2024-01-27 14:18:53,290:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-01-27 14:18:53,291:DEBUG:certbot._internal.main:Arguments: [] 2024-01-27 14:18:53,291:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-01-27 14:18:54,298:DEBUG:certbot._internal.log:Root logging level set at 20 2024-01-27 14:18:54,298:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-01-27 14:18:54,335:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-01-27 14:18:54,374:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-27 14:18:54,396:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-27 14:18:54,398:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is signed by the certificate's issuer. 2024-01-27 14:18:54,401:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is: OCSPCertStatus.GOOD 2024-01-27 14:18:54,410:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:15 UTC. 2024-01-27 14:18:54,410:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 14:18:54,410:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-27 14:18:54,415:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-27 14:18:54,415:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-27 14:18:54,416:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-27 14:18:54,421:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-27 14:18:54,422:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-27 14:18:54,424:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-27 14:18:54,961:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-27 14:18:54,962:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:18:54 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "GD6KAJUcDBk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-27 14:18:54,963:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-27 14:18:59,205:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7155_key-certbot.pem 2024-01-27 14:19:03,194:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7153_csr-certbot.pem 2024-01-27 14:19:03,194:DEBUG:acme.client:Requesting fresh nonce 2024-01-27 14:19:03,194:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-27 14:19:03,397:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-27 14:19:03,397:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:19:03 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZFSm7S-pPbDPcpg4c3S-uznzhs6BvYRgPHJ9vSMRfOXqw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-27 14:19:03,398:DEBUG:acme.client:Storing nonce: fBfjtdZFSm7S-pPbDPcpg4c3S-uznzhs6BvYRgPHJ9vSMRfOXqw 2024-01-27 14:19:03,398:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-01-27 14:19:03,404:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZTbTdTLXBQYkRQY3BnNGMzUy11em56aHM2QnZZUmdQSEo5dlNNUmZPWHF3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "rO7sS5Qae6mldhL9giyzpx5xtOjRBXBBzU9a7vFfzFLx2OsWLFUBulVIGa0-jL-gUKos-v3bszTl5mwJb1LIR5tIM9W7kbS0L-9rKXGoh5ByH718XW5jJZ49GBxVztnStA1oGVjZ9K8R26hhHlqI9-mqXxg8jY4oXNGceT1iqzBTcdjDmGBytNUVvi2Z8qZhIjNgzvnCu8flARfALVtH9zu-LSQjYkry3bOZPKlw79n3e_MT5Zcth62y9dRRUmzXVJ3SerkANppcjEq9R9UWyQwktWkGQ9gfDGjkk_cZvd0CLPTzGSTtx9ayN-1On-Mloxfvezzi7iX9sFlymNdZkg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-01-27 14:19:03,612:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-01-27 14:19:03,613:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 27 Jan 2024 13:19:03 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463125096 Replay-Nonce: fBfjtdZFqPBcv5UbqQL1G7KqzYWV-Qe4k1wD1PrWTJ-kMK1yUfQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:45:30Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186209716" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463125096" } 2024-01-27 14:19:03,613:DEBUG:acme.client:Storing nonce: fBfjtdZFqPBcv5UbqQL1G7KqzYWV-Qe4k1wD1PrWTJ-kMK1yUfQ 2024-01-27 14:19:03,613:DEBUG:acme.client:JWS payload: b'' 2024-01-27 14:19:03,619:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186209716: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZxUEJjdjVVYnFRTDFHN0txellXVi1RZTRrMXdEMVByV1RKLWtNSzF5VWZRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyMDk3MTYifQ", "signature": "XE2Kfsja9z78_3PaqpcO8hh9E1r3WuP7eMH0MGBwF4dCPsymSoITj9AcEg7HCICCDRpZN5Rh8I5iGPeIafyS1rHrTPRvOpNZ2szEGEbKAvMGnvON_-4Q4mo-vXzKO0wBT5zHkikr_zqBLiegxjvjMFVsbNTWMw_MfqdnU0RbzsadC3aFsIfbH9GPHeoVisdbg3RBf1DOFzRGA5tUSIZ2SW7E04ww45OGpRh9wRJfasHaUA7olkScLW1DSeiK2qgg_9GAEEUm8p6sjr1zT7679nL__Jkj53mLxQmVKauIh5CbeCD-rpF463r6pY8OtS2cN4joa9WWfqUFFvo38LTk4w", "payload": "" } 2024-01-27 14:19:03,797:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186209716 HTTP/1.1" 200 810 2024-01-27 14:19:03,798:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:19:03 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZFZIUM43j9hl3-m-dDybWab46njUcRLegWOvQoTTCab8g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:45:30Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/6f0kFQ", "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/TzPnqw", "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/f71chA", "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo" } ] } 2024-01-27 14:19:03,798:DEBUG:acme.client:Storing nonce: fBfjtdZFZIUM43j9hl3-m-dDybWab46njUcRLegWOvQoTTCab8g 2024-01-27 14:19:03,798:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-27 14:19:03,799:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-01-27 14:19:03,799:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-27 14:19:03,799:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-27 14:19:03,812:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 14:19:03,812:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-27 14:19:03,813:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-27 14:19:03,813:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-27 14:19:03,819:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 14:19:03,858:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-27 14:19:03,872:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-27 14:19:03,874:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-27 14:19:03,874:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-27 14:19:03,878:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:32 UTC. 2024-01-27 14:19:03,879:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 14:19:03,879:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-27 14:19:03,883:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-27 14:19:03,884:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-27 14:19:03,884:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-27 14:19:03,888:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-27 14:19:03,890:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-27 14:19:03,890:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-27 14:19:04,424:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-27 14:19:04,425:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:19:04 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "KazP_X_UFOw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-27 14:19:04,425:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-27 14:19:08,763:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7156_key-certbot.pem 2024-01-27 14:19:12,354:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7154_csr-certbot.pem 2024-01-27 14:19:12,354:DEBUG:acme.client:Requesting fresh nonce 2024-01-27 14:19:12,354:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-27 14:19:12,532:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-27 14:19:12,533:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:19:12 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZF2e3SpnA-cu3npa1qUAQ3uytMSZRpL0ZL31vj7GePlU0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-27 14:19:12,533:DEBUG:acme.client:Storing nonce: fBfjtdZF2e3SpnA-cu3npa1qUAQ3uytMSZRpL0ZL31vj7GePlU0 2024-01-27 14:19:12,533:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-01-27 14:19:12,539:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkYyZTNTcG5BLWN1M25wYTFxVUFRM3V5dE1TWlJwTDBaTDMxdmo3R2VQbFUwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "EtSaHh3l3zYIImJrcVL4rlmC1ZC7LdvoQw_B0BmVyrfEXzQwTl32jx_qC1OtZV6vGFxCuRebieqrLEDnYFhHUjBehWPj9TZU5_W8Uybgn0J6rjmWzIgt-cr0yuHAOw0Je9tlb228-VfGqJVd5z1E7qr5zGfd-2mK4ftF5Gkq-VV20tSVtNQbEFFJ99yVdy_s-CGPicB6F-oWhCni-Ia1NYE-jP19OxOSG6FJQaHVuY2hiFquvtDoqneqwTr30O95RgldX5nhz9ySO_nULvRFU3VvLJVOCW5lKZ--_XRztAwSbXD-kjNgGRxE-wVsEvtrRz1-jQUMPmKGUg-9sRq1Ew", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-01-27 14:19:12,735:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-01-27 14:19:12,736:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 27 Jan 2024 13:19:12 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463146186 Replay-Nonce: fBfjtdZF5wtqzXrgiTIScBY23RfDIHlyUB0mZoZuJWUbdY1sJmo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:45:39Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186240836" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463146186" } 2024-01-27 14:19:12,736:DEBUG:acme.client:Storing nonce: fBfjtdZF5wtqzXrgiTIScBY23RfDIHlyUB0mZoZuJWUbdY1sJmo 2024-01-27 14:19:12,737:DEBUG:acme.client:JWS payload: b'' 2024-01-27 14:19:12,743:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186240836: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkY1d3RxelhyZ2lUSVNjQlkyM1JmRElIbHlVQjBtWm9adUpXVWJkWTFzSm1vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyNDA4MzYifQ", "signature": "IAvdGQeH4gdDwF_CSfPT0TuqYbX4cSjeIGkKE5dzeCiRJo0UnnsYF0R9oM91Zx4_vc3vjqPFC0qyhYAJtq5k27hJvE39APEe-u6_CVYFe86elhpnFp0DlMA63-AXjcyw_I7PdrI1TJ6BpDiiNDKRMXdlYFPghzciM7rVH8wEpLghP3oGFssMqzowyTkE4wtB83PmS-rQhMNsuOZTeguHuzDkRo-LhyfUbobQOvWuHhXOvKpbcax3_wmm55yflBl9WIBQslgMNRrGbQBzRvZ-6F1o8jCbiEygm1lxVug-j3QU4i4VUIli7EhnODW87wzQFq8-_Q2fDbrO_7Kld4d1Nw", "payload": "" } 2024-01-27 14:19:12,937:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186240836 HTTP/1.1" 200 804 2024-01-27 14:19:12,937:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:19:12 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZFNYJqvjJu9RxlhSxY-XqRJecp8HguzEmIyoSwl2vq6PU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:45:39Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/g8SMBA", "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/KdDipg", "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/N41DHw", "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I" } ] } 2024-01-27 14:19:12,937:DEBUG:acme.client:Storing nonce: fBfjtdZFNYJqvjJu9RxlhSxY-XqRJecp8HguzEmIyoSwl2vq6PU 2024-01-27 14:19:12,938:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-27 14:19:12,938:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-01-27 14:19:12,939:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-27 14:19:12,939:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-27 14:19:12,940:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 14:19:12,940:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-27 14:19:12,940:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-27 14:19:12,940:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-27 14:19:12,941:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 14:19:12,981:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-27 14:19:13,141:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-27 14:19:13,142:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-01-27 14:19:13,143:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-01-27 14:19:13,148:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:49 UTC. 2024-01-27 14:19:13,148:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 14:19:13,148:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-27 14:19:13,153:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-27 14:19:13,153:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-27 14:19:13,153:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-27 14:19:13,158:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-27 14:19:13,159:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-27 14:19:13,161:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-27 14:19:13,611:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-27 14:19:13,611:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:19:13 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "EgefvHzF5Zo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-27 14:19:13,612:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-27 14:19:17,500:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7157_key-certbot.pem 2024-01-27 14:19:21,209:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7155_csr-certbot.pem 2024-01-27 14:19:21,209:DEBUG:acme.client:Requesting fresh nonce 2024-01-27 14:19:21,209:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-27 14:19:21,361:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-27 14:19:21,362:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:19:21 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc5JjvqR-RwcgrhZRo6r-myp5ewHQr7w0JHk23bbVksBVs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-27 14:19:21,362:DEBUG:acme.client:Storing nonce: R3i4Vkc5JjvqR-RwcgrhZRo6r-myp5ewHQr7w0JHk23bbVksBVs 2024-01-27 14:19:21,362:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-01-27 14:19:21,367:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVKanZxUi1Sd2NncmhaUm82ci1teXA1ZXdIUXI3dzBKSGsyM2JiVmtzQlZzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "jj_Siw9iI82hkBa3bVDlX7bPsigX2A5RkGIfJu83-ltDMrq_noea448D0FAXAo3JUhTAVSWNgWXZ6z_HQ2eFyA6Bm5ZM9vSxbw51gZXXn0kFCZ1HXLjOR3fShXgIKAjGWnP9m6RRWHIA6UY607r3F6Db7Inbynk6jLLIi3QMs4-kTjXBl8LxBWPPbfy_yG_LJ28qsNvPSQLa3-ZFs0aWBFUaNGjdSG--di9OQFzIxFckSQMonsyeZe3vcT1Kcmt2VhadFzzZRFGntoAgrOnw6XfdPxEhwpqE_WFSVNhfnCIXQrGyysFXkXl8H3rTFZ5BGPibSGTG8rdWtJSenWxQew", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-01-27 14:19:21,547:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-01-27 14:19:21,548:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 27 Jan 2024 13:19:21 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463167526 Replay-Nonce: VKfU247YoxzFTjG4jZNbfowHOMupZ22IWRsxDbH56JZv4-uKgMs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:45:48Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186273596" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463167526" } 2024-01-27 14:19:21,548:DEBUG:acme.client:Storing nonce: VKfU247YoxzFTjG4jZNbfowHOMupZ22IWRsxDbH56JZv4-uKgMs 2024-01-27 14:19:21,548:DEBUG:acme.client:JWS payload: b'' 2024-01-27 14:19:21,556:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186273596: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lveHpGVGpHNGpaTmJmb3dIT011cFoyMklXUnN4RGJINTZKWnY0LXVLZ01zIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyNzM1OTYifQ", "signature": "sL-SciSobJ5tbigQJ6UAH5788JtqEy4IOTRXJoJBsHBVT-n61GZsSVPnz8wgAAt7lNzV9z24Inh6h5674JtNT6k9wx9KaH1ds58uW8k9xYeLu5WFf-NVj-tOnSaZYIzFlUDVK8-Kz-gZOIXsnUTj4AbzrVtf1riWW40qa1uFBXrwY4wV6dy6_HUwfV6OoYOQWDwLdGWwlJQ00SLwFT3RhrT7TzQ0ukwPbkJIm3lrfVIOfGNr8oSxkYjAuIvvb6N08Igkvo_cMLsqyB8CIIrSRQFNhunF-keKn3O5uDdGPsFPfbdQ98sCDUj85SRxg9PW0i0RkMzFJmULf5Ki5Zpsmw", "payload": "" } 2024-01-27 14:19:21,714:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186273596 HTTP/1.1" 200 807 2024-01-27 14:19:21,715:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:19:21 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YA1cQMxIymZjR8zqojCbf5Q7VE2rdmZ8wlye-lq1LMlg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:45:48Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/KNqRXQ", "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/KMda1w", "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/f-1bag", "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE" } ] } 2024-01-27 14:19:21,715:DEBUG:acme.client:Storing nonce: VKfU247YA1cQMxIymZjR8zqojCbf5Q7VE2rdmZ8wlye-lq1LMlg 2024-01-27 14:19:21,716:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-27 14:19:21,716:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-01-27 14:19:21,716:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-27 14:19:21,717:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-27 14:19:21,718:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 14:19:21,718:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-27 14:19:21,718:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-27 14:19:21,718:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-27 14:19:21,719:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 14:19:21,759:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-27 14:19:21,787:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-27 14:19:21,789:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-27 14:19:21,789:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-27 14:19:21,794:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:03 UTC. 2024-01-27 14:19:21,794:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 14:19:21,794:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-27 14:19:21,799:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-27 14:19:21,799:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-27 14:19:21,799:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-27 14:19:21,804:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-27 14:19:21,805:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-27 14:19:21,807:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-27 14:19:22,427:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-27 14:19:22,427:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:19:22 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "TpYt-YIOwXY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-27 14:19:22,428:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-27 14:19:26,276:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7158_key-certbot.pem 2024-01-27 14:19:29,855:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7156_csr-certbot.pem 2024-01-27 14:19:29,856:DEBUG:acme.client:Requesting fresh nonce 2024-01-27 14:19:29,856:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-27 14:19:30,034:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-27 14:19:30,034:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:19:29 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCPO6YCxzU1lBqrdSelk7W15hesh-gwXmOlFIs6JmJb0o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-27 14:19:30,034:DEBUG:acme.client:Storing nonce: Wkq6jgLCPO6YCxzU1lBqrdSelk7W15hesh-gwXmOlFIs6JmJb0o 2024-01-27 14:19:30,035:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-01-27 14:19:30,040:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENQTzZZQ3h6VTFsQnFyZFNlbGs3VzE1aGVzaC1nd1htT2xGSXM2Sm1KYjBvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "DzrM5jR3S90urQcvhAIamBDy7qI7LPhPuTNl8pLJwvOhlq-qWChbfxV6rjId1EsAqXwgnvI__DvqFj4tsx7vkBI1JN_SdZ46zLXXxjqet7KQVpvh_VRpTNfin3pawyN-I1wJ5Hi0dkudoDFYYxDp_R98nHZe5AnXVBm851fWnVh82r0i9H_Gr8qhCwpHbugE_WQZVxOZR3prvso42hnW2axe-luJ64mI8wd-z6kKQU0a9wz-i-pYMqxtVi4CHnfZmHNDOV4zkRLtuzN4rrofKGoM0Gn2HzSQeHk9uhwg9AG-8YkDxEx00xbdR4Y-3nSejOBYAkx3aYzhHxJtJxEtFw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-01-27 14:19:30,229:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-01-27 14:19:30,229:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 27 Jan 2024 13:19:30 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463187546 Replay-Nonce: fBfjtdZFle1jm-X3BbNYlQiOe4QcRwgTtt80-ohiVpjnDUBsyag X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:45:58Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186305236" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463187546" } 2024-01-27 14:19:30,230:DEBUG:acme.client:Storing nonce: fBfjtdZFle1jm-X3BbNYlQiOe4QcRwgTtt80-ohiVpjnDUBsyag 2024-01-27 14:19:30,230:DEBUG:acme.client:JWS payload: b'' 2024-01-27 14:19:30,235:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186305236: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZsZTFqbS1YM0JiTllsUWlPZTRRY1J3Z1R0dDgwLW9oaVZwam5EVUJzeWFnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzMDUyMzYifQ", "signature": "sj1tA-I4hR8ncGo8Y5_rVBWMwFKdH6I1MV52qkfnBMAI9PeDC97x9rrVoVDJD7TVHc_Qq3iuGOfeXGCKZCOcfYQPciGUmLxUij5lQ0gGstqQvr7zJM_ORqCgusIrzJpRbVwIBiMeEPeLahxTRlWzIGtMux432hk1cMUO7OcsDrEHxx6NlcDjUkmB6LVqU_P0XcIR_g-SA5nLt8PJRmO5XDZxeDHP2rSER3q_N16_drQ-DUBQpqmoYhPS1DhwP1bKs3FTCnc6A5tteYEVsKhVVhfe7_Lm4PJNRoVT7KAKsf_Qh8u4Rh7mn48raXh_mXGv8UmWnsC17bU6u4jehG7kWA", "payload": "" } 2024-01-27 14:19:30,416:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186305236 HTTP/1.1" 200 801 2024-01-27 14:19:30,417:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:19:30 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCLKYdg2vmU-ZCgdRL7d4_e5cIS_hHblgqIW-j2s99iXs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:45:58Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/H-2NUg", "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/SPl0kw", "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/dBmW2A", "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY" } ] } 2024-01-27 14:19:30,417:DEBUG:acme.client:Storing nonce: Wkq6jgLCLKYdg2vmU-ZCgdRL7d4_e5cIS_hHblgqIW-j2s99iXs 2024-01-27 14:19:30,417:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-27 14:19:30,418:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-01-27 14:19:30,418:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-27 14:19:30,418:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-27 14:19:30,419:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 14:19:30,419:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-27 14:19:30,419:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-27 14:19:30,419:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-27 14:19:30,420:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 14:19:30,469:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-27 14:19:30,483:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-27 14:19:30,484:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-27 14:19:30,485:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-27 14:19:30,488:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:20 UTC. 2024-01-27 14:19:30,489:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 14:19:30,489:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-27 14:19:30,494:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-27 14:19:30,494:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-27 14:19:30,494:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-27 14:19:30,498:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-27 14:19:30,499:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-27 14:19:30,501:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-27 14:19:30,938:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-27 14:19:30,939:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:19:30 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "neL6lH5W2No": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-27 14:19:30,939:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-27 14:19:34,766:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7159_key-certbot.pem 2024-01-27 14:19:38,352:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7157_csr-certbot.pem 2024-01-27 14:19:38,353:DEBUG:acme.client:Requesting fresh nonce 2024-01-27 14:19:38,353:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-27 14:19:38,498:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-27 14:19:38,499:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:19:38 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YsmGHKMq9SODxEppw5kfYUqUzfi8ALac_aYOFptPBjsI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-27 14:19:38,499:DEBUG:acme.client:Storing nonce: VKfU247YsmGHKMq9SODxEppw5kfYUqUzfi8ALac_aYOFptPBjsI 2024-01-27 14:19:38,499:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-01-27 14:19:38,505:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lzbUdIS01xOVNPRHhFcHB3NWtmWVVxVXpmaThBTGFjX2FZT0ZwdFBCanNJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "uD_xqyGG3YjzSyjdST1mTKGP4rZwvvbU1e--EUe609n3f8ucSyy_PjTWx5oOJI9q7AOYsscGzHN7znP4ubAzUdVhv7w5OzlhT4iVUMJyav-koYZhjv9LzSpz0mxmdu-_h7nU3BPVNwxEvvNnlz-ay-T67voLn0EiQAG4HW64szo0tK-s1Nn3OHhbq-R7dketomkjGdGGSiIXfwNScVurSr9V86h8fYKOB-eMa-Sb_r4TKwqO1gW4x9wdMEAR-RNxS4QWNwuvrk92tlsaX4JduA_sPMtKjzfZGK3vZ9HUMLfopIoi7YXLBQIK5S60Y5f9FQoxlvdYQSVHz1RUvzejDA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-01-27 14:19:38,671:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-01-27 14:19:38,671:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 27 Jan 2024 13:19:38 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463215876 Replay-Nonce: R3i4Vkc5LCTK8s16RVFyZbzv5sA2Q876g0bUEhObH06Y2MyUvps X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:07Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186343916" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463215876" } 2024-01-27 14:19:38,672:DEBUG:acme.client:Storing nonce: R3i4Vkc5LCTK8s16RVFyZbzv5sA2Q876g0bUEhObH06Y2MyUvps 2024-01-27 14:19:38,672:DEBUG:acme.client:JWS payload: b'' 2024-01-27 14:19:38,677:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186343916: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVMQ1RLOHMxNlJWRnlaYnp2NXNBMlE4NzZnMGJVRWhPYkgwNlkyTXlVdnBzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzNDM5MTYifQ", "signature": "TElMmoijup6nIwjVmimBK-aEeCWF7rnFbnj1YDzuPIeD_9Vh4_ZEvpnRmt_zRoq20cv9av4N62VJjTbh-r24Vyh7w7p1Sr83PmqXSH9KKgwTwLFWNxnEcx009Ln8WPYY2_AZevk0JFfTz6dq-6DVJ-pymMxk4hBoG4mdyfUtatbVOfCH81mdSFD8wodINuz6aL4Sni7P__OePaLGtY6CdO7_Io2iFV9EWVEog64Cu4YG_hoLq8C8vM2NEd8W0N0nk-afY5532SKKsj207alD9-oIiNBb_qh27RcDDCmmzqdEYCll80YOUAcWbddIblETDHRX7BF8h00SYphGrP4Whg", "payload": "" } 2024-01-27 14:19:38,841:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186343916 HTTP/1.1" 200 805 2024-01-27 14:19:38,842:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:19:38 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YrfTvHw1gXleH8tuvudC86F1f37C3W8aN1iOW7tTaMAA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:07Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/FQmNLA", "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/nw3Heg", "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/o7wJkQ", "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE" } ] } 2024-01-27 14:19:38,842:DEBUG:acme.client:Storing nonce: VKfU247YrfTvHw1gXleH8tuvudC86F1f37C3W8aN1iOW7tTaMAA 2024-01-27 14:19:38,843:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-27 14:19:38,843:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-01-27 14:19:38,844:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-27 14:19:38,844:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-27 14:19:38,845:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 14:19:38,845:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-27 14:19:38,845:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-27 14:19:38,846:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-27 14:19:38,847:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 14:19:38,884:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-27 14:19:38,898:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-27 14:19:38,899:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-01-27 14:19:38,900:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-01-27 14:19:38,904:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:36 UTC. 2024-01-27 14:19:38,904:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 14:19:38,905:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-27 14:19:38,909:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-27 14:19:38,910:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-27 14:19:38,910:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-27 14:19:38,914:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-27 14:19:38,915:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-27 14:19:38,917:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-27 14:19:39,447:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-27 14:19:39,448:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:19:39 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "-DvP20i468o": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-27 14:19:39,448:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-27 14:19:43,094:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7160_key-certbot.pem 2024-01-27 14:19:46,718:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7158_csr-certbot.pem 2024-01-27 14:19:46,719:DEBUG:acme.client:Requesting fresh nonce 2024-01-27 14:19:46,719:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-27 14:19:46,896:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-27 14:19:46,897:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:19:46 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCr1b71pzvbg150eFt3e4wxGhNj83f_j-y13sLqp8Chig X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-27 14:19:46,897:DEBUG:acme.client:Storing nonce: Wkq6jgLCr1b71pzvbg150eFt3e4wxGhNj83f_j-y13sLqp8Chig 2024-01-27 14:19:46,897:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-01-27 14:19:46,902:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENyMWI3MXB6dmJnMTUwZUZ0M2U0d3hHaE5qODNmX2oteTEzc0xxcDhDaGlnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Z6UdEBocAYHmGJONE8U3iCDFdXa7qsRBG-3W0MOuHHoQ5rTbkL3_5Da8pzveRFh0MCn1v5o0-htUy4rP5HscK5QSXNXwXW4s0ROm5gvHuT0vN8xPuPi0AUB6Nlnmw1W_ctdJGXyBVqD3VxGvwea0paRfm8Fp9rsyR1GRS1Q0fkMiZIgNQCe6VrEo0E_7aqKVg8dS9oQkDefDXFAue6BTJaGmrSeMoU6Ewu-ynnaR4ScsPms87jSKoeLo-AX1x4EzSDNer79-CNy0v8YkvNl9R3dqE8yexFe84Yg3jzHFxSfkfs1RouNL-Qb4PNDOZzqUHxcvJlUwUFlw4ViBvUHVdA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-01-27 14:19:47,101:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-01-27 14:19:47,101:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 27 Jan 2024 13:19:46 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463242076 Replay-Nonce: Wkq6jgLCEYJem4wJX5OjUh41gHOyY410zBEt9DyP8dJ_W6F9Hms X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:16Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186384516" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463242076" } 2024-01-27 14:19:47,101:DEBUG:acme.client:Storing nonce: Wkq6jgLCEYJem4wJX5OjUh41gHOyY410zBEt9DyP8dJ_W6F9Hms 2024-01-27 14:19:47,102:DEBUG:acme.client:JWS payload: b'' 2024-01-27 14:19:47,107:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186384516: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENFWUplbTR3Slg1T2pVaDQxZ0hPeVk0MTB6QkV0OUR5UDhkSl9XNkY5SG1zIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzODQ1MTYifQ", "signature": "AdzKsFaQJBkby0L3NeXBGipv4GVSFzSZ9VvmWGMmqAgLilhHTRjvcIH8DBG49Yf4Lzwi-bTlPinK-alwEzDESpzORqKFMk_OdPIjJ9oYuaTNV0S1ei16rU4UkotbQmJ95l79vzzhpKA6TRLBo53f7P4HXQWer3kL8XVUAwmnRWgWWmZKPU1THyDsIG1mMqu7jEsb4MwzTqU8P3wtgb2zsGI5IH9Auavtl_AYj4k_Xv-IS8SN9fnZiwriY2EID2QLL5axkEKvkcmp_yc56vFUnB2TaQAF_LitvvWeHFv6mI1SaT0F9NMvkrM-5HvtXq4XdxY3Z7iiNeZ41pJzTOhEPg", "payload": "" } 2024-01-27 14:19:47,288:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186384516 HTTP/1.1" 200 809 2024-01-27 14:19:47,288:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:19:47 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZFt2XErrE1-Zs_0t9KFpAe2xw_HLzRsdEPVbzOyI1dtJI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:16Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/iy166A", "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/FJ3duA", "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/0qWA8w", "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY" } ] } 2024-01-27 14:19:47,289:DEBUG:acme.client:Storing nonce: fBfjtdZFt2XErrE1-Zs_0t9KFpAe2xw_HLzRsdEPVbzOyI1dtJI 2024-01-27 14:19:47,289:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-27 14:19:47,289:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-01-27 14:19:47,289:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-27 14:19:47,290:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-27 14:19:47,291:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 14:19:47,291:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-27 14:19:47,291:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-27 14:19:47,292:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-27 14:19:47,294:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 14:19:47,332:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-27 14:19:47,365:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-27 14:19:47,366:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-27 14:19:47,367:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-27 14:19:47,372:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:50 UTC. 2024-01-27 14:19:47,372:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 14:19:47,372:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-27 14:19:47,376:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-27 14:19:47,376:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-27 14:19:47,376:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-27 14:19:47,381:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-27 14:19:47,382:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-27 14:19:47,384:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-27 14:19:47,919:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-27 14:19:47,920:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:19:47 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "KNfyB1LIPrM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-27 14:19:47,920:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-27 14:19:51,579:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7161_key-certbot.pem 2024-01-27 14:19:55,186:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7159_csr-certbot.pem 2024-01-27 14:19:55,186:DEBUG:acme.client:Requesting fresh nonce 2024-01-27 14:19:55,186:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-27 14:19:55,363:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-27 14:19:55,364:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:19:55 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZFxN_FazT1-nPr21Bas8VUT_k3D82IhwvJVrRR4c6FWA8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-27 14:19:55,364:DEBUG:acme.client:Storing nonce: fBfjtdZFxN_FazT1-nPr21Bas8VUT_k3D82IhwvJVrRR4c6FWA8 2024-01-27 14:19:55,364:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-01-27 14:19:55,370:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZ4Tl9GYXpUMS1uUHIyMUJhczhWVVRfazNEODJJaHd2SlZyUlI0YzZGV0E4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "j1Slt5JIyI1qZUm5GzNW5zC7II33XYWAqJtJYpcHD5Kf9OOoUrDyXL_38lBEaCM3cAb7Xq2O7k8Kq-EqGCFSOD8It6WwkZQ6U7rh1avyuM9G8x7mzRlomfKZIK9Gf6oNkL_X2v12Qze7Ty3FIaZYvzYbzyqzi2KYMKfPGFYvyR9a9IctkDK36S063l-cQXqyuEveJCKfQ_BXv5zSNFzWNsn-QRU_MJDNTWLnnBdWEGo6KauCinAdB457OudnKLX3zOaD3skusdZDAGPn7BPTWBib0a5UheiX3q78RHuwKKup0KxypDNwgjj6u-Uz6jyJxT0nUfFm2s33DYA_FXgJhA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-01-27 14:19:55,559:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-01-27 14:19:55,560:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 27 Jan 2024 13:19:55 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463267436 Replay-Nonce: Wkq6jgLCH_5XjYYC6SV_SqYY-a7WWUG6igzggZweOiXmhRsIPkI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:25Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186423616" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463267436" } 2024-01-27 14:19:55,560:DEBUG:acme.client:Storing nonce: Wkq6jgLCH_5XjYYC6SV_SqYY-a7WWUG6igzggZweOiXmhRsIPkI 2024-01-27 14:19:55,561:DEBUG:acme.client:JWS payload: b'' 2024-01-27 14:19:55,568:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186423616: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENIXzVYallZQzZTVl9TcVlZLWE3V1dVRzZpZ3pnZ1p3ZU9pWG1oUnNJUGtJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY0MjM2MTYifQ", "signature": "umG0MzeJVjdTHCx4b2rbH25wRpgYi6v9P3LxQa-BcCE6VeAe7ttvPbpoETMPVx-2TZnQcJiMiMTx36O8GK5dAYBinctHyGEVbzT4p776PhltfqO0BnAldR7-3YvstmcJ-V5qkjF8mzq-HHdvGSU2jXuTl6ktlUXcH_WmMDngrQMSifEYMyzWHmiPecdBif19MWFhlYV7e4TDkaAVaUKfZnwkScmHeB64ceCTqkk1l_ypxyKO8nls1iN8XA3zIoZrfueOPG9tGkT3FxWdxgmmWI7qhIEifnQqydZuJmDG4-np31r1GDqWgT9zyd9QiqdYQItvuYVIZuw9O92xaYxmyQ", "payload": "" } 2024-01-27 14:19:55,749:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186423616 HTTP/1.1" 200 806 2024-01-27 14:19:55,750:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:19:55 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCjERp1rSNn1h9VasqKamHNxRQFO8LyXDrZdtVyoZDeKs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:25Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/sGt3LQ", "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/-siQUw", "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/rUgQOA", "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg" } ] } 2024-01-27 14:19:55,750:DEBUG:acme.client:Storing nonce: Wkq6jgLCjERp1rSNn1h9VasqKamHNxRQFO8LyXDrZdtVyoZDeKs 2024-01-27 14:19:55,750:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-27 14:19:55,751:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-01-27 14:19:55,751:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-27 14:19:55,751:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-27 14:19:55,752:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 14:19:55,752:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-27 14:19:55,752:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-27 14:19:55,753:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-27 14:19:55,754:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 14:19:55,799:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-01-27 14:19:55,799:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 14:19:55,799:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-01-27 14:19:55,807:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-01-27 14:19:55,810:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-01-27 14:19:55,810:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-01-27 14:19:55,810:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-01-27 14:19:55,811:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-01-27 14:19:55,813:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-01-27 14:19:55,850:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-27 14:19:55,890:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-27 14:19:55,891:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-27 14:19:55,892:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-27 14:19:55,896:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:07 UTC. 2024-01-27 14:19:55,896:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 14:19:55,897:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-27 14:19:55,901:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-27 14:19:55,901:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-27 14:19:55,902:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-27 14:19:55,906:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-27 14:19:55,907:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-27 14:19:55,909:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-27 14:19:56,380:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-27 14:19:56,381:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:19:56 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "tfKuX5AfKPE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-01-27 14:19:56,381:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-27 14:20:00,034:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7162_key-certbot.pem 2024-01-27 14:20:03,628:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7160_csr-certbot.pem 2024-01-27 14:20:03,629:DEBUG:acme.client:Requesting fresh nonce 2024-01-27 14:20:03,632:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-27 14:20:03,784:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-27 14:20:03,785:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:20:03 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YQdNA2Jq6aI1Sisy5LimxYASx5NNK4LW-ZeZZ_LJkRYk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-27 14:20:03,785:DEBUG:acme.client:Storing nonce: VKfU247YQdNA2Jq6aI1Sisy5LimxYASx5NNK4LW-ZeZZ_LJkRYk 2024-01-27 14:20:03,785:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-01-27 14:20:03,791:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lRZE5BMkpxNmFJMVNpc3k1TGlteFlBU3g1Tk5LNExXLVplWlpfTEprUllrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "cN90xjrTgA0QlwOFjUoFjMeQMf1hqJUy9tLV3SMboa_hsuQQ8e1VYy2Hb-toBwSbY5yJjQluzO21KOdPBwRz6R1rJIOz3bLD02fvFprlvJS5H-YEUUUHkQz_x9RHRPQqaWce075dBx5TRf4r2Btk4yDi4a1paDmZVF_pLRuBgO5GAZQly8xNjq3LAl12J5IU-FO8xPUf09rReldf_hGgcbtTtxDnsha4BnFJptoaBKpTolVnVAsdw1KB164r04n1CEK7_kfjn8i9gRhTqFkKiWyvOFppLAoSBDpPblRSlKheRNyN9tAOyagjOHGOWfxfYqOdiAYbgOnRdZAvOCjZjQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-01-27 14:20:04,026:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-01-27 14:20:04,027:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 27 Jan 2024 13:20:03 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463293726 Replay-Nonce: VKfU247YUOGvbWylWKocyFyZdH6x-mlNGHRwCEydh_ezC2LaJDQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:34Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186467546" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463293726" } 2024-01-27 14:20:04,027:DEBUG:acme.client:Storing nonce: VKfU247YUOGvbWylWKocyFyZdH6x-mlNGHRwCEydh_ezC2LaJDQ 2024-01-27 14:20:04,027:DEBUG:acme.client:JWS payload: b'' 2024-01-27 14:20:04,034:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186467546: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lVT0d2Yld5bFdLb2N5RnlaZEg2eC1tbE5HSFJ3Q0V5ZGhfZXpDMkxhSkRRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY0Njc1NDYifQ", "signature": "ChWZWiGsMy3u-zOA3Lme7mbeEXGVfp2ziihNCnhLkyYl8pxkOpN38mkPHq-Xgs9UT1lMN0Tam2rz--AN9Ot7rurFaSsEfH1QJGv1-2LiPBprS5MHcV5SsR7H6KT6-jmnkwu4b6wJ8494vCECh5OwCkWmsEW-Pz9eZrQAJVijPGwfTUfVQZQGwrwvZdOmmesnR9HZcfpTDKsGSv8fFxOeJGfodAsQbHZzOWU03UBc58yfrMS0lBqnW40EzZLD-x-kLgFvAy0d3v-tRYOjRZNoYuHkfIKVEAtYKGjZ0FlDG-PG0vGI8SYjdz-hDk-QS8zKg72gr3ENHZS_29BmnCIQgg", "payload": "" } 2024-01-27 14:20:04,214:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186467546 HTTP/1.1" 200 811 2024-01-27 14:20:04,214:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:20:04 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YLphBFESJ3WAoXyI0IHSWSJn6sQ4Aq7MzxfiHUARMnS4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:34Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/n-ZWjw", "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/NYrS2A", "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/g51OFg", "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU" } ] } 2024-01-27 14:20:04,215:DEBUG:acme.client:Storing nonce: VKfU247YLphBFESJ3WAoXyI0IHSWSJn6sQ4Aq7MzxfiHUARMnS4 2024-01-27 14:20:04,215:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-27 14:20:04,216:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-01-27 14:20:04,216:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-27 14:20:04,217:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-27 14:20:04,217:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 14:20:04,218:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-27 14:20:04,218:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-27 14:20:04,218:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-27 14:20:04,219:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 14:20:04,267:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-27 14:20:04,307:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-27 14:20:04,308:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-27 14:20:04,309:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-27 14:20:04,313:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:31 UTC. 2024-01-27 14:20:04,314:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 14:20:04,314:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-27 14:20:04,319:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-27 14:20:04,319:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-27 14:20:04,319:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-27 14:20:04,323:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-27 14:20:04,324:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-27 14:20:04,326:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-27 14:20:04,856:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-27 14:20:04,857:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:20:04 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "3_GP0GQEM00": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-27 14:20:04,857:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-27 14:20:09,138:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7163_key-certbot.pem 2024-01-27 14:20:12,739:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7161_csr-certbot.pem 2024-01-27 14:20:12,740:DEBUG:acme.client:Requesting fresh nonce 2024-01-27 14:20:12,740:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-27 14:20:12,917:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-27 14:20:12,918:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:20:12 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZFzjvoQ64t7Ki2KCDthsxT44Sg2aDMuRq8otrZs-4Chgg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-27 14:20:12,918:DEBUG:acme.client:Storing nonce: fBfjtdZFzjvoQ64t7Ki2KCDthsxT44Sg2aDMuRq8otrZs-4Chgg 2024-01-27 14:20:12,918:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-01-27 14:20:12,925:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZ6anZvUTY0dDdLaTJLQ0R0aHN4VDQ0U2cyYURNdVJxOG90clpzLTRDaGdnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "hjRXF6Cr1aYrpb0uf1aDmKHiMCPRv6Rp5y4WPnnuglO-jLz91dlvhzaUHcw22xqwzGaaRrS3GcPe9Kh_kyOyhv7IwiT7VUU0WPqTJcY7_g6Rqe8sw5F2LaMQeyKmJlu1toEkySzVxnOCA3G8wDgmEYtayHnx-Tw-3KcbIxXEvY5v8SiqIkN1TtAwEhNBhsd6-Zi6HbvHDSsfIylLDpe90EO9WH1FJlUM-3cJ8rY0WCRQL6p4yy1qavyaqgGZJaFRPUCRj2y7xXlB5QaKZ0u0BS4Jiwe0o0QVIY07ui2Xy_ixuiul9a0Qf1dOgHb0fI3T5AU5aDUoPu1mQD6fysoR1Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-01-27 14:20:13,120:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-01-27 14:20:13,120:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 27 Jan 2024 13:20:12 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463315236 Replay-Nonce: fBfjtdZFjl20e7p0PGryCF7CM_fwug7SLWaNxWsfk9tcjqohyoU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:43Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186500336" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463315236" } 2024-01-27 14:20:13,121:DEBUG:acme.client:Storing nonce: fBfjtdZFjl20e7p0PGryCF7CM_fwug7SLWaNxWsfk9tcjqohyoU 2024-01-27 14:20:13,121:DEBUG:acme.client:JWS payload: b'' 2024-01-27 14:20:13,126:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186500336: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZqbDIwZTdwMFBHcnlDRjdDTV9md3VnN1NMV2FOeFdzZms5dGNqcW9oeW9VIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1MDAzMzYifQ", "signature": "nO5PiaytXrjoJfpAp4AswwEVbLwX-Km-JtobJluZ55gRe80JmhYF_nMzMcSy-BwU66M7Zc8b80ll-ckcsZseTsGdQ4x3qs38cPcs9oGX6uKKb1LgNAPf__89G1J7ERM9LEX9djzDXr39bkNwrzxhsaIlJznx4G5N4ylRGd-WwIc-zGhzGndbMT7-EEG-Y4CU1CFfEzI6kae8jl2vsio7U4HV9RJrIHKcqIWLHmBUAFFNpiAbCgO-2m11oS6AEk2B0PBgqLo4GZFOq68-QUQKspoY8sOnPOfBs6t1M-3BPEOT7CQVmEf0JrUWooMMOcGAW5wQRrwtOH1EVTBinZUvFg", "payload": "" } 2024-01-27 14:20:13,309:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186500336 HTTP/1.1" 200 810 2024-01-27 14:20:13,310:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:20:13 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCarm04Ch_qSJ00vgzJgKM3GKVbMKRc1JO8z6IiMALjt4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:43Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/MLFeSA", "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/NegWfw", "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/0vtuKQ", "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0" } ] } 2024-01-27 14:20:13,310:DEBUG:acme.client:Storing nonce: Wkq6jgLCarm04Ch_qSJ00vgzJgKM3GKVbMKRc1JO8z6IiMALjt4 2024-01-27 14:20:13,310:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-27 14:20:13,311:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-01-27 14:20:13,312:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-27 14:20:13,312:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-27 14:20:13,313:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 14:20:13,313:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-27 14:20:13,313:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-27 14:20:13,313:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-27 14:20:13,315:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 14:20:13,356:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-27 14:20:13,387:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-27 14:20:13,388:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-01-27 14:20:13,389:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-01-27 14:20:13,393:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:09 UTC. 2024-01-27 14:20:13,393:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 14:20:13,394:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-27 14:20:13,398:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-27 14:20:13,398:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-27 14:20:13,399:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-27 14:20:13,403:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-27 14:20:13,404:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-27 14:20:13,406:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-27 14:20:13,865:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-27 14:20:13,865:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:20:13 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "GxQxEdqXQTQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-27 14:20:13,866:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-27 14:20:17,667:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7164_key-certbot.pem 2024-01-27 14:20:21,294:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7162_csr-certbot.pem 2024-01-27 14:20:21,295:DEBUG:acme.client:Requesting fresh nonce 2024-01-27 14:20:21,295:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-27 14:20:21,448:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-27 14:20:21,448:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:20:21 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YqKakZpHcE431QFG9iyV2NAmjGID5gxJ8vn8UC5mG4eE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-27 14:20:21,449:DEBUG:acme.client:Storing nonce: VKfU247YqKakZpHcE431QFG9iyV2NAmjGID5gxJ8vn8UC5mG4eE 2024-01-27 14:20:21,449:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-01-27 14:20:21,455:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lxS2FrWnBIY0U0MzFRRkc5aXlWMk5BbWpHSUQ1Z3hKOHZuOFVDNW1HNGVFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "hRbN43xLrZyUPjKgEAEdqGwHi4jT_XEp_Nl-9Tl4aWPvAz46uQjyXSYo1r825HM2DNKbLm730dwQXuL3dcXOP9pAUUg6vN5xRRV-ujjyUmGTXUl_dGweklKB9W-CWyp0XOAQIN8ieXgikCOSJ8noq8adIz0O6gVt2PZAKJ8yjkjHWFg9GWopK8e-Uc0muc5wPVETqa79rjg6EZ40zeA_VDYGp0eAE8EbcRRZtJEul1PmuxhbL8rrW9FF6qNjn2aJWSQDZ-7PFjkReNpfyuOp4lZHa0m1Tqq972FMVO24q4u9RTr2oEHnJq8fK8oLi9C07zzHe_rx1n3M3Ej84Fix7g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-01-27 14:20:21,667:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-01-27 14:20:21,668:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 27 Jan 2024 13:20:21 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463336576 Replay-Nonce: VKfU247YkXqvLehUIoHGSQyq1aE47v_8NNAEuhLYio0O9T3pXWk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:52Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186530456" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463336576" } 2024-01-27 14:20:21,668:DEBUG:acme.client:Storing nonce: VKfU247YkXqvLehUIoHGSQyq1aE47v_8NNAEuhLYio0O9T3pXWk 2024-01-27 14:20:21,669:DEBUG:acme.client:JWS payload: b'' 2024-01-27 14:20:21,674:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186530456: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lrWHF2TGVoVUlvSEdTUXlxMWFFNDd2XzhOTkFFdWhMWWlvME85VDNwWFdrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1MzA0NTYifQ", "signature": "CT_9RAXUzh8Bg2iBTODBPRHbJnmjI7MgIXj1r0oj66to-QjzvD22S3eGAZrv9Auj6dOmovJdHfJ6xNsaQ8LAiT9vAAbPsPjaMXJSgiz-I-8pjRVVqJMOMzt632GULE8xZFXYn6is9elBm5VFlTK9zOf4eDmc1xgVvKIFCkm9qUcIL0jgxOu1AZmlXu-T5hZb4j84gD3fEqPTrR-IqPxKOGAFg4v-ePFlcraxjRpwZowAbnJzcbjobO0JrMtMhfkVWXs3sXBxDgnsDy6ugs616rgDl8Iw1LlabGGhO7SK7gcjmjIz0CojYxZHo3-dGSstLnUY8qv5SQKbvYgbTh014g", "payload": "" } 2024-01-27 14:20:21,836:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186530456 HTTP/1.1" 200 809 2024-01-27 14:20:21,837:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:20:21 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YcE3CuF_BJorzJFvN1fdDcSUmCoyPfOlRkmT8gFftQ9A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:52Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/ibbbOA", "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/W42erg", "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/xDGKCQ", "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI" } ] } 2024-01-27 14:20:21,837:DEBUG:acme.client:Storing nonce: VKfU247YcE3CuF_BJorzJFvN1fdDcSUmCoyPfOlRkmT8gFftQ9A 2024-01-27 14:20:21,838:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-27 14:20:21,838:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-01-27 14:20:21,838:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-27 14:20:21,839:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-27 14:20:21,839:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 14:20:21,840:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-27 14:20:21,840:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-27 14:20:21,840:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-27 14:20:21,841:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 14:20:21,891:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-27 14:20:21,935:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-27 14:20:21,936:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is signed by the certificate's issuer. 2024-01-27 14:20:21,937:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD 2024-01-27 14:20:21,941:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:26 UTC. 2024-01-27 14:20:21,941:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 14:20:21,942:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-27 14:20:21,945:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-27 14:20:21,946:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-27 14:20:21,946:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-27 14:20:21,950:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-27 14:20:21,951:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-27 14:20:21,953:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-27 14:20:22,412:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-27 14:20:22,413:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:20:22 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "NL-bKPGuB0E": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-27 14:20:22,414:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-27 14:20:26,195:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7165_key-certbot.pem 2024-01-27 14:20:29,783:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7163_csr-certbot.pem 2024-01-27 14:20:29,784:DEBUG:acme.client:Requesting fresh nonce 2024-01-27 14:20:29,784:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-27 14:20:29,938:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-27 14:20:29,938:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:20:29 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc5vYNjTj730RTVVHx-ptuxx40YRuT6YVM2nph7m9E55jo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-27 14:20:29,939:DEBUG:acme.client:Storing nonce: R3i4Vkc5vYNjTj730RTVVHx-ptuxx40YRuT6YVM2nph7m9E55jo 2024-01-27 14:20:29,939:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-01-27 14:20:29,945:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzV2WU5qVGo3MzBSVFZWSHgtcHR1eHg0MFlSdVQ2WVZNMm5waDdtOUU1NWpvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "TODWeEFjeifbNFp2BTyvvOtOj422TicgWMXLk3x8WDlBb4wBJysEN_ExNOexp4gwa_rDyYDIk_6-s_Ml__oLuMfY2FpjALNgaxq50-kE3H0gtkfloZpR-vDEpMiwoCr1wFDY3FaPvPBlfo8rFrklaZNKkCWDTPlF61dkvmM_zqDQAstvAT2he5SpJQdFRUYKfBK4_av8Bi_e_ImKhozfFgGQ-312dxXZrvyq_lLHPTpyzdu0b8ey7r03t0yyD7qeHMNNC1YQIdU64m1Vhzo4QFBgDpTffWmrrFTw-AMYP51ysdePCjbml8xhmsm_kI5tdc9j2bmNpiHaP20VWzA6Ng", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-01-27 14:20:30,152:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-01-27 14:20:30,153:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 27 Jan 2024 13:20:30 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463357966 Replay-Nonce: VKfU247YPWt_mcPBMcbeQtPWZIuaYklBetBO6YvepPda-ntPfC8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:47:01Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186562236" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463357966" } 2024-01-27 14:20:30,153:DEBUG:acme.client:Storing nonce: VKfU247YPWt_mcPBMcbeQtPWZIuaYklBetBO6YvepPda-ntPfC8 2024-01-27 14:20:30,153:DEBUG:acme.client:JWS payload: b'' 2024-01-27 14:20:30,161:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186562236: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lQV3RfbWNQQk1jYmVRdFBXWkl1YVlrbEJldEJPNll2ZXBQZGEtbnRQZkM4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1NjIyMzYifQ", "signature": "g5RrR6T86C_eg0TdIfiY0TdnFmRAqfRLDTy_5S5ZMb7zrklmOUj4Ooy7nL8tqI0Zhg7XSMP8KCaNoEmLnuqj8fP7A3Szxst-qwxrdK44cpXXal0vLg4ttNcbvbT0I9qgrnSxyfGZsZHNlN5fMb3xU1Pfl8w3LnDe11QVMwz8lP8ewfU4Niza8a-BGgHzpnlQ7uQf-m6cb6_B-dOKb_FQ-AG4AE7JO7a1hAs5b9ZAtIwe3tfYslSudICNUrxBjsAUSYgVFoviFOltLiH6hiDe3mRL_So2OQL1afBV589rr_eYMOW3qvW_6jJP3htGI5V4QxR3M6xvVb_Yzect_91QYw", "payload": "" } 2024-01-27 14:20:30,338:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186562236 HTTP/1.1" 200 805 2024-01-27 14:20:30,339:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:20:30 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247Y6Pe5_RQ-W1gdXdCR0IikDKxplvMxvTnvg7NfbQqp1zs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:47:01Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/d2C2Aw", "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/yk_m2Q", "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/2CxhFQ", "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE" } ] } 2024-01-27 14:20:30,339:DEBUG:acme.client:Storing nonce: VKfU247Y6Pe5_RQ-W1gdXdCR0IikDKxplvMxvTnvg7NfbQqp1zs 2024-01-27 14:20:30,340:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-27 14:20:30,340:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-01-27 14:20:30,340:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-27 14:20:30,341:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-27 14:20:30,342:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 14:20:30,342:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-27 14:20:30,342:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-27 14:20:30,342:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-27 14:20:30,344:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 14:20:30,392:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-27 14:20:30,425:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-27 14:20:30,426:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-27 14:20:30,427:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-27 14:20:30,431:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:43 UTC. 2024-01-27 14:20:30,432:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 14:20:30,432:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-27 14:20:30,437:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-27 14:20:30,437:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-27 14:20:30,437:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-27 14:20:30,442:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-27 14:20:30,442:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-27 14:20:30,444:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-27 14:20:30,984:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-27 14:20:30,985:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:20:30 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "fy1FOAGoEP4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-27 14:20:30,985:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-27 14:20:34,920:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7166_key-certbot.pem 2024-01-27 14:20:38,517:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7164_csr-certbot.pem 2024-01-27 14:20:38,517:DEBUG:acme.client:Requesting fresh nonce 2024-01-27 14:20:38,517:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-27 14:20:38,700:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-27 14:20:38,701:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:20:38 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZFDwHoS_HEZuPMdJ6TYzrQfyplouwtXy9ADelv0uekChI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-27 14:20:38,701:DEBUG:acme.client:Storing nonce: fBfjtdZFDwHoS_HEZuPMdJ6TYzrQfyplouwtXy9ADelv0uekChI 2024-01-27 14:20:38,702:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-01-27 14:20:38,709:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZEd0hvU19IRVp1UE1kSjZUWXpyUWZ5cGxvdXd0WHk5QURlbHYwdWVrQ2hJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "oiuu8xcpEIfPxtKJeMBKMUw1_x5Q_M0guc9DkEcGKVTehPyLj58kQia4MdUNuNS-a9fJipPRfzEsKJHGUPMRR0vwO9xx_0EEqL4ODRSEJxWEQbDZbIIbz5gmbATrKNonFp7Vyg-y5jyE7PkV95JC03uH1wY7MorwQyfFYL0q6lzj6axjwNgqH-SQIzJw6ZJgTMmQIcpquHMg--nSDT4mpSfsps6-hL7ASXtZ3lsKL-5OUiMlIlj6BLVvrJf9susSlEXM1cp4eMpmbcWd8ljMrt67HV0tMXaVe7shdDYU8_D3IBL-DP-kSSCTTmDIHK4BzQdozKp4pjKdzbS_1_cH0w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-01-27 14:20:38,935:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-01-27 14:20:38,936:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 27 Jan 2024 13:20:38 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463390816 Replay-Nonce: Wkq6jgLCXoBexH4AzqTPvbNosVy3rDwRFGDz5LWqlUv9Iv5uzcQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:47:11Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186609606" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463390816" } 2024-01-27 14:20:38,936:DEBUG:acme.client:Storing nonce: Wkq6jgLCXoBexH4AzqTPvbNosVy3rDwRFGDz5LWqlUv9Iv5uzcQ 2024-01-27 14:20:38,936:DEBUG:acme.client:JWS payload: b'' 2024-01-27 14:20:38,942:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186609606: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENYb0JleEg0QXpxVFB2Yk5vc1Z5M3JEd1JGR0R6NUxXcWxVdjlJdjV1emNRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY2MDk2MDYifQ", "signature": "NOVsiedyfmynsIYm5V8AaSDdwW-q1SEHnSzJqMRRodbH52k73ryFqG4kE-mkM_6HDk1ktAweJmLl13VwwxA4e5E3AZiTuO1LrI4q1nFXuzcrv-kWOPs7YSiRcOtaM1IJ50runYYUYUujc0X8VWvbNbIfABwOyQtGbxYJB4ywE2r7fGIYr9QVm_WAdiKKR-_5RSKSDb4KKKo4DZm0yjZXYLQd5n8cTeOWVMA4UDfnWNRQTD5K6o1ZgpH62jwo7Zd88LJuWXgNnWvGJHLUJfsnAr5IFRdRIixtc1MeSlg4OWE_pSpnHX8uVTJpMnJBJOYVI_t09ZjO29aDjZ60WrV6uw", "payload": "" } 2024-01-27 14:20:39,126:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186609606 HTTP/1.1" 200 805 2024-01-27 14:20:39,127:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:20:38 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCQBOWd07nWPY9-iMCGBPBvNse0q94Xy2BQGqB5jSCxhI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:47:11Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/u86J_A", "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/GMvoKw", "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/skcDcA", "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA" } ] } 2024-01-27 14:20:39,127:DEBUG:acme.client:Storing nonce: Wkq6jgLCQBOWd07nWPY9-iMCGBPBvNse0q94Xy2BQGqB5jSCxhI 2024-01-27 14:20:39,130:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-27 14:20:39,130:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-01-27 14:20:39,131:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-27 14:20:39,131:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-27 14:20:39,132:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 14:20:39,132:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-27 14:20:39,132:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-27 14:20:39,133:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-27 14:20:39,135:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 14:20:39,173:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-27 14:20:39,401:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-27 14:20:39,402:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-01-27 14:20:39,403:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-01-27 14:20:39,408:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:40:02 UTC. 2024-01-27 14:20:39,408:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 14:20:39,408:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-27 14:20:39,413:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-27 14:20:39,413:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-27 14:20:39,413:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-27 14:20:39,418:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-27 14:20:39,419:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-27 14:20:39,421:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-27 14:20:39,950:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-27 14:20:39,951:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:20:39 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "8qihUIkhgW8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-27 14:20:39,951:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-27 14:20:43,828:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7167_key-certbot.pem 2024-01-27 14:20:47,420:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7165_csr-certbot.pem 2024-01-27 14:20:47,420:DEBUG:acme.client:Requesting fresh nonce 2024-01-27 14:20:47,420:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-27 14:20:47,598:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-27 14:20:47,599:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:20:47 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZF4qDUOYPoq2Dn6gYqBWmAvGC-OnjIky1ILL1FVxwMaiA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-27 14:20:47,599:DEBUG:acme.client:Storing nonce: fBfjtdZF4qDUOYPoq2Dn6gYqBWmAvGC-OnjIky1ILL1FVxwMaiA 2024-01-27 14:20:47,599:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-01-27 14:20:47,605:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkY0cURVT1lQb3EyRG42Z1lxQldtQXZHQy1PbmpJa3kxSUxMMUZWeHdNYWlBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "r3IT-nIaafjbXf34lgr5G2C3GPAamxVFlzGgDBUA_UovSYEe4Fetx13x5LRepfkThBHvkkREMXUYgxPp-usyBS4E_N52uDd9iUn_4PTLBMEkyDtkyp_r9xvh8oVZalxPBBKe_dLTMCrbxHM1h4OrXZgc6wrBOVqoLe61POuCAU1Uxm4x8Qz4xX_PhvyFq4eoxdHvpcy2HRulibEkKWU_MrCe00oJpS0k1ZIFR1rwCaXl2MBqulOekT48zhJO9CrNfehpfmcr4xTy0Stc1TzEIdLPQhP4RqAysvs5VoVTL4O2rZC2OFQ2XWry1TFYSoDs9hAi318CcN2Z6p4Z-_cE_A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-01-27 14:20:47,811:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-01-27 14:20:47,812:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 27 Jan 2024 13:20:47 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463415626 Replay-Nonce: Wkq6jgLCwT5DRF8KSPHHXWFg-dzF8lxADQEreK82pYuJzRKx_yA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:47:20Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186648386" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463415626" } 2024-01-27 14:20:47,812:DEBUG:acme.client:Storing nonce: Wkq6jgLCwT5DRF8KSPHHXWFg-dzF8lxADQEreK82pYuJzRKx_yA 2024-01-27 14:20:47,813:DEBUG:acme.client:JWS payload: b'' 2024-01-27 14:20:47,819:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186648386: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTEN3VDVEUkY4S1NQSEhYV0ZnLWR6RjhseEFEUUVyZUs4MnBZdUp6Ukt4X3lBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY2NDgzODYifQ", "signature": "MZR7iumNrG1BApOH1bUSE37n_bJRncDd5kBY2toSiav58kaokRWoNbHlZc0DV3-jIfqFR6wJXPlTxcfG4NvXebxByCwPD3bTH07ak79eIb_iJu7tbpYK6cNRWpeJe6mHu6Et8HY4kNEYtPah6HkXQN_PyVCYzXVbKNlLBns2YjVn0C8arI9M4Wqrm1QS-jYmJC9Raa12b2GXlKxtSGqt7QTck22_GDbVzVN8gLQHemlpcF5ehJqi8BbPi2B6Y54j_0_1VBKYahRbdnXsot7vu07SIktYWa9o5ZbAVP4XrC2_7fK44_9_PUMOYna2vaCPX6mhDJHJ8IJeR7lo7fEowA", "payload": "" } 2024-01-27 14:20:48,001:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186648386 HTTP/1.1" 200 805 2024-01-27 14:20:48,001:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 13:20:47 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLC5FC6zhx9MmPskdH8hHXO6H45NlmkQwAgd4_vdA5LOr0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:47:20Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/AfqDTw", "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/2qup_g", "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/cLgsJg", "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE" } ] } 2024-01-27 14:20:48,001:DEBUG:acme.client:Storing nonce: Wkq6jgLC5FC6zhx9MmPskdH8hHXO6H45NlmkQwAgd4_vdA5LOr0 2024-01-27 14:20:48,002:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-27 14:20:48,002:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-01-27 14:20:48,002:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-27 14:20:48,003:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-27 14:20:48,003:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 14:20:48,004:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-27 14:20:48,004:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-27 14:20:48,004:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-27 14:20:48,005:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 14:20:48,006:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-01-27 14:20:48,006:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-01-27 14:20:48,017:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-01-27 14:20:48,019:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)