsfLAUmOnQkt2ybvCJGCmcRVdEwMqGxImRnjtWAL-_Vk9qKoLRvuR3auizu8IEcQiLY-mX54AY-lfmIiA8IFK4Y3sZciEuqdtFjxrbnetaoQ", "payload": "" } 2024-01-30 12:54:51,389:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186343916 HTTP/1.1" 200 805 2024-01-30 12:54:51,390:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:54:50 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YM4LqS22hhs1_euCJ-ExsJ4SsvMP3xA2ck2Zf3cEL4QA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:07Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/FQmNLA", "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/nw3Heg", "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/o7wJkQ", "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE" } ] } 2024-01-30 12:54:51,391:DEBUG:acme.client:Storing nonce: VKfU247YM4LqS22hhs1_euCJ-ExsJ4SsvMP3xA2ck2Zf3cEL4QA 2024-01-30 12:54:51,392:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-30 12:54:51,392:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-01-30 12:54:51,393:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-30 12:54:51,393:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-30 12:54:51,394:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-30 12:54:51,394:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-30 12:54:51,394:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-30 12:54:51,395:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-30 12:54:51,397:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-30 12:54:51,446:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-30 12:54:51,475:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-30 12:54:51,476:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-01-30 12:54:51,477:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-01-30 12:54:51,481:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:36 UTC. 2024-01-30 12:54:51,482:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-30 12:54:51,482:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-30 12:54:51,487:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-30 12:54:51,487:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-30 12:54:51,487:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-30 12:54:51,491:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-30 12:54:51,492:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-30 12:54:51,494:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-30 12:54:51,957:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-30 12:54:51,958:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:54:51 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "uFLv3ssKGH8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-01-30 12:54:51,959:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-30 12:54:55,849:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7238_key-certbot.pem 2024-01-30 12:54:59,402:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7236_csr-certbot.pem 2024-01-30 12:54:59,403:DEBUG:acme.client:Requesting fresh nonce 2024-01-30 12:54:59,403:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-30 12:54:59,557:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-30 12:54:59,558:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:54:58 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc5t26kOvaRL7uYUxAO-CCvL4NqnAyJcm8qA28qRA5ttM0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-30 12:54:59,558:DEBUG:acme.client:Storing nonce: R3i4Vkc5t26kOvaRL7uYUxAO-CCvL4NqnAyJcm8qA28qRA5ttM0 2024-01-30 12:54:59,558:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-01-30 12:54:59,564:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzV0MjZrT3ZhUkw3dVlVeEFPLUNDdkw0TnFuQXlKY204cUEyOHFSQTV0dE0wIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "l4gLVEgBEhQe1QADWnmNwKleztoRH0tXjtBIzN8zAzzg0zRiAvaSWQ8jJ1BGgFosfgbPTMUGQKZPIcx1IpHiFkncPi1_PD5d7BcoNGwc_80EVDHy7JeFLaZgfghVNM7q1HiGYY6eMcXJo5fBY43OmF0452ZA39b7xlKPDqnb0jTOWxjQUwgdODL8sCwdqKvk0YJOb4DZlPss_wOr3drnThqBSBwwqSkO69dcG-Bdi6Ij0s_sbQlk9sZkaC4y3AWy8JEO51WuUadL-4JR0Kpy8wcoes9q-kxbNclPPKoCg3PXP3kWxCBghrKxMtGAkoTIYnEkqrMyw4m5DSU0nEcdVA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-01-30 12:54:59,737:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-01-30 12:54:59,739:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 30 Jan 2024 11:54:58 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463242076 Replay-Nonce: VKfU247YoG4TMutIymAtlKdSzL8ZifENI5iqiHv-2sy7Gt6rh6w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:16Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186384516" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463242076" } 2024-01-30 12:54:59,739:DEBUG:acme.client:Storing nonce: VKfU247YoG4TMutIymAtlKdSzL8ZifENI5iqiHv-2sy7Gt6rh6w 2024-01-30 12:54:59,740:DEBUG:acme.client:JWS payload: b'' 2024-01-30 12:54:59,747:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186384516: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lvRzRUTXV0SXltQXRsS2RTekw4WmlmRU5JNWlxaUh2LTJzeTdHdDZyaDZ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzODQ1MTYifQ", "signature": "M7l6iniipREzRo0Q7e8HbN_IGHRcbXEH14nz_7PJgJRLuXFsPv_-lfdtzg952skSh3I7FIA_Gl1uAWR6WsjOFLuqil36zSkSFbWzfqTKHU7QmAkHfa9CSMi2uojojJqmMGeWXAl3g-IrG2V3LjCt5JESGl5Hhi24vpmQCGtgUPjvC1dXpQc0A-D72iZKX3csLMUMnw6SErQftvNqGYinCaeIMjmM7nG4VcBH4P1ZuboFJ1NSMwokG_j2s8b71qaqYiC2U5Szx7Qi2ScyLZWgzk80vfBsCvb0DP8sTja8C528xCCv8g-J4QbcBARKR1BUMBFkv507WmP3yEqs4QEVKQ", "payload": "" } 2024-01-30 12:54:59,920:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186384516 HTTP/1.1" 200 809 2024-01-30 12:54:59,922:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:54:59 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YciXHA6QkkwqNFTVI0kzUKjp8v9LPOwUHmnXo80edKSs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:16Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/iy166A", "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/FJ3duA", "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/0qWA8w", "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY" } ] } 2024-01-30 12:54:59,922:DEBUG:acme.client:Storing nonce: VKfU247YciXHA6QkkwqNFTVI0kzUKjp8v9LPOwUHmnXo80edKSs 2024-01-30 12:54:59,924:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-30 12:54:59,924:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-01-30 12:54:59,924:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-30 12:54:59,925:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-30 12:54:59,925:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-30 12:54:59,926:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-30 12:54:59,926:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-30 12:54:59,926:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-30 12:54:59,927:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-30 12:54:59,973:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-30 12:55:00,007:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-30 12:55:00,008:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-30 12:55:00,009:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-30 12:55:00,014:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:50 UTC. 2024-01-30 12:55:00,015:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-30 12:55:00,015:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-30 12:55:00,019:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-30 12:55:00,019:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-30 12:55:00,019:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-30 12:55:00,024:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-30 12:55:00,025:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-30 12:55:00,026:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-30 12:55:00,493:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-30 12:55:00,494:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:54:59 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "6g5-wTD8fP4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-30 12:55:00,494:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-30 12:55:04,099:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7239_key-certbot.pem 2024-01-30 12:55:07,651:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7237_csr-certbot.pem 2024-01-30 12:55:07,652:DEBUG:acme.client:Requesting fresh nonce 2024-01-30 12:55:07,652:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-30 12:55:07,811:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-30 12:55:07,812:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:55:06 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YLrizgWhKhyLABEUqMZ3z2Efa9fQsUTg_Zhyh3-1xTss X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-30 12:55:07,812:DEBUG:acme.client:Storing nonce: VKfU247YLrizgWhKhyLABEUqMZ3z2Efa9fQsUTg_Zhyh3-1xTss 2024-01-30 12:55:07,813:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-01-30 12:55:07,827:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lMcml6Z1doS2h5TEFCRVVxTVozejJFZmE5ZlFzVVRnX1poeWgzLTF4VHNzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "FMZLLdloDelTswjGTX7v_EmIIclTDuzJPlQ5s09iETN0MqVgaIvbtJGJyEMaosQyPEzivfcnWmmKTSVbXCGopZEv30W3ylH_U7vVOxk_fZXi-HBao16wRBhhe0x-R9NUU5X36sRv5V91BOOLqYl2VF8RVOzGwyOSSR9AM-Le2wewvJgwMTbo0VAxOUhItbmrGlM6fgimYp4SAQ8_rGOr-KuM1mXLjNPwDca7jSbIxI6h9pzs8d17tDtFyw6fuMH7_eOsdn07TLqO9KR5Bu8yVwSXnihK8FU8T1qRkRMi4NZa1PGJsJfgFGuaaklqgfu0qff6eRzJhiXEUQ3BHTMCnQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-01-30 12:55:08,000:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-01-30 12:55:08,001:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 30 Jan 2024 11:55:07 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463267436 Replay-Nonce: R3i4Vkc536b9uw82DMKymXV6vzhV7r8PIeL4LOzOYYkvZx4ut5U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:25Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186423616" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463267436" } 2024-01-30 12:55:08,001:DEBUG:acme.client:Storing nonce: R3i4Vkc536b9uw82DMKymXV6vzhV7r8PIeL4LOzOYYkvZx4ut5U 2024-01-30 12:55:08,002:DEBUG:acme.client:JWS payload: b'' 2024-01-30 12:55:08,011:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186423616: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzUzNmI5dXc4MkRNS3ltWFY2dnpoVjdyOFBJZUw0TE96T1lZa3ZaeDR1dDVVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY0MjM2MTYifQ", "signature": "j0eHBf531QUTbszXNVuQhl8mpkIBL7021FXeX9j7-nmV2qYMEJ3FTHXnQsniVJva8QMazMYReeMjRw0HfEVDhfM4eQSGPkRCQozk7rGl7yPSe1T_bJcsP1L7UBKVDjm4kCHoq0gDvnvoGJMw5DwnRzGjXr154SyefSTUcQ1DqGK3xHSoEkdBhtx_2pdWkY_uEcI37SWffLy9xJexo-RqY9BtFXeC_5w0PFS0Q02-uteUpHP9xn1pIitbj62I3E7Ag6ZbCGaXy2djfz-boK66PZ8HA9YA5MxQ29Vs-TaqWDIwdqCNZJEyK9mGW3f5gMlGxbpd0z_6434gu40lI_TqMA", "payload": "" } 2024-01-30 12:55:08,174:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186423616 HTTP/1.1" 200 806 2024-01-30 12:55:08,174:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:55:07 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc5WO1--YYJ909mHSy4jG1ufoZoOqJdYH2Wf4j3jxXE4VY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:25Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/sGt3LQ", "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/-siQUw", "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/rUgQOA", "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg" } ] } 2024-01-30 12:55:08,175:DEBUG:acme.client:Storing nonce: R3i4Vkc5WO1--YYJ909mHSy4jG1ufoZoOqJdYH2Wf4j3jxXE4VY 2024-01-30 12:55:08,175:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-30 12:55:08,175:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-01-30 12:55:08,176:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-30 12:55:08,176:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-30 12:55:08,177:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-30 12:55:08,177:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-30 12:55:08,177:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-30 12:55:08,177:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-30 12:55:08,179:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-30 12:55:08,223:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-01-30 12:55:08,223:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-30 12:55:08,223:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-01-30 12:55:08,231:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-01-30 12:55:08,233:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-01-30 12:55:08,233:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-01-30 12:55:08,233:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-01-30 12:55:08,234:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-01-30 12:55:08,236:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-01-30 12:55:08,273:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-30 12:55:08,303:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-30 12:55:08,304:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-30 12:55:08,305:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-30 12:55:08,310:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:07 UTC. 2024-01-30 12:55:08,310:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-30 12:55:08,311:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-30 12:55:08,316:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-30 12:55:08,316:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-30 12:55:08,316:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-30 12:55:08,320:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-30 12:55:08,321:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-30 12:55:08,323:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-30 12:55:08,904:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-30 12:55:08,906:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:55:08 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "gy1p3IVwBQo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-30 12:55:08,907:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-30 12:55:12,530:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7240_key-certbot.pem 2024-01-30 12:55:16,069:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7238_csr-certbot.pem 2024-01-30 12:55:16,069:DEBUG:acme.client:Requesting fresh nonce 2024-01-30 12:55:16,069:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-30 12:55:16,248:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-30 12:55:16,249:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:55:15 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCrMMIuYskBBekEp960MKh9VTxmZG9_49ySmvu4daTFmY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-30 12:55:16,249:DEBUG:acme.client:Storing nonce: Wkq6jgLCrMMIuYskBBekEp960MKh9VTxmZG9_49ySmvu4daTFmY 2024-01-30 12:55:16,249:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-01-30 12:55:16,260:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENyTU1JdVlza0JCZWtFcDk2ME1LaDlWVHhtWkc5XzQ5eVNtdnU0ZGFURm1ZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "WS2rCz4lRw7bzk_yTNhEt0-tCCgCsML2XBOnb4p-4nN5ksPCbVRNNVdZCliKXShNmivJ4wQ8CzFHvNfUdBIELBRoBc6sQEvjJ3ptwTYaiVB0GIgT2kyznxjRaSXxteOhBiqn1piaplcz8QZ8LLzrnmhpLorLti86Z_0S7hU2i0nOrS9zFya8VJwjT3C6zpYhVipdtoC-piHgTjvkbStgdS_0pAf_iUiNbZhl2qLpM09xgIiBT0aeCNywyloINQfVhUB1btBg6Zp3MSs2Gp7uY3iNb8BF3alV-7lzDsjqMJfTEGvPUv6y02q9nTdzUCrH9a1J1Y2ROraLS4miWBb9zw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-01-30 12:55:16,466:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-01-30 12:55:16,467:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 30 Jan 2024 11:55:15 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463293726 Replay-Nonce: Wkq6jgLC0xYl38BGEM7pw0YBs9B_v1jo12bLpdQaWz8GOJXWwvQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:34Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186467546" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463293726" } 2024-01-30 12:55:16,467:DEBUG:acme.client:Storing nonce: Wkq6jgLC0xYl38BGEM7pw0YBs9B_v1jo12bLpdQaWz8GOJXWwvQ 2024-01-30 12:55:16,468:DEBUG:acme.client:JWS payload: b'' 2024-01-30 12:55:16,473:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186467546: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTEMweFlsMzhCR0VNN3B3MFlCczlCX3Yxam8xMmJMcGRRYVd6OEdPSlhXd3ZRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY0Njc1NDYifQ", "signature": "k4-aeoVlKo4eGJQTW_auRId_G-VtPqhNIBsKT1VBDFx66yRG9Cr1J7UISRNFANoJp4xuYr2uy1QU7jYdOP1OmT7ePEHFrhtmzbSyzFXOjOSLfbwdlT5GLwRVLLQcOyjyDv-MIglGsx2_yd_BKUQ3LiHxLpLX-zO-Bdq7oJOP_akzpe2gkyb6bEvaML4b_ZKaiUruK7O-r0egvFGJpp2LXO2bu5jEKydxa1D4XbOSj3mp77iIaoWaHVhiPtfeNbA8b5lvkS4xq_GLxXpbrB2idp9HRDe9UDNOwQUDiSaOwAj4I2jno-Jen6gx410qdGU3krhwhPGJKOyV7jeI93Re5w", "payload": "" } 2024-01-30 12:55:16,656:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186467546 HTTP/1.1" 200 811 2024-01-30 12:55:16,656:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:55:15 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZF0WIOyrFujujDcUKWNlz7sCHtXlgZ37Gpfjw7eGv4VpQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:34Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/n-ZWjw", "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/NYrS2A", "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/g51OFg", "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU" } ] } 2024-01-30 12:55:16,657:DEBUG:acme.client:Storing nonce: fBfjtdZF0WIOyrFujujDcUKWNlz7sCHtXlgZ37Gpfjw7eGv4VpQ 2024-01-30 12:55:16,657:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-30 12:55:16,657:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-01-30 12:55:16,658:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-30 12:55:16,658:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-30 12:55:16,659:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-30 12:55:16,659:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-30 12:55:16,659:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-30 12:55:16,659:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-30 12:55:16,660:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-30 12:55:16,697:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-30 12:55:16,728:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-30 12:55:16,730:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-30 12:55:16,731:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-30 12:55:16,736:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:31 UTC. 2024-01-30 12:55:16,737:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-30 12:55:16,737:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-30 12:55:16,742:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-30 12:55:16,742:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-30 12:55:16,742:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-30 12:55:16,746:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-30 12:55:16,747:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-30 12:55:16,749:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-30 12:55:17,199:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-30 12:55:17,200:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:55:16 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "4Ap1w8PX3NM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-30 12:55:17,200:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-30 12:55:21,428:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7241_key-certbot.pem 2024-01-30 12:55:24,949:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7239_csr-certbot.pem 2024-01-30 12:55:24,950:DEBUG:acme.client:Requesting fresh nonce 2024-01-30 12:55:24,950:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-30 12:55:25,099:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-30 12:55:25,100:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:55:24 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc54D8ks_jYv5N4imObEjXKocbHFZU-svzg0R3XeRd-TdA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-30 12:55:25,101:DEBUG:acme.client:Storing nonce: R3i4Vkc54D8ks_jYv5N4imObEjXKocbHFZU-svzg0R3XeRd-TdA 2024-01-30 12:55:25,102:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-01-30 12:55:25,112:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzU0RDhrc19qWXY1TjRpbU9iRWpYS29jYkhGWlUtc3Z6ZzBSM1hlUmQtVGRBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "umkORJSy8P9yKNpeI01rw5kpBq-ln7UGleI1mfcuSGx7fRLn93P_dvYZQ74ZQKL2eG0opvzE9OR46zsU1f7i0GTmUQHGS8NjiMm0EE5jSZyamu3xBd2rTTH2836enicavze115pshILdgJLtcfKEwlOMdtLXyc68xDjf5Z3EQ_3YUv03_sQAWGiwmT85y_exHifLnfbVjlXqfgN0UgCpkiTZZl6kZUamtIZqSxjOagTRjYCDcWtvlv5iy6s-qHshffjbF9RWOlP8vEkOrLG1xD82SPCQDkX5nmbd9Bh710WDi8NK0nkMy4sbTm49LejqBDhjTpQHscss0fKCCVzaZg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-01-30 12:55:25,273:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-01-30 12:55:25,274:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 30 Jan 2024 11:55:24 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463315236 Replay-Nonce: VKfU247Ylh6XlBVB1VgP--FjZvQ5MTP08oXL3YtEZmFki0gXBfA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:43Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186500336" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463315236" } 2024-01-30 12:55:25,275:DEBUG:acme.client:Storing nonce: VKfU247Ylh6XlBVB1VgP--FjZvQ5MTP08oXL3YtEZmFki0gXBfA 2024-01-30 12:55:25,275:DEBUG:acme.client:JWS payload: b'' 2024-01-30 12:55:25,289:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186500336: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lsaDZYbEJWQjFWZ1AtLUZqWnZRNU1UUDA4b1hMM1l0RVptRmtpMGdYQmZBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1MDAzMzYifQ", "signature": "QMn7JUdKbQ7msc8oKxdJ7Epbgl93oc8S_Jc2pIiZnFI_Pb-lV6tNeDpG89cXzySkZC-tXcohSgPTGR6H6I5r_CFKxgKXGSIvydjGTRPMi82kz0s4iEn-o_kM2ieyC4uMlObSbFVFbh1BS9HbL7DTyXL0dOxiElMoaqgUkpOqMeN6GADpYPs_HTSvb2t99dkU0xehZ5WmvMpZi_qKL128pXdhDrQfBwxN0FhVnXguHGJVdQxv52u0yO6ll23JNAmmbMJTtP6jUZulIb7Ywg00yYg-iKJV8D0i0hUXAFaBiUU-50WPyivvhtbFIwk8ucW_6iOqXcwBMmqmwHz4mehLtA", "payload": "" } 2024-01-30 12:55:25,459:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186500336 HTTP/1.1" 200 810 2024-01-30 12:55:25,461:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:55:24 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc5e_ZT9vqiaLvS6_4gia3L3-3GtkdhSBPJjX_jhcE-s8I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:43Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/MLFeSA", "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/NegWfw", "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/0vtuKQ", "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0" } ] } 2024-01-30 12:55:25,461:DEBUG:acme.client:Storing nonce: R3i4Vkc5e_ZT9vqiaLvS6_4gia3L3-3GtkdhSBPJjX_jhcE-s8I 2024-01-30 12:55:25,463:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-30 12:55:25,463:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-01-30 12:55:25,464:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-30 12:55:25,465:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-30 12:55:25,466:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-30 12:55:25,467:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-30 12:55:25,467:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-30 12:55:25,468:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-30 12:55:25,469:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-30 12:55:25,514:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-30 12:55:25,528:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-30 12:55:25,530:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-01-30 12:55:25,531:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-01-30 12:55:25,536:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:09 UTC. 2024-01-30 12:55:25,536:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-30 12:55:25,537:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-30 12:55:25,544:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-30 12:55:25,544:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-30 12:55:25,544:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-30 12:55:25,548:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-30 12:55:25,549:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-30 12:55:25,551:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-30 12:55:26,001:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-30 12:55:26,002:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:55:25 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "9wnpB_OcwC0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-30 12:55:26,002:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-30 12:55:29,742:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7242_key-certbot.pem 2024-01-30 12:55:33,242:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7240_csr-certbot.pem 2024-01-30 12:55:33,243:DEBUG:acme.client:Requesting fresh nonce 2024-01-30 12:55:33,243:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-30 12:55:33,394:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-30 12:55:33,394:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:55:32 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc5XSERbdRvVBjDk4OajeMxllmTKKmbiZPGa8Cm4yV6BeI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-30 12:55:33,395:DEBUG:acme.client:Storing nonce: R3i4Vkc5XSERbdRvVBjDk4OajeMxllmTKKmbiZPGa8Cm4yV6BeI 2024-01-30 12:55:33,395:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-01-30 12:55:33,399:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVYU0VSYmRSdlZCakRrNE9hamVNeGxsbVRLS21iaVpQR2E4Q200eVY2QmVJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "tDuPLHeMmpdqa2Uxjj_otueFdVR7YbIh6k_yoMGxTBOmq2ZFuN4ovFR3bDmvQ9abJTB6sRtwVMnLUM71QfShKpF3IuPxwklKPVsv66rVsvSxuv41J7Dhf-pJST1r7j_zdHxkALRMqeMgVoYNlZcGN81fNKGlJsVgqWnZeTt1whNYVC4swbX-rwNvNt2Fl5flYHWrJOHUwnrr2b-Q0OjUAhKT_yx-ULruhrpSsthKQjPOQdY2mXSHB3vXDaoTcX2BSygaPSIh42duTygwuau6phAxC14ar8-smfDxH3NxoLiu2puhUKlU0upm4iRovqLI4n47xrovZ5Fg3qVRqPbkgA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-01-30 12:55:33,582:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-01-30 12:55:33,583:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 30 Jan 2024 11:55:32 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463336576 Replay-Nonce: R3i4Vkc5pNzs4uvpLXPQiwpXZG48u1mrLWGJnOdL_AQNU31CZAs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:52Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186530456" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463336576" } 2024-01-30 12:55:33,583:DEBUG:acme.client:Storing nonce: R3i4Vkc5pNzs4uvpLXPQiwpXZG48u1mrLWGJnOdL_AQNU31CZAs 2024-01-30 12:55:33,584:DEBUG:acme.client:JWS payload: b'' 2024-01-30 12:55:33,598:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186530456: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVwTnpzNHV2cExYUFFpd3BYWkc0OHUxbXJMV0dKbk9kTF9BUU5VMzFDWkFzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1MzA0NTYifQ", "signature": "QmEfcHUbDOGNtYjFnqBShDrlnVD7Z25X9naH7xyXIhRib34Ky-h_g2YuEGfPK9tVBNeqL_nZxC3xRUsXrv35EPizwlN1eJdG_W4qIr19A1f9q9XmXg4rKFmezTnxBKPJFlS2P6eezdKe9wabBd6gOE61tkTIoxw3PxXzFUJKoKle1y-hkziOHR9BYqmWcCeWQEKlFylMecQn3qfSmoT9IEADxXrYYpFWFtnZqT3b9YFWCg4jEG5GOFUhr-HkIPyT3DHwiUr5KefE5wmuM2wiSPk4aAmx6PYv8mHbsFDMhwJZqwTTwTEl8P-SL6RaC8PHCNHk3qy0z8c7cVDEGyEoVg", "payload": "" } 2024-01-30 12:55:33,770:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186530456 HTTP/1.1" 200 809 2024-01-30 12:55:33,772:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:55:32 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YPg6dvRt8D0RhaRiqtBewHDNx0wcTrs1zTMWMbgxf36E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:52Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/ibbbOA", "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/W42erg", "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/xDGKCQ", "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI" } ] } 2024-01-30 12:55:33,772:DEBUG:acme.client:Storing nonce: VKfU247YPg6dvRt8D0RhaRiqtBewHDNx0wcTrs1zTMWMbgxf36E 2024-01-30 12:55:33,772:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-30 12:55:33,772:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-01-30 12:55:33,773:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-30 12:55:33,774:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-30 12:55:33,775:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-30 12:55:33,775:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-30 12:55:33,776:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-30 12:55:33,776:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-30 12:55:33,779:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-30 12:55:33,816:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-30 12:55:33,833:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-30 12:55:33,834:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is signed by the certificate's issuer. 2024-01-30 12:55:33,835:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD 2024-01-30 12:55:33,839:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:26 UTC. 2024-01-30 12:55:33,839:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-30 12:55:33,840:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-30 12:55:33,845:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-30 12:55:33,845:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-30 12:55:33,845:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-30 12:55:33,849:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-30 12:55:33,850:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-30 12:55:33,852:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-30 12:55:34,404:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-30 12:55:34,405:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:55:33 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "I6dWIfhxHP4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-30 12:55:34,405:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-30 12:55:38,067:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7243_key-certbot.pem 2024-01-30 12:55:41,566:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7241_csr-certbot.pem 2024-01-30 12:55:41,566:DEBUG:acme.client:Requesting fresh nonce 2024-01-30 12:55:41,566:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-30 12:55:41,748:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-30 12:55:41,750:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:55:40 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLC1Sqmr7TJXPPkB5GkP16vGhVjalXqKiFqbqsyYkfF92k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-30 12:55:41,750:DEBUG:acme.client:Storing nonce: Wkq6jgLC1Sqmr7TJXPPkB5GkP16vGhVjalXqKiFqbqsyYkfF92k 2024-01-30 12:55:41,751:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-01-30 12:55:41,761:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTEMxU3FtcjdUSlhQUGtCNUdrUDE2dkdoVmphbFhxS2lGcWJxc3lZa2ZGOTJrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "mJ-P1mVMBoc-zDvI0k1MNTm5brMFirRLtBkwUiQ380ll7QwScFdxN_2keE-91PpjCAv8rtv7YCheMwiOPYO6da12THxap5PmLYFY7GDNyE5mj5VJkMd5k3hLT4UXkpXChrBQvGMw9b0rZ0QoyEnsQ_N4f0V2CenNeeB2FrnkyGmhWRFtpU9i2wqAfP7druZO0BdncdNYlROV-gMqv27Njj4_K3x1d5gESb8sTwlQqrB5_4YrMqEqAtju-QJE7mHkfD1TxeUnn9SgHwbLLbj4rfsFLOr3PTN8rOH6rj_J4Zz3TYwz5Tm06ACiXVrSC5BNPHtcjOGVHt3_efKI6GxmrQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-01-30 12:55:41,953:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-01-30 12:55:41,954:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 30 Jan 2024 11:55:41 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463357966 Replay-Nonce: fBfjtdZFwTZrg0xPQoEigNMU9xwLbR_3tRsr4L-1bHp97AwMq44 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:47:01Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186562236" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463357966" } 2024-01-30 12:55:41,954:DEBUG:acme.client:Storing nonce: fBfjtdZFwTZrg0xPQoEigNMU9xwLbR_3tRsr4L-1bHp97AwMq44 2024-01-30 12:55:41,954:DEBUG:acme.client:JWS payload: b'' 2024-01-30 12:55:41,962:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186562236: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZ3VFpyZzB4UFFvRWlnTk1VOXh3TGJSXzN0UnNyNEwtMWJIcDk3QXdNcTQ0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1NjIyMzYifQ", "signature": "f6LG08YhXGmgP1s7ieJhlgIpP-eBUP7Yw_wYyJx_RfRu_ZQaGruo2cqV_TtCkEEFXoKHuR_xVF-9SXOw9AtPfuOamiYlY8YbhGtdg8sh0O0Ddws6rCbqisn-GpI2dUlAwljZwzqWy42qDEkkpVNgbNMfRdy5aXzGSL8s0bfLw1MOuLlilTF7bfiFytEU1JSV4J__Dlr3-dskwNG8dMXxuq8FClBaSZqJ2M-fOa5TDUFYMto3Owmv4Cx3PeA2LAT2GLdH0x9SrJ41T2S2tgd1m8yV74Xy6GMuec-EGzeH7RNjCYEVx2gUSWDatZcmFILBCgDhrMYSrPotttklX5DrgA", "payload": "" } 2024-01-30 12:55:42,148:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186562236 HTTP/1.1" 200 805 2024-01-30 12:55:42,149:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:55:41 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCmWSoevUDCkbjQzVsuOpXmv8ym48U6AhosBJgHz5pbl0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:47:01Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/d2C2Aw", "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/yk_m2Q", "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/2CxhFQ", "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE" } ] } 2024-01-30 12:55:42,150:DEBUG:acme.client:Storing nonce: Wkq6jgLCmWSoevUDCkbjQzVsuOpXmv8ym48U6AhosBJgHz5pbl0 2024-01-30 12:55:42,151:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-30 12:55:42,151:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-01-30 12:55:42,152:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-30 12:55:42,153:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-30 12:55:42,154:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-30 12:55:42,154:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-30 12:55:42,155:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-30 12:55:42,155:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-30 12:55:42,157:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-30 12:55:42,204:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-30 12:55:42,236:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-30 12:55:42,237:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-30 12:55:42,238:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-30 12:55:42,244:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:43 UTC. 2024-01-30 12:55:42,244:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-30 12:55:42,245:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-30 12:55:42,249:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-30 12:55:42,249:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-30 12:55:42,249:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-30 12:55:42,255:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-30 12:55:42,255:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-30 12:55:42,257:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-30 12:55:42,712:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-30 12:55:42,713:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:55:41 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "lJu8a3ue6k0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-30 12:55:42,714:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-30 12:55:46,457:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7244_key-certbot.pem 2024-01-30 12:55:49,952:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7242_csr-certbot.pem 2024-01-30 12:55:49,953:DEBUG:acme.client:Requesting fresh nonce 2024-01-30 12:55:49,953:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-30 12:55:50,104:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-30 12:55:50,105:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:55:49 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc51rZ4CfmvjenvGw6ZrLR3fZw3lHc1LMzNOzTOm1SvtVc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-30 12:55:50,106:DEBUG:acme.client:Storing nonce: R3i4Vkc51rZ4CfmvjenvGw6ZrLR3fZw3lHc1LMzNOzTOm1SvtVc 2024-01-30 12:55:50,106:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-01-30 12:55:50,116:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzUxclo0Q2ZtdmplbnZHdzZackxSM2ZadzNsSGMxTE16Tk96VE9tMVN2dFZjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "fwwmgRA3u4mMAwFsD-01n5Hwk4XuhLNNP0MTxPSUJVNfxtjrZr0AY5K2na2z-vl85sm0-X7OenyhvM2jZGI0KyQ0dgtAOtRyspaFkRvEc3JbHx8L_x-oYL-u0yw_SgSghoI8tJQ969kRqTpzfwKpNQgv5Tn_7L8G8d_pAT0Amx0b96HxJlQGdsPDGnBJfMn2xd-JitIOF8vdnDR2_C3blKp359GMXdz6J09qm7SVdVKGgL0d6sUcj3GzGcuHQaO_jIU0Tw-7cez8We-oM1FIUNAQ5pXmdhJwZeq2TkQRpOFO4_fm5oTY6TLGe7YuzGFaOTXEEQxJd4ZA3ZfLcWX_fw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-01-30 12:55:50,279:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-01-30 12:55:50,280:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 30 Jan 2024 11:55:49 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463390816 Replay-Nonce: R3i4Vkc5z191q3GChsCDVZ9c9ancSb3u93_FZXdEDTFNr5wJtK8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:47:11Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186609606" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463390816" } 2024-01-30 12:55:50,281:DEBUG:acme.client:Storing nonce: R3i4Vkc5z191q3GChsCDVZ9c9ancSb3u93_FZXdEDTFNr5wJtK8 2024-01-30 12:55:50,281:DEBUG:acme.client:JWS payload: b'' 2024-01-30 12:55:50,294:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186609606: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzV6MTkxcTNHQ2hzQ0RWWjljOWFuY1NiM3U5M19GWlhkRURURk5yNXdKdEs4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY2MDk2MDYifQ", "signature": "SzqjRFd_H8r2RsHoKIcfYgvWxGVhYqDAFoglV7kDkwVomGO1vfx6Wh36LRPZBg1pmTbME3NqGzvLS_DMVXMmWVct_SK4mNRIQv2a2cOHutgKY-5C9Jgv4vVkZR3Lc9WH43b4OND8dPjuVMxYDuvwx12Mec6shKl8j77O3gFe1cmGmtoVwVjEdk-S4MKyt2K8UZvnMEesDIUHHCVGzZno01BhMJEApX5DhsuQV4reY6pxidWUxYiK3Jry0Dx09-mdCETjd9iODoNqVeW5GZcME1UcuT2HwKfph1cgaQW_LexTa5LCgCDCq0M4TUHcf9Y3PfxbXd_LVDM6kwJ1jv9HQA", "payload": "" } 2024-01-30 12:55:50,450:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186609606 HTTP/1.1" 200 805 2024-01-30 12:55:50,452:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:55:49 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc54CWkBHLpcNh6Zz4RKq04katWvSHv9f5h7a__t6jNuTI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:47:11Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/u86J_A", "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/GMvoKw", "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/skcDcA", "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA" } ] } 2024-01-30 12:55:50,452:DEBUG:acme.client:Storing nonce: R3i4Vkc54CWkBHLpcNh6Zz4RKq04katWvSHv9f5h7a__t6jNuTI 2024-01-30 12:55:50,453:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-30 12:55:50,454:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-01-30 12:55:50,455:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-30 12:55:50,455:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-30 12:55:50,456:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-30 12:55:50,456:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-30 12:55:50,456:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-30 12:55:50,457:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-30 12:55:50,458:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-30 12:55:50,504:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-30 12:55:50,538:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-30 12:55:50,539:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-01-30 12:55:50,540:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-01-30 12:55:50,544:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:40:02 UTC. 2024-01-30 12:55:50,544:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-30 12:55:50,544:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-30 12:55:50,549:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-30 12:55:50,549:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-30 12:55:50,549:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-30 12:55:50,554:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-30 12:55:50,554:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-30 12:55:50,556:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-30 12:55:51,101:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-30 12:55:51,102:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:55:50 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "lun6r39cWSA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-30 12:55:51,102:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-30 12:55:54,930:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7245_key-certbot.pem 2024-01-30 12:55:58,415:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7243_csr-certbot.pem 2024-01-30 12:55:58,416:DEBUG:acme.client:Requesting fresh nonce 2024-01-30 12:55:58,416:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-30 12:55:58,597:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-30 12:55:58,598:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:55:57 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLC0KIEr7ubjePQaIAVLdDafIxy0NUu7mAEILlg47Hj7Ik X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-30 12:55:58,598:DEBUG:acme.client:Storing nonce: Wkq6jgLC0KIEr7ubjePQaIAVLdDafIxy0NUu7mAEILlg47Hj7Ik 2024-01-30 12:55:58,599:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-01-30 12:55:58,606:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTEMwS0lFcjd1YmplUFFhSUFWTGREYWZJeHkwTlV1N21BRUlMbGc0N0hqN0lrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "shl-3JamVSXfXx4x8JNJ1xG3DCbQpMsY7e6w-VRVtshYxnCODAddjqcCOybolCNyQqehxHe_ZqpEmXRJqllMY-_caQoktOoDDZ-DOMDjSJb9OAs1BzDDtXI-sCh9LPqnVHOXZNbIkL-8EY3wNGXIKHWR89NCraHpJ27wGNHaGoS2xjfdy-2aTiL5CBlyZDUOk9-Zz1MkRZLuPKp_PHpx_7n3oGhDN72d9lFwz9_mmcDsixdGw0wqFyqZmOjopbPgF3y_OXCkK7gbTvCxnPMJZp_RIdj-bGq5zYWifocQfe9Jq1zPn8VVl3c0zrE13wBbiXWN-dDb6LDL4wl4NpLp3g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-01-30 12:55:58,808:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-01-30 12:55:58,809:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 30 Jan 2024 11:55:57 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463415626 Replay-Nonce: fBfjtdZFOOBYl7mLMkL86yv2cxHU_oF9pyQKhTUEcblQ2ZmdyAk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:47:20Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186648386" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463415626" } 2024-01-30 12:55:58,810:DEBUG:acme.client:Storing nonce: fBfjtdZFOOBYl7mLMkL86yv2cxHU_oF9pyQKhTUEcblQ2ZmdyAk 2024-01-30 12:55:58,810:DEBUG:acme.client:JWS payload: b'' 2024-01-30 12:55:58,817:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186648386: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZPT0JZbDdtTE1rTDg2eXYyY3hIVV9vRjlweVFLaFRVRWNibFEyWm1keUFrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY2NDgzODYifQ", "signature": "DseghVyFT7l7qvieetUu6-OtBfzJnYwEXb5lB9laaAi2OrIhQZC4uKrEPCvTN5ymZ_OhbIkwG8CJOZ8qT6gb5bqJK4ADQBhD5FvRAebvMzJfxOY6yjvbDAXY02t4CuGeD4uVkWVoMatGGa_teeFEFhgeIOK_pAzo8PDTMjbJxkK3Mcr6SF1wSmC9MDTvh2v9xBvBpO1hWtXhJDw97awmSaMlXYKwLUfrQwnNKhc4hOku01TVNs_aBEasmeH2eja1Hz_1Q9teGJv7BbGiGRPAOyHmr_VEjOCZiqeTRWGnn1ME3loGtkB23x0YqX_iAZgmtdE6KWHT4jVL3TgfJBNeXA", "payload": "" } 2024-01-30 12:55:59,003:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186648386 HTTP/1.1" 200 805 2024-01-30 12:55:59,004:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 30 Jan 2024 11:55:58 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCZrPkM_NaR40GaUvBZ64tG8f_TVoEUqGyMF8Vtu3mxM0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:47:20Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/AfqDTw", "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/2qup_g", "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/cLgsJg", "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE" } ] } 2024-01-30 12:55:59,004:DEBUG:acme.client:Storing nonce: Wkq6jgLCZrPkM_NaR40GaUvBZ64tG8f_TVoEUqGyMF8Vtu3mxM0 2024-01-30 12:55:59,006:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-30 12:55:59,006:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-01-30 12:55:59,007:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-30 12:55:59,007:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-30 12:55:59,008:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-30 12:55:59,008:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-30 12:55:59,009:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-30 12:55:59,009:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-30 12:55:59,010:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-30 12:55:59,010:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-01-30 12:55:59,011:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-01-30 12:55:59,022:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-01-30 12:55:59,024:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)