2025-02-01 06:58:21,454:DEBUG:certbot._internal.main:certbot version: 1.6.0 2025-02-01 06:58:21,455:DEBUG:certbot._internal.main:Arguments: [] 2025-02-01 06:58:21,455:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2025-02-01 06:58:22,205:DEBUG:certbot._internal.log:Root logging level set at 20 2025-02-01 06:58:22,205:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2025-02-01 06:58:22,243:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2025-02-01 06:58:22,283:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-01 06:58:22,492:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 06:58:22,493:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2025-02-01 06:58:22,497:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2025-02-01 06:58:22,505:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-02-01 06:58:22,509:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 06:58:22,547:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-01 06:58:22,713:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 06:58:22,715:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is signed by the certificate's issuer. 2025-02-01 06:58:22,715:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD 2025-02-01 06:58:22,720:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-02-01 06:58:22,724:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 06:58:22,760:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-01 06:58:22,959:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 06:58:22,960:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2025-02-01 06:58:22,961:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2025-02-01 06:58:22,965:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-02-01 06:58:22,971:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 06:58:23,039:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-02-01 06:58:23,242:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 06:58:23,244:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is signed by the certificate's issuer. 2025-02-01 06:58:23,244:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is: OCSPCertStatus.GOOD 2025-02-01 06:58:23,248:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-02-01 06:58:23,251:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 06:58:23,288:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-01 06:58:23,495:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 06:58:23,497:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert22.pem is signed by the certificate's issuer. 2025-02-01 06:58:23,497:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD 2025-02-01 06:58:23,502:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-02-01 06:58:23,506:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 06:58:23,543:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-02-01 06:58:23,751:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 06:58:23,752:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-02-01 06:58:23,753:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-02-01 06:58:23,757:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:13:49 UTC. 2025-02-01 06:58:23,758:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-01 06:58:23,758:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 06:58:23,763:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-02-01 06:58:23,763:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-02-01 06:58:23,763:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-01 06:58:23,779:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-02-01 06:58:23,780:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-01 06:58:23,783:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-01 06:58:24,259:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-01 06:58:24,260:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:57:43 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "tEuhbi1VsEY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2025-02-01 06:58:24,260:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-01 06:58:31,799:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9023_key-certbot.pem 2025-02-01 06:58:38,771:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9021_csr-certbot.pem 2025-02-01 06:58:38,772:DEBUG:acme.client:Requesting fresh nonce 2025-02-01 06:58:38,772:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-01 06:58:38,929:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-01 06:58:38,930:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:57:57 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8iJ7mgaT5bRh_PiJbdlR82rhyWUT1cu2iMcTTyitTt6nY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-01 06:58:38,930:DEBUG:acme.client:Storing nonce: hXNDuA8iJ7mgaT5bRh_PiJbdlR82rhyWUT1cu2iMcTTyitTt6nY 2025-02-01 06:58:38,930:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2025-02-01 06:58:38,936:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGlKN21nYVQ1YlJoX1BpSmJkbFI4MnJoeVdVVDFjdTJpTWNUVHlpdFR0Nm5ZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "c3SUSD6jrrQ62Dn-cSmSjEa1QGt8bv1D_T-T3rENp7v4PyLbssxrZFtHGvmzRdjRShZ2aD7yY4Ilkks95XC2daY6xKNe_v-VnlgaRpKFVmOHm_tvl-N6hj8_Q2fbMvuPmq_zK70NQHPUmkgnG_TWMUrShhlaTiaq8qf0HeXj-2UWNmDMIxr4D_IUjt1agzRP2NSzA9uzy3jkFVCOXjI678C1rcuFrO3vPNEfVmwvbvcfSTN93ZwQRbXf98_d_tsj0vZD18sKkdgN_N8-e1UcyhbalYu8lYM3328AQgcZQJ8VOQly0TwyXT0gjnLMuqB9f1cuDc8A0VXg4gNQAk1BUA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-02-01 06:58:39,129:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-02-01 06:58:39,130:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 01 Feb 2025 05:57:57 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603648845 Replay-Nonce: aTttXYyyNK_NCmbSCeJMeafJ9gEwYsOrKPGd4-ObZWXGM7O6GFY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:15:56Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613419375" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603648845" } 2025-02-01 06:58:39,130:DEBUG:acme.client:Storing nonce: aTttXYyyNK_NCmbSCeJMeafJ9gEwYsOrKPGd4-ObZWXGM7O6GFY 2025-02-01 06:58:39,130:DEBUG:acme.client:JWS payload: b'' 2025-02-01 06:58:39,136:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613419375: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXlOS19OQ21iU0NlSk1lYWZKOWdFd1lzT3JLUEdkNC1PYlpXWEdNN082R0ZZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM0MTkzNzUifQ", "signature": "AWi_6cGMrTeGWdX70HfvvOnmAw63aCAF45rdf3qldE9HEXO1pqm5aT839OiHPY6k6f1xyEZWVJdDFffoZxxui4TTjIS65lZBIlEXMNamZJhor2rgyWy3Yc0JGV5dg-Fe9bK2fJ-4SBSzgHOkx_AeFwIU_3jxpP2fPZk1SgEDMquTLjYGMV6hSJ59j9rg0VUGZpoCqnOTShW99zETJKUzB9_SiBGKppoLJx7ErhUGA9LJz-De3Pbc7NDMaMqGwPSgcx-RLe8MuvJLwh6beEhcQtlwl8InmmB4JZQa08PmVZ3oGbCEKK80_8UQq7AhspPXJP-uV_4GhA2_j6ct9ymGOA", "payload": "" } 2025-02-01 06:58:39,297:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613419375 HTTP/1.1" 200 823 2025-02-01 06:58:39,298:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:57:58 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aTttXYyy37oDCx3TgcSlPWaFTBalE7NsbRdTfx1xxI96BpR9LJ0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:15:56Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613419375/T3sOUw", "status": "pending", "token": "9EnXT6FT7rznT8ngp10HxQzCcXcgDHNCsRx5DOBACns" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613419375/bahWuQ", "status": "pending", "token": "9EnXT6FT7rznT8ngp10HxQzCcXcgDHNCsRx5DOBACns" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613419375/yJLmdw", "status": "pending", "token": "9EnXT6FT7rznT8ngp10HxQzCcXcgDHNCsRx5DOBACns" } ] } 2025-02-01 06:58:39,298:DEBUG:acme.client:Storing nonce: aTttXYyy37oDCx3TgcSlPWaFTBalE7NsbRdTfx1xxI96BpR9LJ0 2025-02-01 06:58:39,298:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-01 06:58:39,299:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2025-02-01 06:58:39,310:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-01 06:58:39,310:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-01 06:58:39,319:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 06:58:39,319:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-01 06:58:39,320:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-01 06:58:39,320:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-01 06:58:39,331:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 06:58:39,369:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-01 06:58:39,570:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 06:58:39,571:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2025-02-01 06:58:39,572:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2025-02-01 06:58:39,576:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:20 UTC. 2025-02-01 06:58:39,576:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-01 06:58:39,577:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 06:58:39,582:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-02-01 06:58:39,582:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-02-01 06:58:39,582:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-01 06:58:39,598:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-02-01 06:58:39,599:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-01 06:58:39,601:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-01 06:58:40,085:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-01 06:58:40,085:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:57:58 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "XynDTqd14ho": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-02-01 06:58:40,087:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-01 06:58:46,720:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9024_key-certbot.pem 2025-02-01 06:58:53,450:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9022_csr-certbot.pem 2025-02-01 06:58:53,450:DEBUG:acme.client:Requesting fresh nonce 2025-02-01 06:58:53,450:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-01 06:58:53,612:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-01 06:58:53,613:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:58:12 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aTttXYyynMmQv5hEloi9UCJxw8sO4eveV6DYFMl-ErlDtvLlC2k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-01 06:58:53,613:DEBUG:acme.client:Storing nonce: aTttXYyynMmQv5hEloi9UCJxw8sO4eveV6DYFMl-ErlDtvLlC2k 2025-02-01 06:58:53,613:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2025-02-01 06:58:53,619:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXluTW1RdjVoRWxvaTlVQ0p4dzhzTzRldmVWNkRZRk1sLUVybER0dkxsQzJrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Y4LlLQHM2UPHKtB8q6c-ETDpvWgOOOQoHW6QGbrDQ55aJkpztNK1nh3EI0y_hOZ97-R8_XoSBHyeZ5Vwr_5dYwyoXaEYxuXyUdugTk9dsQ78cIE0jFCz78OK1blDOajFpoiJ6BTavIoj8eqA-HWye_wAVPFqFBn3AuRuBEfaERtiE98obNp9z9xcX5sosodTm80POM_zro9-u4dWhKiYWhYRUCLcPFqLXfbBtDc2wevOT80_1vGGt9HDFYjM1w-nOTIXbuJCWTD6Gew9Zcr4Xsz1BI1zlXF5O3X63m0KnI5G0XmECD-VmjjK4hYLTVZUiKuSZF1mdO6ZI2Apke7MEA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-02-01 06:58:53,814:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2025-02-01 06:58:53,815:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 01 Feb 2025 05:58:12 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603700365 Replay-Nonce: hXNDuA8iWYd04xr8ekt-HiU5A-OvyUxRU9j6EXykeKFPkBl7Vr4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:16:10Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613495675" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603700365" } 2025-02-01 06:58:53,815:DEBUG:acme.client:Storing nonce: hXNDuA8iWYd04xr8ekt-HiU5A-OvyUxRU9j6EXykeKFPkBl7Vr4 2025-02-01 06:58:53,815:DEBUG:acme.client:JWS payload: b'' 2025-02-01 06:58:53,821:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613495675: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGlXWWQwNHhyOGVrdC1IaVU1QS1PdnlVeFJVOWo2RVh5a2VLRlBrQmw3VnI0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM0OTU2NzUifQ", "signature": "oTB2kK3TGhKjdv8SYGCqOWm3Wn6AUEqDWyJigVGiOun01Wd2aynsIjH-_jioEaXcOAOA_TL4kR9M-5RyLJPMRV_pQiVaJ1KlkniyZ9Dg-F5nKiFS-q0Pw3XF_J6QMlexWlNVNjZtSaWSby6nlRpQQnp4OevZCSDaFxtZbLvJRFwunJoNEexRGJvMyHOTgx0y9MJR5Mg_kj0Amu0YGuGtbJB950w1WJ8ilJuKy02lz3ncthfabVxVgq9f22Q_-Md9AtC_CTY1gTswWfsmqI1kpkepjlCKdjJqycRDAaY6gmCUdLdN1QIz1ZT3q-RpRUkfZpK1TD5oTrNWg8IbJ389BA", "payload": "" } 2025-02-01 06:58:53,988:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613495675 HTTP/1.1" 200 827 2025-02-01 06:58:53,989:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:58:12 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aTttXYyyO06YJBf7X9tTsL6JhOG5J1j_YYDQX_jVGQf2Pq_wsro X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:16:10Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613495675/TKifNg", "status": "pending", "token": "-N4wWQFOkzSF8ZGn4EebknObkGtUQ-conbTGk8O9Reo" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613495675/OR7sGQ", "status": "pending", "token": "-N4wWQFOkzSF8ZGn4EebknObkGtUQ-conbTGk8O9Reo" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613495675/DpTZMg", "status": "pending", "token": "-N4wWQFOkzSF8ZGn4EebknObkGtUQ-conbTGk8O9Reo" } ] } 2025-02-01 06:58:53,989:DEBUG:acme.client:Storing nonce: aTttXYyyO06YJBf7X9tTsL6JhOG5J1j_YYDQX_jVGQf2Pq_wsro 2025-02-01 06:58:53,990:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-01 06:58:53,990:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2025-02-01 06:58:53,991:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-01 06:58:53,991:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-01 06:58:53,991:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 06:58:53,992:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-01 06:58:53,992:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-01 06:58:53,992:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-01 06:58:53,994:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 06:58:54,042:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-01 06:58:54,235:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 06:58:54,236:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is signed by the certificate's issuer. 2025-02-01 06:58:54,237:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is: OCSPCertStatus.GOOD 2025-02-01 06:58:54,240:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:51 UTC. 2025-02-01 06:58:54,240:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-01 06:58:54,240:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 06:58:54,246:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-02-01 06:58:54,246:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-02-01 06:58:54,246:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-01 06:58:54,251:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-02-01 06:58:54,252:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-01 06:58:54,254:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-01 06:58:54,735:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-01 06:58:54,736:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:58:13 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "sDgwhTQ8RpA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2025-02-01 06:58:54,736:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-01 06:59:01,141:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9025_key-certbot.pem 2025-02-01 06:59:07,239:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9023_csr-certbot.pem 2025-02-01 06:59:07,240:DEBUG:acme.client:Requesting fresh nonce 2025-02-01 06:59:07,240:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-01 06:59:07,400:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-01 06:59:07,401:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:58:26 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aTttXYyyYdOMZPksdD9yvRPzV6yTvZB738tThdnfXZUveMBBaAo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-01 06:59:07,401:DEBUG:acme.client:Storing nonce: aTttXYyyYdOMZPksdD9yvRPzV6yTvZB738tThdnfXZUveMBBaAo 2025-02-01 06:59:07,401:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2025-02-01 06:59:07,407:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXlZZE9NWlBrc2REOXl2UlB6VjZ5VHZaQjczOHRUaGRuZlhaVXZlTUJCYUFvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "p-buV-zCjH12ivDO0rz-yAGP5mbKH8LoOh7sTHTyn3TmW6_rqsnJ2VtS0buz_nFVT64dERgp79mLWKU_5cwKrX-GMu3lcpKFOAFX9YUVCeVx1IA0RdXPEDEqpq0iN6AfppNcMd9nhmfcdfF1YRJuoz5C44T7lUpUKK6a_NYdoIIRRnevZWRnAJQSBYriGpnlC0M2JkKi-EBnO_F-kDN6E1_6UUuSxI8PKbhqA1Jv0nbGjxgnxOOpj3MJg7R6mS1R7uHER69Fqw31dIUTTAkoigdEXxUx5W35dycBl8eG7M1-Z5DQG9kDDZSF5p-6TQHPhdGi7gPgNz1ciWpgJrV8jw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2025-02-01 06:59:07,601:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 353 2025-02-01 06:59:07,601:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 01 Feb 2025 05:58:26 GMT Content-Type: application/json Content-Length: 353 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603747715 Replay-Nonce: hXNDuA8iGqZwq1cdoDdGqGvKtebWwgxQwio3AvfOcx9BGPCs-Uw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:16:23Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613569085" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603747715" } 2025-02-01 06:59:07,602:DEBUG:acme.client:Storing nonce: hXNDuA8iGqZwq1cdoDdGqGvKtebWwgxQwio3AvfOcx9BGPCs-Uw 2025-02-01 06:59:07,602:DEBUG:acme.client:JWS payload: b'' 2025-02-01 06:59:07,608:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613569085: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGlHcVp3cTFjZG9EZEdxR3ZLdGViV3dneFF3aW8zQXZmT2N4OUJHUENzLVV3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM1NjkwODUifQ", "signature": "J9fxvTdJJEC7FIOR89iPVxMnyt_03m7KTKuJnCCmReguLF408DhnG4I2GX1Ub3f5AAvS-UIKBlib2rgFt8dq5laASay2OqpI9b7QVHvowJ6vlYTTgkOMD5tvftITmdNlajeCiBZacsM_dCJdlXI58A1vhE864oQcq606gm428iL7mUzYkOnrAHa-uXgxxCkXt8sx9hrWNLq6rWto9Rgg4vFWCc8aTmiokp3k5G2RcWoPR-lcf_vhtH7JeAbiBFRmtU5kGqnfwjArFqNm0fKBkZgMTx4YVB0VQDsPGhaMV10H19lGSNbcRlPXW7iRnVfdtnRBeMCfrYEZb0oLaTYN-A", "payload": "" } 2025-02-01 06:59:07,774:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613569085 HTTP/1.1" 200 825 2025-02-01 06:59:07,775:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:58:26 GMT Content-Type: application/json Content-Length: 825 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8iTtaWV2I1Z1_Q73vCU_GE2MXMxZloKREfhrctJcl9Y2A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:16:23Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613569085/i556TQ", "status": "pending", "token": "voycDLD6WaIuZqIiZii35bQ8xrl32oR994HNkskXaVM" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613569085/_lVOeQ", "status": "pending", "token": "voycDLD6WaIuZqIiZii35bQ8xrl32oR994HNkskXaVM" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613569085/67S_cA", "status": "pending", "token": "voycDLD6WaIuZqIiZii35bQ8xrl32oR994HNkskXaVM" } ] } 2025-02-01 06:59:07,775:DEBUG:acme.client:Storing nonce: hXNDuA8iTtaWV2I1Z1_Q73vCU_GE2MXMxZloKREfhrctJcl9Y2A 2025-02-01 06:59:07,776:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-01 06:59:07,776:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2025-02-01 06:59:07,777:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-01 06:59:07,777:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-01 06:59:07,777:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 06:59:07,778:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-01 06:59:07,778:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-01 06:59:07,778:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-01 06:59:07,779:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 06:59:07,830:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-01 06:59:08,038:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 06:59:08,039:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-02-01 06:59:08,040:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-02-01 06:59:08,044:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:13 UTC. 2025-02-01 06:59:08,044:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-01 06:59:08,044:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 06:59:08,049:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-02-01 06:59:08,049:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-02-01 06:59:08,050:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-01 06:59:08,054:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-02-01 06:59:08,055:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-01 06:59:08,057:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-01 06:59:08,505:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-01 06:59:08,506:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:58:27 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "bt4Gp5x85QE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-02-01 06:59:08,506:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-01 06:59:14,979:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9026_key-certbot.pem 2025-02-01 06:59:21,087:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9024_csr-certbot.pem 2025-02-01 06:59:21,088:DEBUG:acme.client:Requesting fresh nonce 2025-02-01 06:59:21,088:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-01 06:59:21,238:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-01 06:59:21,239:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:58:40 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UvlUZ57PQRnRbb28qKEDxPuqC3c2wMGGVdFeXGqWpGc2pDL9tyA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-01 06:59:21,239:DEBUG:acme.client:Storing nonce: UvlUZ57PQRnRbb28qKEDxPuqC3c2wMGGVdFeXGqWpGc2pDL9tyA 2025-02-01 06:59:21,239:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2025-02-01 06:59:21,245:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVXZsVVo1N1BRUm5SYmIyOHFLRUR4UHVxQzNjMndNR0dWZEZlWEdxV3BHYzJwREw5dHlBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "cKNIO0ZJ-1PVpfazTwXqQcQSRq2g8a1lACaL21tPrD0FI3e57OGWA4wRJz7F0-O1YZsgj4THykQn137U2rGTWv4ynt2fUiSra8cQKorRKdqQzDFNm7myR53Ou1WtAjZE5KOxHfpYb1cANNhFUpLIfmaGVFc5KbxTOHRpxeOE_SWF893cWYMalILuhZBf3Ev88D2q_N7u8rMyeEY2UTuGSFmCEVit06-l51jpZAQDi5RVeYQ2A1abFDiqiXa-Il0Lbl3tvocgChCkGbWgswxOv2GHf1ZGLgfsRgen_yt_MhUm_Wa-9yd5bHBzly7OzHoRNpNMbxmQsMJGB7OaLPq1hQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-02-01 06:59:21,500:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 352 2025-02-01 06:59:21,501:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 01 Feb 2025 05:58:40 GMT Content-Type: application/json Content-Length: 352 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603792325 Replay-Nonce: TUC11O6Xf8HZZKQZyvIzvu4arEPNWlANmubbAzVBh2aM9L9JKM0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:16:37Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613637565" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603792325" } 2025-02-01 06:59:21,501:DEBUG:acme.client:Storing nonce: TUC11O6Xf8HZZKQZyvIzvu4arEPNWlANmubbAzVBh2aM9L9JKM0 2025-02-01 06:59:21,501:DEBUG:acme.client:JWS payload: b'' 2025-02-01 06:59:21,507:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613637565: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhmOEhaWktRWnl2SXp2dTRhckVQTldsQU5tdWJiQXpWQmgyYU05TDlKS00wIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM2Mzc1NjUifQ", "signature": "xvOevx1udl_jOpdkNv4WC4n8qiCUac9Gnat-eUKMG-fwB7BzIZrVN7gtzWyf3MwLQi37kDFHOvuzqkhXKMxhPHjv3bHPVIRwLorgQFmUPVwPIxZPtgCTIGm6Cuj2CTJsMM6nSW9ZaoHmtwa1rJZOC0Z5b-GkcyQjjbOdDgctNNAKg-Y65nRASDSyWgr4dMwE05_77THesqjggjvKnM0wIOGtA9ZukYN8b19nsiZ_Dt_aicgYBugD4a06SPJc22H0WUhcGbop6j8VUwf8nK4UIUye_G2zsBEuB7iyYLmygegkI6IdskpElccoM5KD5KIPTYc9vD_QZtJXasqwvJnWiA", "payload": "" } 2025-02-01 06:59:21,670:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613637565 HTTP/1.1" 200 824 2025-02-01 06:59:21,671:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:58:40 GMT Content-Type: application/json Content-Length: 824 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UvlUZ57P5i3u9-3dzBUnAAfCNq5gEor2ibUfOBWXPjefMuVf4NE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:16:37Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613637565/HkAMUw", "status": "pending", "token": "koSUgsC_SD5VGbDQ3X2SLH_w9qYfJ8H3V8YT4kweWIk" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613637565/5bZpJA", "status": "pending", "token": "koSUgsC_SD5VGbDQ3X2SLH_w9qYfJ8H3V8YT4kweWIk" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613637565/_4E6Mg", "status": "pending", "token": "koSUgsC_SD5VGbDQ3X2SLH_w9qYfJ8H3V8YT4kweWIk" } ] } 2025-02-01 06:59:21,671:DEBUG:acme.client:Storing nonce: UvlUZ57P5i3u9-3dzBUnAAfCNq5gEor2ibUfOBWXPjefMuVf4NE 2025-02-01 06:59:21,671:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-01 06:59:21,672:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2025-02-01 06:59:21,672:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-01 06:59:21,673:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-01 06:59:21,673:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 06:59:21,673:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-01 06:59:21,674:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-01 06:59:21,674:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-01 06:59:21,675:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 06:59:21,721:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2025-02-01 06:59:21,721:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-01 06:59:21,721:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2025-02-01 06:59:21,729:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2025-02-01 06:59:21,735:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2025-02-01 06:59:21,735:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2025-02-01 06:59:21,735:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2025-02-01 06:59:21,736:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2025-02-01 06:59:21,741:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2025-02-01 06:59:21,779:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-01 06:59:21,962:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 06:59:21,963:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-02-01 06:59:21,964:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-02-01 06:59:21,968:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:35 UTC. 2025-02-01 06:59:21,968:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-01 06:59:21,968:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 06:59:21,974:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-02-01 06:59:21,975:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-02-01 06:59:21,975:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-01 06:59:21,979:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-02-01 06:59:21,980:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-01 06:59:21,982:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-01 06:59:22,464:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-01 06:59:22,465:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:58:41 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "LTu0gNxSn6Q": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-02-01 06:59:22,466:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-01 06:59:28,924:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9027_key-certbot.pem 2025-02-01 06:59:35,047:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9025_csr-certbot.pem 2025-02-01 06:59:35,048:DEBUG:acme.client:Requesting fresh nonce 2025-02-01 06:59:35,048:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-01 06:59:35,209:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-01 06:59:35,210:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:58:54 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8itSJOmIZJJ7N_5EunDurz1flqXV8NTRCPbEgueCFv1NA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-01 06:59:35,210:DEBUG:acme.client:Storing nonce: hXNDuA8itSJOmIZJJ7N_5EunDurz1flqXV8NTRCPbEgueCFv1NA 2025-02-01 06:59:35,210:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2025-02-01 06:59:35,216:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGl0U0pPbUlaSko3Tl81RXVuRHVyejFmbHFYVjhOVFJDUGJFZ3VlQ0Z2MU5BIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "gdu38MwgQidRGi0RggiHcmahaoHp8DVgviNaiC3lr8lEwoL3ZUwnX-ciO2EA_cN0pgwbysbnp6yqFNt48UYP2af5zvOv69dvg2mj_2yLyewOxqSb5HZbzxmdVgB-xIf7JIQKlc9MYgStZ43LHIsD5gfVFtnDI4x1v7QbkA_kSSqqTrVwWPWw8CFGHIev_Sbbo4gcX4iUGC5HnZ0zcxPyK2-nSznDKrj4CJFl9Kh3aLk2yOZyh5LDGpuOBeXRyqDL1vxDb1KYer8lqjjJh6ITbqj-ZvVdNVKXLamMRoLRcRL5UbOFv_4H1pmX8gkjiyLieTky_xvIuVeHCxRKguFALw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-02-01 06:59:35,423:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 357 2025-02-01 06:59:35,424:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 01 Feb 2025 05:58:54 GMT Content-Type: application/json Content-Length: 357 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603833745 Replay-Nonce: hXNDuA8iZ5j26nxUTNT07RnaSkibbp--IUaRLxVm7AnXQPB-rus X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:16:51Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613700475" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603833745" } 2025-02-01 06:59:35,424:DEBUG:acme.client:Storing nonce: hXNDuA8iZ5j26nxUTNT07RnaSkibbp--IUaRLxVm7AnXQPB-rus 2025-02-01 06:59:35,424:DEBUG:acme.client:JWS payload: b'' 2025-02-01 06:59:35,430:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613700475: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGlaNWoyNm54VVROVDA3Um5hU2tpYmJwLS1JVWFSTHhWbTdBblhRUEItcnVzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM3MDA0NzUifQ", "signature": "NXDHvhqNpaCfrvS40K6MefuoypxPttdMbIKcIxrITvLGTyoO95uXVcmDpyzV96NjRGwThueFTFqjUQv8YMRfivPTux5AKESa_5gNYg_xD75SdWtYJ38tdNRFYoyl-mBSnf8-X20UY173amH9Q8j1zrRvA9YLNkGtO4hkxjwPYw0UV4RfF0TscZZzAwkvhcX_9FnOShAiGb3vuzEgMCLC_1nmnT8Bf3JPpnKu2bnXr1KP23KrZ8_Rot8a4oRW8w4xkuLtb_zMxAWYB0dFpd2JrFdnjlDKrS4HmHi0zGP-EHGo4p2tp4CYS0DsdiyAim7AAqczLdj0cKRB8bXAEG0gIw", "payload": "" } 2025-02-01 06:59:35,596:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613700475 HTTP/1.1" 200 829 2025-02-01 06:59:35,597:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:58:54 GMT Content-Type: application/json Content-Length: 829 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8ik8m3aiFqaqpmAHWm5lBpwBOJMuwlyYXaRb4QjdTxH04 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:16:51Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613700475/4GWkdQ", "status": "pending", "token": "_3T_C3yuCWV4XSeLeRXCPycDIQnwxDGf-AyaPY9XlxE" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613700475/B2drkw", "status": "pending", "token": "_3T_C3yuCWV4XSeLeRXCPycDIQnwxDGf-AyaPY9XlxE" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613700475/jElvnA", "status": "pending", "token": "_3T_C3yuCWV4XSeLeRXCPycDIQnwxDGf-AyaPY9XlxE" } ] } 2025-02-01 06:59:35,597:DEBUG:acme.client:Storing nonce: hXNDuA8ik8m3aiFqaqpmAHWm5lBpwBOJMuwlyYXaRb4QjdTxH04 2025-02-01 06:59:35,597:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-01 06:59:35,598:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2025-02-01 06:59:35,598:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-01 06:59:35,599:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-01 06:59:35,599:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 06:59:35,600:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-01 06:59:35,600:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-01 06:59:35,600:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-01 06:59:35,601:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 06:59:35,639:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-02-01 06:59:35,836:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 06:59:35,837:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-02-01 06:59:35,838:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-02-01 06:59:35,842:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:05 UTC. 2025-02-01 06:59:35,843:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-01 06:59:35,843:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 06:59:35,848:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-02-01 06:59:35,848:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-02-01 06:59:35,848:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-01 06:59:35,853:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-02-01 06:59:35,854:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-01 06:59:35,856:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-01 06:59:36,323:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-01 06:59:36,324:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:58:55 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "udj41x61po0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2025-02-01 06:59:36,324:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-01 06:59:42,685:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9028_key-certbot.pem 2025-02-01 06:59:48,704:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9026_csr-certbot.pem 2025-02-01 06:59:48,704:DEBUG:acme.client:Requesting fresh nonce 2025-02-01 06:59:48,704:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-01 06:59:48,862:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-01 06:59:48,863:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:59:07 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aTttXYyyNyW4JUkxCE-CObz__eOd-WUd4cXQCI02NbPBueNJX7g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-01 06:59:48,863:DEBUG:acme.client:Storing nonce: aTttXYyyNyW4JUkxCE-CObz__eOd-WUd4cXQCI02NbPBueNJX7g 2025-02-01 06:59:48,863:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2025-02-01 06:59:48,869:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXlOeVc0SlVreENFLUNPYnpfX2VPZC1XVWQ0Y1hRQ0kwMk5iUEJ1ZU5KWDdnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ndL8wUriP7IozQ1ZKbBZ6lduCILDeM-xFbjYLpXdqdFVg_msi8299AWSC_DgcLdnn03MdWeLK3LKsC3I7vEZdU9MwYcMrV3aE1h8bJwqusLRedbfjHAJQsjKKgsU6L73uDJwIcdid8wUKLhedToVZUnyYRAGdawOURCVqi5zJDJJzogue7Y0L5kT_Tqm9r5-Qg9wM7U4dr0BdLlT6Pwj4AEVULtE-yah9HzNjb5vBKnc5fiOmb6rDKyuqRfw1JqF2GWSBjYYu7RXYpVxa4LllWd-QIUbj2FINNlzYOig54xnouoATpr1h_nOzqi4m-s1GVFB7eVySjP8fVu5gnhurw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2025-02-01 06:59:49,056:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356 2025-02-01 06:59:49,057:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 01 Feb 2025 05:59:07 GMT Content-Type: application/json Content-Length: 356 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603881465 Replay-Nonce: aTttXYyyHY1VVZiwoLtK19-Aem-uJhiUozgDgq3o1MqVY-_QzB8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:17:04Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613770605" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603881465" } 2025-02-01 06:59:49,057:DEBUG:acme.client:Storing nonce: aTttXYyyHY1VVZiwoLtK19-Aem-uJhiUozgDgq3o1MqVY-_QzB8 2025-02-01 06:59:49,057:DEBUG:acme.client:JWS payload: b'' 2025-02-01 06:59:49,063:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613770605: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXlIWTFWVlppd29MdEsxOS1BZW0tdUpoaVVvemdEZ3EzbzFNcVZZLV9RekI4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM3NzA2MDUifQ", "signature": "S43Yt2AK-YtJ2T7v63i3Vcygf16nP9dvdjpBjMfOf81sBTfNH3HyCJ1Rga1qW7TL438kIuGMSMASm8LOgLj8kZ-wPNVGaDJBTAVUQoKHllhGrJHOR2ABBnrD-ZkpfHRkyxSAGAN3BwmOIDKuz_xvQ3Cr4ZQo92US97OUH3QaWC9wO_g6__MW_HUK6z8NKAXT9g6pztiS7rwe29oP3ZpMfDfW4yFlXFZfcxkWO6mCEAK3LUtOxFBB_A5dtpP7IWFVP0e5yAbkBhpwjdYKgATHH2RpEro17CE8-63Y01q0UtevT1P_MGfFqR4ote0mM94Eo_PBWI3zQHxjfuLYlokssQ", "payload": "" } 2025-02-01 06:59:49,225:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613770605 HTTP/1.1" 200 828 2025-02-01 06:59:49,226:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:59:08 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aTttXYyyTFTTB8gUXO9M7Kz_jwF6GKZFhN5z1n4xNtnZspBT64g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:17:04Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613770605/F9o6HQ", "status": "pending", "token": "a_L9ZYSN7UCXXgi8qZoJiOQo70GFjG_W81I9wg8pLws" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613770605/9nrvYA", "status": "pending", "token": "a_L9ZYSN7UCXXgi8qZoJiOQo70GFjG_W81I9wg8pLws" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613770605/QBtWUw", "status": "pending", "token": "a_L9ZYSN7UCXXgi8qZoJiOQo70GFjG_W81I9wg8pLws" } ] } 2025-02-01 06:59:49,226:DEBUG:acme.client:Storing nonce: aTttXYyyTFTTB8gUXO9M7Kz_jwF6GKZFhN5z1n4xNtnZspBT64g 2025-02-01 06:59:49,227:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-01 06:59:49,227:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2025-02-01 06:59:49,228:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-01 06:59:49,228:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-01 06:59:49,229:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 06:59:49,229:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-01 06:59:49,229:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-01 06:59:49,229:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-01 06:59:49,230:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 06:59:49,270:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-01 06:59:49,485:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 06:59:49,486:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2025-02-01 06:59:49,487:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2025-02-01 06:59:49,491:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:33 UTC. 2025-02-01 06:59:49,491:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-01 06:59:49,491:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 06:59:49,496:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-02-01 06:59:49,496:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-02-01 06:59:49,496:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-01 06:59:49,501:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-02-01 06:59:49,502:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-01 06:59:49,504:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-01 06:59:49,958:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-01 06:59:49,959:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:59:08 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "j-PqhT4uaCo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-02-01 06:59:49,959:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-01 06:59:56,599:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9029_key-certbot.pem 2025-02-01 07:00:02,615:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9027_csr-certbot.pem 2025-02-01 07:00:02,615:DEBUG:acme.client:Requesting fresh nonce 2025-02-01 07:00:02,615:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-01 07:00:02,765:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-01 07:00:02,766:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:59:21 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6XLzqMad0fzWaRkAkrea6WzcUjhZsCFnky--aLeTgdt-w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-01 07:00:02,766:DEBUG:acme.client:Storing nonce: TUC11O6XLzqMad0fzWaRkAkrea6WzcUjhZsCFnky--aLeTgdt-w 2025-02-01 07:00:02,766:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2025-02-01 07:00:02,772:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhMenFNYWQwZnpXYVJrQWtyZWE2V3pjVWpoWnNDRm5reS0tYUxlVGdkdC13IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "uijb9r2BojhQm43Fx_zvNiFxNh7UUcDoNmaxX2jqa_NKaslCekU5Pe-HptfeHhFP9cC3V12v0Kuv6XqMn2XknyNDS2jho5-pqrE8rdBceE4oHbLR3HpRNymzGVlYu7kBKHaWgBogr15_V_L34Y2RBOI8FjJCjsO3lo7ZkBFH9DxluVozqvkgbMOpZFhSMOH3Geha81Lk7nwu-YjqF-AEw7EWyT3tA6OPsNSo8qbDtMX2ZtBbit-jXO0zOVR2lTpj-m66buJdmILjE8YLpTMTWPBNU5pWklcjpl0I9pF_eLGcrdsmJyxwv2YH-IJaoq9FtPllTosR564Lyw8jSvd4UA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-02-01 07:00:02,974:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2025-02-01 07:00:02,974:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 01 Feb 2025 05:59:21 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603934575 Replay-Nonce: TUC11O6XCiGUkYdccwN45SUeGHkTihwak-bCqwhenCGtMJT0Dx4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:17:18Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613854905" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603934575" } 2025-02-01 07:00:02,975:DEBUG:acme.client:Storing nonce: TUC11O6XCiGUkYdccwN45SUeGHkTihwak-bCqwhenCGtMJT0Dx4 2025-02-01 07:00:02,975:DEBUG:acme.client:JWS payload: b'' 2025-02-01 07:00:02,981:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613854905: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhDaUdVa1lkY2N3TjQ1U1VlR0hrVGlod2FrLWJDcXdoZW5DR3RNSlQwRHg0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM4NTQ5MDUifQ", "signature": "W0lN2CgrZlV67V862SRXKlud6WBCSLrxNsNleLeNxlrTmkRFNHlnLD1ciSTQz9Z4t3hShmJtBYjp-8iH7nkKW0nxqz1A2xZzwwhiWnDplvyZAU03DIiQ7oxAxR8idwVwcY3Gh7OQzygDm3pp9g13IYX5TaL5vk5PA_lvfZXyavjic1aZbgBz3-O0skwCFIXPEVZ67tVdqvNzSUU7NrpQLdWAzaqRjNip2DkpR2y2NnufHgMl3k-aTKVDIkIk4kBIQHrM9z-nKwdhqJBGK0aO7W7mXfUsozz7PwVTtNO16HGeIW26YmNBAYYGqP548dLovFB6okDfpu_0ZZoEAuVkiQ", "payload": "" } 2025-02-01 07:00:03,138:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613854905 HTTP/1.1" 200 827 2025-02-01 07:00:03,139:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:59:21 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UvlUZ57PCISfMwyTxqbcSFMcV7fdn-FJE18ln0QxBKdK8clcKoo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:17:18Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613854905/7RtzaQ", "status": "pending", "token": "IK7vYZaRda0VTDtKKQsecohpYPhsEngjBQ1X3SBv7HQ" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613854905/ke1eMQ", "status": "pending", "token": "IK7vYZaRda0VTDtKKQsecohpYPhsEngjBQ1X3SBv7HQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613854905/bMnPCg", "status": "pending", "token": "IK7vYZaRda0VTDtKKQsecohpYPhsEngjBQ1X3SBv7HQ" } ] } 2025-02-01 07:00:03,139:DEBUG:acme.client:Storing nonce: UvlUZ57PCISfMwyTxqbcSFMcV7fdn-FJE18ln0QxBKdK8clcKoo 2025-02-01 07:00:03,140:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-01 07:00:03,140:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2025-02-01 07:00:03,140:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-01 07:00:03,141:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-01 07:00:03,141:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 07:00:03,141:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-01 07:00:03,142:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-01 07:00:03,142:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-01 07:00:03,143:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 07:00:03,190:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-02-01 07:00:03,391:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 07:00:03,392:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2025-02-01 07:00:03,393:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2025-02-01 07:00:03,397:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:54 UTC. 2025-02-01 07:00:03,397:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-01 07:00:03,398:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 07:00:03,403:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-02-01 07:00:03,403:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-02-01 07:00:03,403:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-01 07:00:03,408:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-02-01 07:00:03,408:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-01 07:00:03,411:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-01 07:00:03,844:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-01 07:00:03,845:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:59:22 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "U-vp2Amgrcw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-02-01 07:00:03,846:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-01 07:00:10,109:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9030_key-certbot.pem 2025-02-01 07:00:16,139:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9028_csr-certbot.pem 2025-02-01 07:00:16,139:DEBUG:acme.client:Requesting fresh nonce 2025-02-01 07:00:16,139:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-01 07:00:16,285:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-01 07:00:16,286:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:59:35 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6Xhgl7WGk5E2xvMXed-ffRG4guIWfSe8ffNlPsakAWHro X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-01 07:00:16,286:DEBUG:acme.client:Storing nonce: TUC11O6Xhgl7WGk5E2xvMXed-ffRG4guIWfSe8ffNlPsakAWHro 2025-02-01 07:00:16,286:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2025-02-01 07:00:16,294:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhoZ2w3V0drNUUyeHZNWGVkLWZmUkc0Z3VJV2ZTZThmZk5sUHNha0FXSHJvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "snjhiKjt7hWz1nULFCGYMwa6WJxIWmyG2qfUYZJ6pSKMhMawBJUxRezoh3UJOPYH3TdfQFGp-Vo7fvqIJP2p4Hts6SXB-5Ye1eUktR9uQS0pJO3Kawr0q1uEuKQZQaf7Nl6yxBL72iqz_6Xh7cYfsKAw2Bqbg_WDx94Dg05RWEk2lQRnIyVt1Mfbp_qYvZ9_AyCQNUAN-15ha6-z635M_3-__TZCXBvdnO569pVLkMUFG9HBu0tPbD_8lrlyHIdcD6xuKq9Ujuss0-9U2MiIBG81jRjOydV5gyQ-En113UlB0JFVJPQcK_6XE6pur41WY6rKhsisFp_lQqmKH8mKqg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-02-01 07:00:16,475:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-02-01 07:00:16,475:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 01 Feb 2025 05:59:35 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603978585 Replay-Nonce: TUC11O6XTmvHfjkCoHjXnof00eMVRCQ9DqCM4RMX-psROBJofd8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:17:32Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613923815" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603978585" } 2025-02-01 07:00:16,475:DEBUG:acme.client:Storing nonce: TUC11O6XTmvHfjkCoHjXnof00eMVRCQ9DqCM4RMX-psROBJofd8 2025-02-01 07:00:16,476:DEBUG:acme.client:JWS payload: b'' 2025-02-01 07:00:16,482:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613923815: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhUbXZIZmprQ29Ialhub2YwMGVNVlJDUTlEcUNNNFJNWC1wc1JPQkpvZmQ4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM5MjM4MTUifQ", "signature": "AFYkjRoVpuMxgjJEk34p0EPzpn-YwyUwDAWsBRXBg3ub4THgH6vKJHji0FFpdy-U8toZB-FOxdVsL5V2SQRuvtah4ZUFxZ4OkMamEs05_lbyuQy54jPZjbc1_Z9zmha2iUG69ZFNxfYRwDqYos5kmBe0A8DLmWHQkaat3leKbgw1KKx0ZW8WEUktFVO3HMY4Ii8RdyLFGoSPGd408pGocXKl15CSGNeyD-r359SUX8XVSulraAOg3GI_1iX_MC9RKXfPwigM6lJ0VfIdypbzBHAVCsuwx-ukcFOwAN_CEdKs9mAOwCCPjsJqrxqKnHeJYv8wwUPXiiHFAy73f0WGRQ", "payload": "" } 2025-02-01 07:00:16,638:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613923815 HTTP/1.1" 200 823 2025-02-01 07:00:16,639:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:59:35 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UvlUZ57PS_9ma5kyAgT7Qwki-HeJfYB4NMfV0kTDYizE1Sjw6iI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:17:32Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613923815/t9VvUw", "status": "pending", "token": "m7yyxIJSFIemVfF7rkix7A6ntmc25SA7QMkT0Knl1qI" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613923815/wNRiHQ", "status": "pending", "token": "m7yyxIJSFIemVfF7rkix7A6ntmc25SA7QMkT0Knl1qI" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613923815/wvLngQ", "status": "pending", "token": "m7yyxIJSFIemVfF7rkix7A6ntmc25SA7QMkT0Knl1qI" } ] } 2025-02-01 07:00:16,639:DEBUG:acme.client:Storing nonce: UvlUZ57PS_9ma5kyAgT7Qwki-HeJfYB4NMfV0kTDYizE1Sjw6iI 2025-02-01 07:00:16,640:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-01 07:00:16,640:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2025-02-01 07:00:16,640:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-01 07:00:16,641:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-01 07:00:16,641:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 07:00:16,642:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-01 07:00:16,642:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-01 07:00:16,642:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-01 07:00:16,643:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 07:00:16,681:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-02-01 07:00:16,877:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 07:00:16,878:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-02-01 07:00:16,879:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-02-01 07:00:16,884:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:15 UTC. 2025-02-01 07:00:16,884:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-01 07:00:16,884:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 07:00:16,889:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-02-01 07:00:16,889:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-02-01 07:00:16,890:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-01 07:00:16,894:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-02-01 07:00:16,895:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-01 07:00:16,897:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-01 07:00:17,335:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-01 07:00:17,336:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:59:36 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "nYcmNruTupE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-02-01 07:00:17,336:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-01 07:00:23,412:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9031_key-certbot.pem 2025-02-01 07:00:29,387:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9029_csr-certbot.pem 2025-02-01 07:00:29,388:DEBUG:acme.client:Requesting fresh nonce 2025-02-01 07:00:29,388:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-01 07:00:29,535:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-01 07:00:29,535:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:59:48 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6XRMUpRZryKWlYYpmCr6GGGSPqdnU3-pwbtE07oyN_4Hg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-01 07:00:29,535:DEBUG:acme.client:Storing nonce: TUC11O6XRMUpRZryKWlYYpmCr6GGGSPqdnU3-pwbtE07oyN_4Hg 2025-02-01 07:00:29,536:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2025-02-01 07:00:29,542:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhSTVVwUlpyeUtXbFlZcG1DcjZHR0dTUHFkblUzLXB3YnRFMDdveU5fNEhnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "bkuAdMZM7C5iWAEQkEfAYMuN866jj5mdlFWfv4YxNIXgMjqbS6JCVWmRZ1DZKnNU5w-vhMHkntw3sAyDszvYhwPvQ2nsBd96kk-mCGU5dKFhKfPbWUSi6c600txmiWewdh_aJAKQhaLSp_wrFga_g7iv94bvujODhQWJE5yRa9klEh0CnjR3D-5pz3G8VJe0Rn75LGkpB9w_Wz43HDeVnfPms1Xl-sDfl_T4IA6lstcKZONLsHN3DqYmXwnNwSF8qxc1k0O-NatoWFG5K1-XFCtrgp2zsodKAas8d6w42ENNtycYMuhimCNmw9JMxxYzwbhiLiBqh-hap4ETbl55zw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-02-01 07:00:29,751:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-02-01 07:00:29,752:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 01 Feb 2025 05:59:48 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349604024205 Replay-Nonce: TUC11O6XCJVP0e22y4Ax4mUxJMIB5RXaF2zYCLSRwM-W2VfL8o4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:17:46Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613992955" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349604024205" } 2025-02-01 07:00:29,752:DEBUG:acme.client:Storing nonce: TUC11O6XCJVP0e22y4Ax4mUxJMIB5RXaF2zYCLSRwM-W2VfL8o4 2025-02-01 07:00:29,752:DEBUG:acme.client:JWS payload: b'' 2025-02-01 07:00:29,758:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613992955: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhDSlZQMGUyMnk0QXg0bVV4Sk1JQjVSWGFGMnpZQ0xTUndNLVcyVmZMOG80IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM5OTI5NTUifQ", "signature": "RdiX3GUajveQRp4YGZfaS6r_mncH2tKYmYdkr_vGmeTbTTQFyahZ2VNH3pjuFLKf6IGtGy4HVQUiaXCoc0eN8u9cYkBr7AbJ1-Y2wLu1ds2bS-K4kVOAabaINE1ULrB1XB9UrXL0cabRzrS1JInpkzL6b-OWbbmgq6QWT3NqLYfBQ7ujhdm0oMxbmk46_R8GzqAfmmRCSTe4CvAldvyz9xQUgnCYCvgJC3w4_aYjZJ1teuAigCHKYbbUUS3YszsDU4MQwhx2yj9dB6OSk47cueln5QWNTmQSsp5FElaZx1JYKkyGlwapCi_vHhVcmv8-kQ6MWmL3R8GnC1-ZdpLK1g", "payload": "" } 2025-02-01 07:00:29,910:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613992955 HTTP/1.1" 200 823 2025-02-01 07:00:29,911:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:59:48 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6XlRKA6Bvm8l2gAfkNepNH0DZ2HNzBKNP52-myjMftKHg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:17:46Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613992955/Sy2Pkg", "status": "pending", "token": "6MJOC_tlqp2eo7XHm1FAxeHMF3eocZ9KkmW5bas3nAw" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613992955/G_4bSw", "status": "pending", "token": "6MJOC_tlqp2eo7XHm1FAxeHMF3eocZ9KkmW5bas3nAw" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613992955/xSdP2A", "status": "pending", "token": "6MJOC_tlqp2eo7XHm1FAxeHMF3eocZ9KkmW5bas3nAw" } ] } 2025-02-01 07:00:29,911:DEBUG:acme.client:Storing nonce: TUC11O6XlRKA6Bvm8l2gAfkNepNH0DZ2HNzBKNP52-myjMftKHg 2025-02-01 07:00:29,912:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-01 07:00:29,912:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2025-02-01 07:00:29,913:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-01 07:00:29,913:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-01 07:00:29,914:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 07:00:29,914:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-01 07:00:29,914:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-01 07:00:29,915:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-01 07:00:29,915:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 07:00:29,966:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-02-01 07:00:30,190:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-02-01 07:00:30,192:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2025-02-01 07:00:30,192:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2025-02-01 07:00:30,197:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:38 UTC. 2025-02-01 07:00:30,197:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-02-01 07:00:30,197:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-02-01 07:00:30,202:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-02-01 07:00:30,203:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-02-01 07:00:30,203:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-02-01 07:00:30,207:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-02-01 07:00:30,208:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-02-01 07:00:30,210:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-02-01 07:00:30,658:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-02-01 07:00:30,659:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 05:59:49 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Sy6c_WXR358": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-02-01 07:00:30,659:INFO:certbot._internal.main:Renewing an existing certificate 2025-02-01 07:00:36,712:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9032_key-certbot.pem 2025-02-01 07:00:42,686:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9030_csr-certbot.pem 2025-02-01 07:00:42,687:DEBUG:acme.client:Requesting fresh nonce 2025-02-01 07:00:42,687:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-02-01 07:00:42,836:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-02-01 07:00:42,837:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 06:00:01 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6XsGfi6NKSRKNSqpWW_dWaowEfGTGSyr3JnESYRm4JyGk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-02-01 07:00:42,837:DEBUG:acme.client:Storing nonce: TUC11O6XsGfi6NKSRKNSqpWW_dWaowEfGTGSyr3JnESYRm4JyGk 2025-02-01 07:00:42,837:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2025-02-01 07:00:42,843:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhzR2ZpNk5LU1JLTlNxcFdXX2RXYW93RWZHVEdTeXIzSm5FU1lSbTRKeUdrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "iFGHklaX8wukQR5aUYOPuqrfUrhLU7D8SO1LZVUKIjoj77MIGD14IzOluWtBY8aLZ4SFgqiuFzVOZekuY96ZvZ5WCnRooCtd2QC2-6Lrlr3pBT3Z_UesVQZskrHYiHYHAqDQS_vEg7o4vj1MTE1QuFw9AA4lhucgbAN3GiPA_2OzxdzHSWQABUjPbooxfzng_BfdARAINn6Q47SXQaXmvMrSuMXopYeg6iO9l6RNXwgecfmnTgth2CoOQ31kp-vzWaqUjlEdht65rhvk28LH2396d5lFqEBk__erkw75CIenRkH3EQz4u5XOByQUCZs8SGqWMr3N_fPRgIsg5h_szg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-02-01 07:00:43,019:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-02-01 07:00:43,020:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 01 Feb 2025 06:00:01 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349604068465 Replay-Nonce: TUC11O6Xj1R-yR47vjr82HXrtg0Ik5MOIbpFc9QuiDMLgolglBQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:18:00Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468614059925" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349604068465" } 2025-02-01 07:00:43,020:DEBUG:acme.client:Storing nonce: TUC11O6Xj1R-yR47vjr82HXrtg0Ik5MOIbpFc9QuiDMLgolglBQ 2025-02-01 07:00:43,020:DEBUG:acme.client:JWS payload: b'' 2025-02-01 07:00:43,026:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468614059925: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhqMVIteVI0N3ZqcjgySFhydGcwSWs1TU9JYnBGYzlRdWlETUxnb2xnbEJRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTQwNTk5MjUifQ", "signature": "ZoFzuwvRJ28phDdGe3d79AePkDMkGKpjre8drVTYHbfBKChaFSubSK86BhDbCO_qCogTRcqsKnpLxVuO0mhEYcZx8rbuZZ7p1mEl_q-kmTC2S1oBiyHyGGtAoikeUEOt3bJAhecFzOfYT0p30Lnj6mxGnLQ42h86PrS_auysXpk1VRHKVULea-YjRsKeyK8RGwcpvNSAYDPG1WKqSooOuTxBTlIxp3soozW8zAkbWBhmMq1fG6fffIet1PUK65uT32QP68GWtw7386InDoVchhbV2Vov601hGAucVtpLlVPR4d5gDTCd-lBjbeludb9tiRhWv7EcR_qbjJjl9OOtTA", "payload": "" } 2025-02-01 07:00:43,188:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468614059925 HTTP/1.1" 200 823 2025-02-01 07:00:43,188:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 01 Feb 2025 06:00:02 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6XGl7CMxDMNloxd3x4yMUHELZ9yenf9E9wQJGmTswwXww X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:18:00Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468614059925/YrgyBQ", "status": "pending", "token": "wxzPthxA_2D1WM9MuMnylOPR_2v6PcertENLY_gigks" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468614059925/f-K6ug", "status": "pending", "token": "wxzPthxA_2D1WM9MuMnylOPR_2v6PcertENLY_gigks" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468614059925/B9cGNQ", "status": "pending", "token": "wxzPthxA_2D1WM9MuMnylOPR_2v6PcertENLY_gigks" } ] } 2025-02-01 07:00:43,189:DEBUG:acme.client:Storing nonce: TUC11O6XGl7CMxDMNloxd3x4yMUHELZ9yenf9E9wQJGmTswwXww 2025-02-01 07:00:43,189:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-02-01 07:00:43,190:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2025-02-01 07:00:43,190:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-02-01 07:00:43,191:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-02-01 07:00:43,192:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 07:00:43,192:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-02-01 07:00:43,192:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-02-01 07:00:43,192:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-02-01 07:00:43,193:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-02-01 07:00:43,194:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2025-02-01 07:00:43,194:ERROR:certbot._internal.renewal: C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2025-02-01 07:00:43,195:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 11 renew failure(s), 0 parse failure(s) 2025-02-01 07:00:43,208:ERROR:certbot._internal.log:11 renew failure(s), 0 parse failure(s)