2024-01-27 10:39:44,585:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-01-27 10:39:44,585:DEBUG:certbot._internal.main:Arguments: [] 2024-01-27 10:39:44,585:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-01-27 10:39:45,691:DEBUG:certbot._internal.log:Root logging level set at 20 2024-01-27 10:39:45,692:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-01-27 10:39:45,731:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x04F6D3B0> and installer <certbot._internal.cli.cli_utils._Default object at 0x04F6D3B0> 2024-01-27 10:39:45,771:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-27 10:39:46,022:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-27 10:39:46,024:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is signed by the certificate's issuer. 2024-01-27 10:39:46,028:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is: OCSPCertStatus.GOOD 2024-01-27 10:39:46,036:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:15 UTC. 2024-01-27 10:39:46,036:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 10:39:46,037:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-27 10:39:46,041:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x049D5870> Prep: True 2024-01-27 10:39:46,042:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x049D5870> and installer None 2024-01-27 10:39:46,042:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-27 10:39:46,046:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-01-27 10:39:46,047:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-27 10:39:46,049:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-27 10:39:46,529:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-27 10:39:46,530:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:39:43 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "QQ7bwYmv4MQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-27 10:39:46,531:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-27 10:39:51,300:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7142_key-certbot.pem 2024-01-27 10:39:55,683:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7140_csr-certbot.pem 2024-01-27 10:39:55,683:DEBUG:acme.client:Requesting fresh nonce 2024-01-27 10:39:55,683:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-27 10:39:55,840:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-27 10:39:55,840:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:39:53 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: VKfU247YUts3un7BWLErNVf6ZZp3Z07ZVaIrH3xA0kd9BbLtM_s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-27 10:39:55,841:DEBUG:acme.client:Storing nonce: VKfU247YUts3un7BWLErNVf6ZZp3Z07ZVaIrH3xA0kd9BbLtM_s 2024-01-27 10:39:55,841:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-01-27 10:39:55,848:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lVdHMzdW43QldMRXJOVmY2WlpwM1owN1pWYUlySDN4QTBrZDlCYkx0TV9zIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "L_R1tTpoI95Jx8wkcAwquWeQ46bgM03hUU6DPywIUeCqfBpbhGb80mRddb5vmeebEifquILQcsNlOEEYd6ZRr1-G5Ldi48xMuw4zBIZ7K8TkmOWa8vMeaNrwKs7FwVnr-UFb4CQTpXyNpK1LkjbdAwHU5R0fynvYqUVC1wdb0kKxKWQGLVrtw5l-GX-HnoBLZBsNiPO-mMIbk-9DymEp_Gq46yQ3sVFS_VE3zlzWzQ-tTxzN-_-quskaoFlf64yK9X6UsQz4JOD0MsjzC3DZ2MOjwgQpxgV1PNBDvqHrAeVDdjyvqBJ2SDB1cE5xHs6QWSYEW_KAEtbbvxzFCu-GZg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-01-27 10:39:56,019:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-01-27 10:39:56,020:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 27 Jan 2024 09:39:53 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463125096 Replay-Nonce: R3i4Vkc5iBQzlN44BteOc9z6FPNWY0vTiUcw-0ulhJLOUZ6g35Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:45:30Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186209716" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463125096" } 2024-01-27 10:39:56,021:DEBUG:acme.client:Storing nonce: R3i4Vkc5iBQzlN44BteOc9z6FPNWY0vTiUcw-0ulhJLOUZ6g35Y 2024-01-27 10:39:56,022:DEBUG:acme.client:JWS payload: b'' 2024-01-27 10:39:56,033:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186209716: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVpQlF6bE40NEJ0ZU9jOXo2RlBOV1kwdlRpVWN3LTB1bGhKTE9VWjZnMzVZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyMDk3MTYifQ", "signature": "oMdmGF1rcvEaXnCSe2EYs429FAaoV2WW5trSvytizrOjY1aKbmZ0okWoDy8-H9dgLxZqI0PqP7-OPXkfhI9jphSCoJtkEHJITmwNwBS6GYcH8L5NG_Nn9Go8f4miZsoPxwbTTZSwnqBREMzcZZjBL1KNCjrLjDlP_3NQ4uixB_mVwBCTWxWZz165AZjA-CnfZrzl575lK8h__xAA1ndcGfQhR6HyZDgC0db9YwRS_UTkTM28pnDC9tf8AaCUl_LSUJeJRYXJLDH-0pP1v-jWAcOocVNVhVQNdc4Xck9HLB0QSkYbe_8Q6SX7mXKXzUW9c31ejl538KX-2MKVVaOI9Q", "payload": "" } 2024-01-27 10:39:56,211:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186209716 HTTP/1.1" 200 810 2024-01-27 10:39:56,212:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:39:53 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: VKfU247Yc_XTvPd7F366V0mSLXGlkFn6exTyykB2EAcKa2GSdtc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:45:30Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/6f0kFQ", "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/TzPnqw", "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/f71chA", "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo" } ] } 2024-01-27 10:39:56,212:DEBUG:acme.client:Storing nonce: VKfU247Yc_XTvPd7F366V0mSLXGlkFn6exTyykB2EAcKa2GSdtc 2024-01-27 10:39:56,213:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-27 10:39:56,213:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-01-27 10:39:56,213:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-27 10:39:56,213:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-27 10:39:56,224:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 10:39:56,224:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-27 10:39:56,224:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-27 10:39:56,225:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-27 10:39:56,231:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 10:39:56,272:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-27 10:39:56,426:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-27 10:39:56,427:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-27 10:39:56,428:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-27 10:39:56,432:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:32 UTC. 2024-01-27 10:39:56,433:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 10:39:56,433:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-27 10:39:56,438:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x049D5410> Prep: True 2024-01-27 10:39:56,438:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x049D5410> and installer None 2024-01-27 10:39:56,438:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-27 10:39:56,443:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-01-27 10:39:56,444:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-27 10:39:56,446:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-27 10:39:56,973:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-27 10:39:56,974:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:39:54 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "uTG4ckRjEoc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-01-27 10:39:56,974:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-27 10:40:01,047:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7143_key-certbot.pem 2024-01-27 10:40:04,839:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7141_csr-certbot.pem 2024-01-27 10:40:04,840:DEBUG:acme.client:Requesting fresh nonce 2024-01-27 10:40:04,840:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-27 10:40:05,017:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-27 10:40:05,018:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:40:02 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: Wkq6jgLCMU58piAkSvGv2CNnD66s57xRynjqpb6ZIKPLoIB7vws X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-27 10:40:05,018:DEBUG:acme.client:Storing nonce: Wkq6jgLCMU58piAkSvGv2CNnD66s57xRynjqpb6ZIKPLoIB7vws 2024-01-27 10:40:05,018:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-01-27 10:40:05,025:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENNVTU4cGlBa1N2R3YyQ05uRDY2czU3eFJ5bmpxcGI2WklLUExvSUI3dndzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ZhxNoFW-gYG91DyomB-zWqJD1aDM8CTdhZIEcYIbQEhEste9hnnsJ49kOo-yTph1NhwS8FG9JnX-fYT9jmwtXB0i90vRuRlNWCL9kyKRYT-9BtRTgvyDzGNl9OKtcfiIpfLHfi7YoI0C9LP6N5MG3KDEPI2Cp3Vv9NfOSbAz7-VwaTnBDlhoyYLD2KpIhyRiVLM5EcuKM2oZCkPq7UcfixZRvKFsp4PIZ_Kr9PvZmMOGbBI9RQhiMLS-Fgp7QqF1JUKvPh9RQJ00E1LCtAJAwIRj1b_N16DTIUgz4wEfD_BhOTw-BiGmDakYIzgXcHU_4xXnjMBWNiXSA2hQNU_7Mw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-01-27 10:40:05,219:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-01-27 10:40:05,220:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 27 Jan 2024 09:40:02 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463146186 Replay-Nonce: Wkq6jgLCxu95gp_Cfm2nf1JAFECOYyu-WZ0j1ycMBXYIlOsdIl8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:45:39Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186240836" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463146186" } 2024-01-27 10:40:05,220:DEBUG:acme.client:Storing nonce: Wkq6jgLCxu95gp_Cfm2nf1JAFECOYyu-WZ0j1ycMBXYIlOsdIl8 2024-01-27 10:40:05,221:DEBUG:acme.client:JWS payload: b'' 2024-01-27 10:40:05,228:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186240836: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTEN4dTk1Z3BfQ2ZtMm5mMUpBRkVDT1l5dS1XWjBqMXljTUJYWUlsT3NkSWw4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyNDA4MzYifQ", "signature": "PIpIFppBiAMVwv-Pq-gqps6CIgHvnluDeE_m7ZuHDGD-ZRzN31LU8HS48iW8B3Y-Y_97Z1X6bwHNooIyDiaaFHWn-pGV92Sj8w6iCi6B-DVDtN304dPIrCxow_Ok10OK4pqpX0t35oZceMXCNTUE_FwZkuICKR6fvjl8TycAtOs4Wa0lQZtKhJp7EWSMCrX9sqmrXJ0dGitCqrmRJmETmZi7ABFrKxVt09ybZWT2oP1joHW7On0Kn0vdFmciYOywVuzJvBFthlfi86ZILKOFV9u2vFJxoYLprPXIjyl5xmgcktGDoIwSSDMvek8ZPfWfsyG1eX_4hDUUHwkdVpvJIw", "payload": "" } 2024-01-27 10:40:05,409:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186240836 HTTP/1.1" 200 804 2024-01-27 10:40:05,410:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:40:02 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: fBfjtdZFqpypeqyZEZbgs_Wruh7NR4mj1uxAZI3KoCx_c4zUBJQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:45:39Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/g8SMBA", "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/KdDipg", "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/N41DHw", "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I" } ] } 2024-01-27 10:40:05,410:DEBUG:acme.client:Storing nonce: fBfjtdZFqpypeqyZEZbgs_Wruh7NR4mj1uxAZI3KoCx_c4zUBJQ 2024-01-27 10:40:05,411:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-27 10:40:05,412:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-01-27 10:40:05,412:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-27 10:40:05,413:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-27 10:40:05,414:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 10:40:05,415:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-27 10:40:05,415:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-27 10:40:05,416:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-27 10:40:05,418:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 10:40:05,470:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-27 10:40:05,669:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-27 10:40:05,670:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-01-27 10:40:05,671:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-01-27 10:40:05,675:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:49 UTC. 2024-01-27 10:40:05,675:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 10:40:05,676:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-27 10:40:05,681:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04F4B290> Prep: True 2024-01-27 10:40:05,682:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04F4B290> and installer None 2024-01-27 10:40:05,682:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-27 10:40:05,697:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-01-27 10:40:05,698:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-27 10:40:05,699:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-27 10:40:06,160:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-27 10:40:06,161:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:40:03 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "3omb9SXHjnY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-27 10:40:06,161:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-27 10:40:10,083:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7144_key-certbot.pem 2024-01-27 10:40:13,772:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7142_csr-certbot.pem 2024-01-27 10:40:13,772:DEBUG:acme.client:Requesting fresh nonce 2024-01-27 10:40:13,773:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-27 10:40:13,932:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-27 10:40:13,933:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:40:11 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: VKfU247Y2LRw6byd7HXNaTTVqASlldcxksaHAZOopy_yHieUQ1g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-27 10:40:13,933:DEBUG:acme.client:Storing nonce: VKfU247Y2LRw6byd7HXNaTTVqASlldcxksaHAZOopy_yHieUQ1g 2024-01-27 10:40:13,934:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-01-27 10:40:13,941:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1kyTFJ3NmJ5ZDdIWE5hVFRWcUFTbGxkY3hrc2FIQVpPb3B5X3lIaWVVUTFnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "A8qlwXiSntEY4zguy-0L3Wm46KecLbiU_Trna-GIvrA0Hi6Xu60fZrnj29n3xJHQrFDZ8R4zq0YJBjsT66blS3Hx7ZqxxFm7IyR2CTbsQFdSfDHl8UAp8ULKRc0y8t_-Ueum6LitjuOTrvFk3o1DduJ1Po0ZE_0LXoqnVXaXBKnin0zvETkUNZCVsPXeZvbk-T89PGHjzLUvr5iPPXcHHyFA8Lg6V7YOoYvJ-Zwc7bKy-NS_QUh0gLSgRarDUXJVoBaLwROSD5EUurzKj-bqDZxlOgiGCw2iAMZhpBROsGepRAru56unzO6KUyfQbGCkltW0B1rjIVUu9J48UfuXWQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-01-27 10:40:14,136:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-01-27 10:40:14,136:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 27 Jan 2024 09:40:11 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463167526 Replay-Nonce: R3i4Vkc5IVtzL5E7BucFTcMjhSJAk1gC-Ld5tnLHRRy2cMFQCQ0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:45:48Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186273596" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463167526" } 2024-01-27 10:40:14,136:DEBUG:acme.client:Storing nonce: R3i4Vkc5IVtzL5E7BucFTcMjhSJAk1gC-Ld5tnLHRRy2cMFQCQ0 2024-01-27 10:40:14,137:DEBUG:acme.client:JWS payload: b'' 2024-01-27 10:40:14,142:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186273596: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVJVnR6TDVFN0J1Y0ZUY01qaFNKQWsxZ0MtTGQ1dG5MSFJSeTJjTUZRQ1EwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyNzM1OTYifQ", "signature": "uI6dth5kioRmUVxdq6pO3oNgc-KW0xBX4mx2hN2Yh47GShgHRyHNgOZCDsbHdLQ9ZVbva_6vRjanb97-gLAEUGgEEOMD6UfOQIjQ7j5CHWEkOw5cDAD8VaxFvZyAuaGttdGpjaGDtP6tmuS6Pwu1mpscVYDmqf4ECTvyXMAlWxgpajHkjmpN5N9IwRJ2f010w3U0VDx3JFmFQsT6nViDbhEiOgRuIBTK7XK-1WMUpn8eo2e4gDMkfjQGH8vgH7xQs9sm3dXmed5ew_2gg_ZX1Ng93Q8zwxUfcDsDk8HAdA7_FDCMuf0PyiDuM2TsWO3mwnPenkEI8VF1iIOf2ewErw", "payload": "" } 2024-01-27 10:40:14,303:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186273596 HTTP/1.1" 200 807 2024-01-27 10:40:14,304:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:40:11 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: VKfU247Y3yI6TQIM2oScNMwD0g1707IHR1K-u69CmDHgimNySnc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:45:48Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/KNqRXQ", "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/KMda1w", "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/f-1bag", "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE" } ] } 2024-01-27 10:40:14,304:DEBUG:acme.client:Storing nonce: VKfU247Y3yI6TQIM2oScNMwD0g1707IHR1K-u69CmDHgimNySnc 2024-01-27 10:40:14,305:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-27 10:40:14,305:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-01-27 10:40:14,305:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-27 10:40:14,305:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-27 10:40:14,306:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 10:40:14,306:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-27 10:40:14,306:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-27 10:40:14,307:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-27 10:40:14,308:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 10:40:14,361:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-27 10:40:14,536:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-27 10:40:14,537:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-27 10:40:14,538:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-27 10:40:14,542:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:03 UTC. 2024-01-27 10:40:14,543:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 10:40:14,543:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-27 10:40:14,548:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x049EB490> Prep: True 2024-01-27 10:40:14,548:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x049EB490> and installer None 2024-01-27 10:40:14,548:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-27 10:40:14,553:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-01-27 10:40:14,554:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-27 10:40:14,556:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-27 10:40:15,087:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-27 10:40:15,089:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:40:12 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "xK760Ol5CCc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-01-27 10:40:15,090:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-27 10:40:19,151:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7145_key-certbot.pem 2024-01-27 10:40:22,838:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7143_csr-certbot.pem 2024-01-27 10:40:22,838:DEBUG:acme.client:Requesting fresh nonce 2024-01-27 10:40:22,838:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-27 10:40:23,015:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-27 10:40:23,016:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:40:20 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: fBfjtdZFaOGkQ8D0fW2bi3Cv7gWzE3amFPoBYFDMUMmq2h0djpA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-27 10:40:23,016:DEBUG:acme.client:Storing nonce: fBfjtdZFaOGkQ8D0fW2bi3Cv7gWzE3amFPoBYFDMUMmq2h0djpA 2024-01-27 10:40:23,017:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-01-27 10:40:23,028:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZhT0drUThEMGZXMmJpM0N2N2dXekUzYW1GUG9CWUZETVVNbXEyaDBkanBBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "mpBfclnI_A81MrFxpM2jlKxMR4onGHm59yTOe3dJxLvljPWmTlT-wxG20lRQ_Sw_w3UDrLxVD8dnrCDIRmaW5lS8UjGcuEvtUqT0b8Ft-swWvTryNGDj2ebZ2mZL4txqp3jUjqV49l550sUL0S2GtFpLYJWTSnKZfIB3ccQp9tw1q2X5zFv9AhmMSTxGERb1r4d6-hi7OqPbtM6taUqlOe2Sj8_gOQ17UE2bBe7t58bESro0V4PH51G4bIQMrR-wsFCVVhNe5gwzafNcFODJKpHtdLc1yw6MXG3wBR9-hThSyGxWPl-aJhT2G9ixPrmRiWcSU2s1z6nJZ8Ee9vgSdQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-01-27 10:40:23,226:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-01-27 10:40:23,227:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 27 Jan 2024 09:40:20 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463187546 Replay-Nonce: Wkq6jgLCYKR4bn4E3xYjR4DwwJ-4SbN086UfBlNPooc_c-akrO4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:45:58Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186305236" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463187546" } 2024-01-27 10:40:23,227:DEBUG:acme.client:Storing nonce: Wkq6jgLCYKR4bn4E3xYjR4DwwJ-4SbN086UfBlNPooc_c-akrO4 2024-01-27 10:40:23,227:DEBUG:acme.client:JWS payload: b'' 2024-01-27 10:40:23,233:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186305236: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENZS1I0Ym40RTN4WWpSNER3d0otNFNiTjA4NlVmQmxOUG9vY19jLWFrck80IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzMDUyMzYifQ", "signature": "RkVeEpP-LOoSXjFWDL4EYP087XYoyMozMMh656EwJkO1RAJeaIZtmsvZWgxY7cNFf8Z_wmFXf_NPkqf1sDGCFNKTK7Ngk_IFOoZgOwG8edApLK-JBQKE0HgE_v5mZAyF2WioQNnDE4GmN-1CIyUbmrtCuLprluFrasZn3FLNWRO-aB_U7wAx1zt72PYhSNjmToZDudjPg8iE-RCZocRkhWEGArZsw7xCOH7hyr86baP8HUdxdd5BDBfdZ0uRRzaeERI8qCO5coxfHh0aj6y7XrBSwvFz4SimCXKY-Z6nQxFf2PX7zszoIXtZPr_AXdsm2OEevpBTSNchX_FseCFwPg", "payload": "" } 2024-01-27 10:40:23,414:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186305236 HTTP/1.1" 200 801 2024-01-27 10:40:23,414:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:40:20 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: fBfjtdZF8rWjC1klxux5I7smvvEjC3dRe5hjIesa7SveVg14l-c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:45:58Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/H-2NUg", "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/SPl0kw", "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/dBmW2A", "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY" } ] } 2024-01-27 10:40:23,415:DEBUG:acme.client:Storing nonce: fBfjtdZF8rWjC1klxux5I7smvvEjC3dRe5hjIesa7SveVg14l-c 2024-01-27 10:40:23,415:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-27 10:40:23,416:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-01-27 10:40:23,416:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-27 10:40:23,416:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-27 10:40:23,417:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 10:40:23,418:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-27 10:40:23,418:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-27 10:40:23,418:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-27 10:40:23,420:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 10:40:23,469:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-27 10:40:23,637:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-27 10:40:23,638:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-27 10:40:23,639:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-27 10:40:23,642:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:20 UTC. 2024-01-27 10:40:23,642:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 10:40:23,643:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-27 10:40:23,647:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x049D5410> Prep: True 2024-01-27 10:40:23,648:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x049D5410> and installer None 2024-01-27 10:40:23,648:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-27 10:40:23,653:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-01-27 10:40:23,654:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-27 10:40:23,656:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-27 10:40:24,185:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-27 10:40:24,185:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:40:21 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "jt9FXgEohSI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-27 10:40:24,186:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-27 10:40:28,177:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7146_key-certbot.pem 2024-01-27 10:40:31,726:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7144_csr-certbot.pem 2024-01-27 10:40:31,727:DEBUG:acme.client:Requesting fresh nonce 2024-01-27 10:40:31,727:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-27 10:40:31,904:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-27 10:40:31,904:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:40:29 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: Wkq6jgLCviOGpfV4UagxGvkhQqFufSyMQhJY8v-i256S7ChDL8w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-27 10:40:31,905:DEBUG:acme.client:Storing nonce: Wkq6jgLCviOGpfV4UagxGvkhQqFufSyMQhJY8v-i256S7ChDL8w 2024-01-27 10:40:31,905:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-01-27 10:40:31,909:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTEN2aU9HcGZWNFVhZ3hHdmtoUXFGdWZTeU1RaEpZOHYtaTI1NlM3Q2hETDh3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "JhMA-LyqK3WI3Wp1aWrCq1LHD0nYispKGBCcZJ7QAJWwLsqoMoYJAcCJ9RFCacEKSzW_672XXZNiPmcaJEaO7aGGHNU-A3LccPceGQz9fd0AsmJKO8sTSd4pHnYgYZY0O4_giKDg7h1lM62UfMAPpe6OPZlbSrRbze4-oFypY5opF9NWwIotHCYr0Jy8i3Lm4J-tALqRx_-ngF-cQFh14ISl4IIq6U9YQWo1FgNexvtmmskkIQumvSfPz-3krMTNsyiIm2kqwD3o1TLpxJDx-5j5caS0AnKMFYF1Y2FBXLPVhiMTb7IP7kyGUcW7C0rGxGCkLRR3pCVE2HPxWBeMDg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-01-27 10:40:32,190:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-01-27 10:40:32,192:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 27 Jan 2024 09:40:29 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463215876 Replay-Nonce: Wkq6jgLCKGrMaDtM1h7spWqGpQ6Ywv-kgtZi9ciMwqQibhwXkck X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:07Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186343916" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463215876" } 2024-01-27 10:40:32,192:DEBUG:acme.client:Storing nonce: Wkq6jgLCKGrMaDtM1h7spWqGpQ6Ywv-kgtZi9ciMwqQibhwXkck 2024-01-27 10:40:32,193:DEBUG:acme.client:JWS payload: b'' 2024-01-27 10:40:32,201:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186343916: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENLR3JNYUR0TTFoN3NwV3FHcFE2WXd2LWtndFppOWNpTXdxUWliaHdYa2NrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzNDM5MTYifQ", "signature": "YVB7b86kn1Mx-XDDwr1A33OR7-CFtSdpKor16b8ZXW6exZuejP-kqg6btrQrZc2CW-pyIRuTmzpgkVGWyp7IuH7msYYQa2xSPmN2PALm-BV-so5eLZZQbORlUdrU8Bs1fu7WGqD9nlMgHc2gcaacy-7fnA-G2Wx_abYfPXoTUTKHqDzWRfMHQKES9ZyEsfRmxE-rwx0BWmjauFupJL5JxaccxHIM0gMRu_JOiEVF8FdQKV1xxF1CPKjxdEyccuP5kSHn1kiThflxKgWZt8lsF8O9xMtywA8WOiK26AQUc4vDBgLebaiG8qYbxHoJu5ennSnrm2IQzDpCtHq_lR8g_g", "payload": "" } 2024-01-27 10:40:32,382:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186343916 HTTP/1.1" 200 805 2024-01-27 10:40:32,383:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:40:29 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: fBfjtdZFIs5e3T0x89fYox50w8fzR3JTf-Q27b7a7U4zxdXlZTE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:07Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/FQmNLA", "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/nw3Heg", "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/o7wJkQ", "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE" } ] } 2024-01-27 10:40:32,384:DEBUG:acme.client:Storing nonce: fBfjtdZFIs5e3T0x89fYox50w8fzR3JTf-Q27b7a7U4zxdXlZTE 2024-01-27 10:40:32,385:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-27 10:40:32,386:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-01-27 10:40:32,386:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-27 10:40:32,387:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-27 10:40:32,388:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 10:40:32,388:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-27 10:40:32,388:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-27 10:40:32,388:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-27 10:40:32,389:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 10:40:32,428:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-27 10:40:32,607:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-27 10:40:32,608:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-01-27 10:40:32,609:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-01-27 10:40:32,613:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:36 UTC. 2024-01-27 10:40:32,613:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 10:40:32,614:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-27 10:40:32,619:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04F4B290> Prep: True 2024-01-27 10:40:32,619:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04F4B290> and installer None 2024-01-27 10:40:32,619:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-27 10:40:32,624:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-01-27 10:40:32,625:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-27 10:40:32,627:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-27 10:40:33,065:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-27 10:40:33,065:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:40:30 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "w3hLWWCQd-Y": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-01-27 10:40:33,066:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-27 10:40:37,176:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7147_key-certbot.pem 2024-01-27 10:40:40,857:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7145_csr-certbot.pem 2024-01-27 10:40:40,858:DEBUG:acme.client:Requesting fresh nonce 2024-01-27 10:40:40,858:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-27 10:40:41,007:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-27 10:40:41,008:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:40:38 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: VKfU247YTd0DSaK6u0pk8_UyAj2XXqyvp0F_GPaNGcQpp9xYzVE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-27 10:40:41,008:DEBUG:acme.client:Storing nonce: VKfU247YTd0DSaK6u0pk8_UyAj2XXqyvp0F_GPaNGcQpp9xYzVE 2024-01-27 10:40:41,009:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-01-27 10:40:41,014:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lUZDBEU2FLNnUwcGs4X1V5QWoyWFhxeXZwMEZfR1BhTkdjUXBwOXhZelZFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "l_K4EUfNfhRuZbacwBqahf259jysm5wJ1EZR3YhvVZklDdPob1boF91-rgHVCxpNJBZFfSUvPHmcsWGLi6myNteRxYeJSz_aTDwkR50yVJT1XjxpyTlSwYdNNwMV3xVt6eBh0EduOCLVrevc7di-WmmnSIEg2RxVHZX9qT2ZS9ZNquT4C85ZJjKm06JZU96oF08n6CnNtMRfYcDUog_-MlzmdgRc-oFd3V2T09W_hnxF9uAcwSHiuzAXBMZH4SaNnfu7AAQAY5dX6eMrYfbb553h4rAHAN2LK8GAl4tqFO1mEdeFJc70uirlTgf08lJEvRJF607EX4mU9Zc-5JEG2Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-01-27 10:40:41,204:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-01-27 10:40:41,205:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 27 Jan 2024 09:40:38 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463242076 Replay-Nonce: R3i4Vkc5yxiA0LAP3d139QJbP5mqTaXZtDoUQC3AnDHfwXSxL_0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:16Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186384516" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463242076" } 2024-01-27 10:40:41,205:DEBUG:acme.client:Storing nonce: R3i4Vkc5yxiA0LAP3d139QJbP5mqTaXZtDoUQC3AnDHfwXSxL_0 2024-01-27 10:40:41,205:DEBUG:acme.client:JWS payload: b'' 2024-01-27 10:40:41,210:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186384516: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzV5eGlBMExBUDNkMTM5UUpiUDVtcVRhWFp0RG9VUUMzQW5ESGZ3WFN4TF8wIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzODQ1MTYifQ", "signature": "Plso0jTY4o-rsBaY4n2ycHn2AYaa0oEpFrh9noDArDyIvm5v-z-7y5aDXkKKtW19pfEY7SlWwl0zsKj5ZLemWUZU8SxEH7K8nuvZ9vFwFryX-FzG2Dmd7t9Yg_vIZFHCg2GNd_Oo5_MUFeBdpk2WHRCkDetv7q2XX4id2nxRugRBOXAhPhroh3hFykjebcn98q0tUZYvPZvE2i2PUauEMfM1RsjMbINtXK912iwpI6fvMkjmJuLmJj7V79LRCKyd0oc8LVqerqfdNMsaHbCor5W0Na-vufg4Xj2wVoTSvPKVnKBUsRNrp1hHjbhC5oHOnswi_LuWu8NW2Hd32J6buQ", "payload": "" } 2024-01-27 10:40:41,361:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186384516 HTTP/1.1" 200 809 2024-01-27 10:40:41,362:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:40:38 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: R3i4Vkc5YyqvHW4-sru6tDy1uXTusOgKdR971o5-c06wVvXh3sE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:16Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/iy166A", "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/FJ3duA", "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/0qWA8w", "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY" } ] } 2024-01-27 10:40:41,362:DEBUG:acme.client:Storing nonce: R3i4Vkc5YyqvHW4-sru6tDy1uXTusOgKdR971o5-c06wVvXh3sE 2024-01-27 10:40:41,363:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-27 10:40:41,363:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-01-27 10:40:41,364:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-27 10:40:41,364:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-27 10:40:41,365:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 10:40:41,365:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-27 10:40:41,365:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-27 10:40:41,366:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-27 10:40:41,367:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 10:40:41,414:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-27 10:40:41,596:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-27 10:40:41,597:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-27 10:40:41,598:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-27 10:40:41,602:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:50 UTC. 2024-01-27 10:40:41,603:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 10:40:41,603:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-27 10:40:41,608:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04F63050> Prep: True 2024-01-27 10:40:41,608:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04F63050> and installer None 2024-01-27 10:40:41,608:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-27 10:40:41,612:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-01-27 10:40:41,613:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-27 10:40:41,615:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-27 10:40:42,060:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-27 10:40:42,061:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:40:39 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Mf3ZI0KA-JI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-27 10:40:42,061:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-27 10:40:46,355:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7148_key-certbot.pem 2024-01-27 10:40:49,916:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7146_csr-certbot.pem 2024-01-27 10:40:49,916:DEBUG:acme.client:Requesting fresh nonce 2024-01-27 10:40:49,916:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-27 10:40:50,065:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-27 10:40:50,066:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:40:47 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: R3i4Vkc5h1hoAOc02cHRn97FnUpTxfbKcAT0v2e4nRJQBPNoA5s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-27 10:40:50,066:DEBUG:acme.client:Storing nonce: R3i4Vkc5h1hoAOc02cHRn97FnUpTxfbKcAT0v2e4nRJQBPNoA5s 2024-01-27 10:40:50,066:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-01-27 10:40:50,072:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVoMWhvQU9jMDJjSFJuOTdGblVwVHhmYktjQVQwdjJlNG5SSlFCUE5vQTVzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "yL-uiVRNetRuwp_hfwDzAUkuXSj3LfpR6-ntV9YoOSJBTahHLHBsrwfaPYtZrtkye9zC1ivx0Ij-HAlhBpiFmbp_NGOD5YF-eduTQ8QCy59BlfTN-mNRq5xpeKvKF-NdTdpGRE6zEuYZURZsfyJ-DGgNVI57jDM3CrUEC9dal48zSdm4823WJq9_eBp7Y7_MxgCzcJSvh1_JxKV221Jl-7kjWZ1TvJ_dTuD2Z9jLAL6ge6wm4zuSCci1gj_aN3Cla9w4poHI4ICMEYNF2M7JFy5itVdTpkiyaU0BUWPomoE44MS1ZpBHm8o2iXnBA7_arbV5EYv8Y9Wz4JrZVfCuzQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-01-27 10:40:50,241:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-01-27 10:40:50,242:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 27 Jan 2024 09:40:47 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463267436 Replay-Nonce: R3i4Vkc51ejy1g9guNUBrWJv4g5T1GKy31ydUt8KwUDc9WoN-XY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:25Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186423616" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463267436" } 2024-01-27 10:40:50,242:DEBUG:acme.client:Storing nonce: R3i4Vkc51ejy1g9guNUBrWJv4g5T1GKy31ydUt8KwUDc9WoN-XY 2024-01-27 10:40:50,242:DEBUG:acme.client:JWS payload: b'' 2024-01-27 10:40:50,247:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186423616: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzUxZWp5MWc5Z3VOVUJyV0p2NGc1VDFHS3kzMXlkVXQ4S3dVRGM5V29OLVhZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY0MjM2MTYifQ", "signature": "PqO3XXlY6x-HPB0D6OwaiZElgbHo2SQpzvpZC077pnJdYrQbb72q7rIbVUmM1H1M3NMjxOiEadJEo_9Sdkd_4Aoad6808sPj4lMWTm3dmkKx7584teoRuD9wQrh0C4AWeSds99JpamGoz70uBhpHCz1kPYyyz2Zif_tNDSF8FjIEG8GryOT3YPe7kNLEHNTn67iAM_PphxFiAdVs39ro1odae93mthpX_8DuZXxqsxYko-3DeEOYw6gpOxnySD4fl7S4oqM0xrqbv8zdI3Y2A0z1A-NiSmuQ4uqtBV9Xwl1sDUxR8Vya7icKi-pfFNepT4oEM0PRKRbYPBYwWnAvdw", "payload": "" } 2024-01-27 10:40:50,410:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186423616 HTTP/1.1" 200 806 2024-01-27 10:40:50,411:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:40:47 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: R3i4Vkc5dk8y8gIMx9HAA8epcvXmtTXWsqpW19M4f_3uVCyLkCE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:25Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/sGt3LQ", "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/-siQUw", "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/rUgQOA", "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg" } ] } 2024-01-27 10:40:50,411:DEBUG:acme.client:Storing nonce: R3i4Vkc5dk8y8gIMx9HAA8epcvXmtTXWsqpW19M4f_3uVCyLkCE 2024-01-27 10:40:50,412:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-27 10:40:50,412:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-01-27 10:40:50,413:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-27 10:40:50,413:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-27 10:40:50,414:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 10:40:50,414:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-27 10:40:50,414:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-27 10:40:50,415:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-27 10:40:50,416:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 10:40:50,466:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-01-27 10:40:50,466:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 10:40:50,466:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-01-27 10:40:50,473:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-01-27 10:40:50,476:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-01-27 10:40:50,476:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-01-27 10:40:50,476:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-01-27 10:40:50,477:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-01-27 10:40:50,479:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-01-27 10:40:50,519:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-27 10:40:50,765:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-27 10:40:50,766:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-27 10:40:50,767:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-27 10:40:50,773:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:07 UTC. 2024-01-27 10:40:50,773:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 10:40:50,773:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-27 10:40:50,778:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04F72D30> Prep: True 2024-01-27 10:40:50,779:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04F72D30> and installer None 2024-01-27 10:40:50,779:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-27 10:40:50,783:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-01-27 10:40:50,784:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-27 10:40:50,786:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-27 10:40:51,224:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-27 10:40:51,224:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:40:48 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "FyiHk_nxDyk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-27 10:40:51,224:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-27 10:40:55,001:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7149_key-certbot.pem 2024-01-27 10:40:58,540:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7147_csr-certbot.pem 2024-01-27 10:40:58,540:DEBUG:acme.client:Requesting fresh nonce 2024-01-27 10:40:58,540:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-27 10:40:58,689:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-27 10:40:58,690:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:40:56 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: R3i4Vkc5f01RcjqOkqjF61lFd_ocrS_tP_Y63aHW0zeCWdaFWDw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-27 10:40:58,690:DEBUG:acme.client:Storing nonce: R3i4Vkc5f01RcjqOkqjF61lFd_ocrS_tP_Y63aHW0zeCWdaFWDw 2024-01-27 10:40:58,691:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-01-27 10:40:58,698:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVmMDFSY2pxT2txakY2MWxGZF9vY3JTX3RQX1k2M2FIVzB6ZUNXZGFGV0R3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "vhCO1QIh9JQuOb2_9nnQD7iXTp7UqgT7KGiybt8Ez2KFyG_qJSdLEROj4bF04k3KgHIVqGDdK6V0NEwFDylxteAtNxInYBXjZQtMhSK1DjYxRNXIDwtsc7UZhouaUjuGejXJ5enjYMU4iN3V95g1ixQy-E-G7eNNxCtOpSjnUS1YgUwKr0UlF-aSZHjOHOIswbImgWBBqjFUhUS8D47ULO01qpU5FzYyfRwonYgxYjFn0YYpv6hpCYR_HqqvF0LiPEdqB5DKnOt6xLEW1v58AuxBWZEe7_VOZ1VZQ3GtB1PJvsME5S4YJmyTZAKPADPXPzuCUa9jL6T4tRtjy4bHvQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-01-27 10:40:58,859:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-01-27 10:40:58,859:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 27 Jan 2024 09:40:56 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463293726 Replay-Nonce: VKfU247YGJcZJ3wARyf_Y_dAbycvIKRLx6AsoEMEgO-X0R6BHAc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:34Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186467546" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463293726" } 2024-01-27 10:40:58,860:DEBUG:acme.client:Storing nonce: VKfU247YGJcZJ3wARyf_Y_dAbycvIKRLx6AsoEMEgO-X0R6BHAc 2024-01-27 10:40:58,860:DEBUG:acme.client:JWS payload: b'' 2024-01-27 10:40:58,868:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186467546: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lHSmNaSjN3QVJ5Zl9ZX2RBYnljdklLUkx4NkFzb0VNRWdPLVgwUjZCSEFjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY0Njc1NDYifQ", "signature": "Ippc6-Wvj5gv7so0LjbWNEmEgRQNUn4Luc_32Rc2dJW71AaTUgZnVZVQcF304sm2m_NAj6WVqfECdABZL7rdWxiyHeX5WrBXGHTOFZL-Y5SR4QIiAyxeKiOnZEVwQpnU9Jyz9p46rwJNhRuQQFXtlH51yf6SesXC45iPkfFzKZ_r6U7EJDf6AfR7ZfHYKrl0QCz4d7x7P_MPqI5Oa9rE1GRYKiM2Yw0dPbH310sF5eDmXEB7nc7amemtHCChJxZzVXNwMgtaSgqdkplR1ntiX-QdQ-oNKKpze6vCPC1PbWe56rYxV94CUneTBCtoUZxgd_03zbglZYVBYNniEM7QBA", "payload": "" } 2024-01-27 10:40:59,025:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186467546 HTTP/1.1" 200 811 2024-01-27 10:40:59,026:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:40:56 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: VKfU247YN9UgdNl9_OIc8bOb-hpYyfplR6cIqWYau1L6MUi9lC4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:34Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/n-ZWjw", "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/NYrS2A", "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/g51OFg", "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU" } ] } 2024-01-27 10:40:59,026:DEBUG:acme.client:Storing nonce: VKfU247YN9UgdNl9_OIc8bOb-hpYyfplR6cIqWYau1L6MUi9lC4 2024-01-27 10:40:59,028:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-27 10:40:59,028:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-01-27 10:40:59,029:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-27 10:40:59,029:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-27 10:40:59,031:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 10:40:59,031:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-27 10:40:59,031:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-27 10:40:59,032:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-27 10:40:59,033:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 10:40:59,082:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-27 10:40:59,299:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-27 10:40:59,301:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-27 10:40:59,301:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-27 10:40:59,306:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:31 UTC. 2024-01-27 10:40:59,306:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 10:40:59,306:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-27 10:40:59,312:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0526FF90> Prep: True 2024-01-27 10:40:59,313:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0526FF90> and installer None 2024-01-27 10:40:59,313:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-27 10:40:59,317:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-01-27 10:40:59,318:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-27 10:40:59,320:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-27 10:40:59,851:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-27 10:40:59,852:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:40:57 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "rQ4LXmlbyb0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-27 10:40:59,853:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-27 10:41:04,529:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7150_key-certbot.pem 2024-01-27 10:41:08,099:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7148_csr-certbot.pem 2024-01-27 10:41:08,100:DEBUG:acme.client:Requesting fresh nonce 2024-01-27 10:41:08,100:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-27 10:41:08,278:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-27 10:41:08,279:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:41:05 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: Wkq6jgLCdo0d6P0NFc9_DsBmDIVEZVf319C2f1ni3dIhxyhNHyU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-27 10:41:08,279:DEBUG:acme.client:Storing nonce: Wkq6jgLCdo0d6P0NFc9_DsBmDIVEZVf319C2f1ni3dIhxyhNHyU 2024-01-27 10:41:08,279:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-01-27 10:41:08,287:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENkbzBkNlAwTkZjOV9Ec0JtRElWRVpWZjMxOUMyZjFuaTNkSWh4eWhOSHlVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Hv1agUsktDl89ZxlR78p0GpnyTmlEfjB-ysME-3XXVF220slob5NXXmH1lWuqumjuQx8xfap_fr4XBqJm4-BL4QkKqz7q9IXinsytrkTAVz149jiPiehLU1jYsJsuCjnOy208wd86_5JpgXwd1ulSU9vZt4qqheAjSR7B6Sx58rE5eh3z1kK3eJK4fcP3SZykAkA-scHLe1ce340IbYBKOFOo9vbikB3MRI8gWr9S2IgohM1eNf7V9deiy49MxghACG8JBw9URoZeN5VDACNzPRlAetBseBCqbCOp53q85pI6PzN8PUZJ_U91SJi8Nyd66nBDQyLj9XwqvAUHltpGw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-01-27 10:41:08,489:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-01-27 10:41:08,490:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 27 Jan 2024 09:41:05 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463315236 Replay-Nonce: Wkq6jgLCtIo0DdiOlHeIkRFrnUZyL2lEeyKkQz9ruthCyJxPxMw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:43Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186500336" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463315236" } 2024-01-27 10:41:08,490:DEBUG:acme.client:Storing nonce: Wkq6jgLCtIo0DdiOlHeIkRFrnUZyL2lEeyKkQz9ruthCyJxPxMw 2024-01-27 10:41:08,491:DEBUG:acme.client:JWS payload: b'' 2024-01-27 10:41:08,499:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186500336: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTEN0SW8wRGRpT2xIZUlrUkZyblVaeUwybEVleUtrUXo5cnV0aEN5SnhQeE13IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1MDAzMzYifQ", "signature": "qP-C2jGLkjNzL-gUMFUvodwFtP7c_142Aycc3l6sdhMdeIjBDrjxN3Mg6NVAudOUP9rvvZZCvTLBjDhF-ZojgzxLRbwxsLxamiqMiGPX6LzQXTfdgXuNZE19tgvxRIGNpMcDRaBcpSltLNWKKPCanYeZ7l1O42ZU82HpMQwOCOGv5UH8Ia6ZLT8TPjLKkJ-_PPvPHAqfZnuQA39SGv9QdtZeJpEFh6ZJzEor8e4Do9nfzxaH7gQy_lzFoS2JmBEf8MtfkwxWO6fdfpMt_N03Vtg4AbWjoXeg1b26DXR-ah_GlGc4pfPvavnOxX7mmPNud39VeYuYx6gl2-bIezvfVw", "payload": "" } 2024-01-27 10:41:08,680:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186500336 HTTP/1.1" 200 810 2024-01-27 10:41:08,681:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:41:06 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: Wkq6jgLCLHb8cDmHi8Oqyg2HjcBCKv8WLPY_di0lp3Frac2lxm0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:43Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/MLFeSA", "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/NegWfw", "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/0vtuKQ", "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0" } ] } 2024-01-27 10:41:08,681:DEBUG:acme.client:Storing nonce: Wkq6jgLCLHb8cDmHi8Oqyg2HjcBCKv8WLPY_di0lp3Frac2lxm0 2024-01-27 10:41:08,683:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-27 10:41:08,683:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-01-27 10:41:08,684:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-27 10:41:08,684:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-27 10:41:08,685:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 10:41:08,685:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-27 10:41:08,685:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-27 10:41:08,685:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-27 10:41:08,687:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 10:41:08,735:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-27 10:41:08,973:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-27 10:41:08,974:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-01-27 10:41:08,975:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-01-27 10:41:08,979:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:09 UTC. 2024-01-27 10:41:08,979:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 10:41:08,980:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-27 10:41:08,983:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05264F70> Prep: True 2024-01-27 10:41:08,984:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05264F70> and installer None 2024-01-27 10:41:08,984:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-27 10:41:08,988:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-01-27 10:41:08,989:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-27 10:41:08,991:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-27 10:41:09,537:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-27 10:41:09,537:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:41:06 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "A9PZSA63C7A": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-27 10:41:09,538:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-27 10:41:13,542:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7151_key-certbot.pem 2024-01-27 10:41:17,101:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7149_csr-certbot.pem 2024-01-27 10:41:17,102:DEBUG:acme.client:Requesting fresh nonce 2024-01-27 10:41:17,102:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-27 10:41:17,284:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-27 10:41:17,285:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:41:14 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: fBfjtdZFP-3-ZvQT_paKAx2RBK5C_ZJvhkDBz6ei1P8L891xt5M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-27 10:41:17,285:DEBUG:acme.client:Storing nonce: fBfjtdZFP-3-ZvQT_paKAx2RBK5C_ZJvhkDBz6ei1P8L891xt5M 2024-01-27 10:41:17,286:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-01-27 10:41:17,295:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZQLTMtWnZRVF9wYUtBeDJSQks1Q19aSnZoa0RCejZlaTFQOEw4OTF4dDVNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "fs7Gg1zN1fWPYy9Av-pXAAhJNhqlh-6cAHq98ne20t6sGoTgxai3yCtEhiAT-4p1JAddlxEZN6QgZ8oAHbIF8JR25I7UOJNZ45FWfAkXCYnvESQO2OhiduXnPzxepRQ-mm4oCfFg4xJcz5Ni_90wf39-hUyEFgwy06nQnRhoeuvOO5CueIcYSCpGv1Ax2udHHpRJTX1vEChTdUoDsAgnRWmVesK9jvIqR2SXvRzgjRh4mDNxZvkdQYAisASv-b7YL8DQ40Bzm5Wxz9V1uW-DNoS3JgS0iQoU0pys80I3TRLkO_cpCw_6ly_PBpNGCvOZjeLUWzRs0c_WlRE17hWQ3w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-01-27 10:41:17,498:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-01-27 10:41:17,499:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 27 Jan 2024 09:41:14 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463336576 Replay-Nonce: Wkq6jgLCyWo_3DlJNvob8DKlg44UoCmVowyPuWoX7h-gwvg6Sys X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:52Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186530456" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463336576" } 2024-01-27 10:41:17,499:DEBUG:acme.client:Storing nonce: Wkq6jgLCyWo_3DlJNvob8DKlg44UoCmVowyPuWoX7h-gwvg6Sys 2024-01-27 10:41:17,500:DEBUG:acme.client:JWS payload: b'' 2024-01-27 10:41:17,507:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186530456: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTEN5V29fM0RsSk52b2I4REtsZzQ0VW9DbVZvd3lQdVdvWDdoLWd3dmc2U3lzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1MzA0NTYifQ", "signature": "feeLA3ji5z29tQFddn6O58oHZZxlrkECEg2YApccjAvMJqV8_ytRZ0J7aHysHSo9EF2ol6r6Uhw-UYQTHRHk1der_alDRpXb8f4Y1EfbHng_kXCnYvDKGrJdbFg9EHfQwAOJ3dFDIM3gGWN9BCny-ddnyx89CqmlbVHkFV3utg9gOBNN85t6Zv_pUhhZjobn7a_nmxYCc7E1JJBgFu1xmh-pXmZOPPUVXTQJWXEBbRMeKuIdmS7RhV6e0lwCre0s9Ps3fIaiOU21h7I7VWExjBwShm84MOh45roLpmSP8B9iuz4vjIYTC9PDmSbN7GkouKxJCngPG_cQtcuZWhCirQ", "payload": "" } 2024-01-27 10:41:17,692:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186530456 HTTP/1.1" 200 809 2024-01-27 10:41:17,693:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:41:15 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: Wkq6jgLCGBwJMZyzzx4Epmm7KZ05dKbrB3dY-fkaZhG5-7Cu3as X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:52Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/ibbbOA", "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/W42erg", "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/xDGKCQ", "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI" } ] } 2024-01-27 10:41:17,693:DEBUG:acme.client:Storing nonce: Wkq6jgLCGBwJMZyzzx4Epmm7KZ05dKbrB3dY-fkaZhG5-7Cu3as 2024-01-27 10:41:17,694:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-27 10:41:17,694:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-01-27 10:41:17,695:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-27 10:41:17,695:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-27 10:41:17,695:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 10:41:17,696:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-27 10:41:17,696:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-27 10:41:17,696:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-27 10:41:17,697:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 10:41:17,748:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-27 10:41:17,970:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-27 10:41:17,972:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is signed by the certificate's issuer. 2024-01-27 10:41:17,972:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD 2024-01-27 10:41:17,977:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:26 UTC. 2024-01-27 10:41:17,977:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 10:41:17,977:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-27 10:41:17,985:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04F63370> Prep: True 2024-01-27 10:41:17,985:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04F63370> and installer None 2024-01-27 10:41:17,985:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-27 10:41:17,990:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-01-27 10:41:17,990:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-27 10:41:17,992:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-27 10:41:18,440:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-27 10:41:18,441:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:41:15 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "PcUNWYfvv0k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-27 10:41:18,441:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-27 10:41:22,051:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7152_key-certbot.pem 2024-01-27 10:41:25,589:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7150_csr-certbot.pem 2024-01-27 10:41:25,589:DEBUG:acme.client:Requesting fresh nonce 2024-01-27 10:41:25,589:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-27 10:41:25,749:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-27 10:41:25,750:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:41:23 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: VKfU247Y4NVVTYhtTgNMj31pIdhHimoiDbACV5Oq4OlY7ux6UBU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-27 10:41:25,750:DEBUG:acme.client:Storing nonce: VKfU247Y4NVVTYhtTgNMj31pIdhHimoiDbACV5Oq4OlY7ux6UBU 2024-01-27 10:41:25,750:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-01-27 10:41:25,756:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1k0TlZWVFlodFRnTk1qMzFwSWRoSGltb2lEYkFDVjVPcTRPbFk3dXg2VUJVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "YACKzIysOI29AUTgITdTVTIbD_Z1dyjrZa2Ul2RcB7EbzoDA9g9htzb8eUeGhFGaiGf2nOgCSqbW0fIU5nkomPN8YBeZBoQY49HWrc2kTkOStvVxw-W-lpbG07EyziD2AXW0ZFAc2Nn3JIcJbd-HdU3ge9cXFiCuIbeus_htnPeAk3E2O4hYZCkHfqGvauohrFHGGN-q0aq-dkA-2fKVBgazN3FGtnRbdXOTv_di6V7frnKoQT6ZoSw8h1nPn2QrdyBT-qwZBfsBdRZoUbUPPSWEF4YQeQVLswkCQAHWHm9zHcg-_NYJjydY-5OrsAp2JmcdKOMb_0C7Ex4YVgoo4Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-01-27 10:41:25,931:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-01-27 10:41:25,932:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 27 Jan 2024 09:41:23 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463357966 Replay-Nonce: VKfU247YDLIZCW88_bFu2KYfKZiqmGaQ18J7iB3wOSEUL9NlzkI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:47:01Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186562236" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463357966" } 2024-01-27 10:41:25,932:DEBUG:acme.client:Storing nonce: VKfU247YDLIZCW88_bFu2KYfKZiqmGaQ18J7iB3wOSEUL9NlzkI 2024-01-27 10:41:25,933:DEBUG:acme.client:JWS payload: b'' 2024-01-27 10:41:25,938:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186562236: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lETElaQ1c4OF9iRnUyS1lmS1ppcW1HYVExOEo3aUIzd09TRVVMOU5semtJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1NjIyMzYifQ", "signature": "mZCN4xfGQ8ppyN4rpSVUtBoceS2RPH0ceIQM8bCg8VlJkk6xUHJl9STmCMEvpc8-IWCJf4SJm8OdThhy7A7NRtQLP_XimLKmwIupy6kD23n8YTave5pqNrJCMqtl7OutL0yoxYml1Sx7fvBDwqZvE60veuCrTCF6Kwy3UVUlk2bhOSaQm0-Ar8dGGdS7ngLJDwwA8YsJ242Qsa3usSTC1EDBDMVhUMJ51u8QnwbzN2vlnF-1c7AC-U5-PObKio0xwbJ9Gv5SGs9WjsLCeVAkHDhfNLnuTyZ1rOY25TaNB1GQzfw2h97xwKyAUybGBYQ1B4Ce3ssoGZuSOjO6up6CwA", "payload": "" } 2024-01-27 10:41:26,105:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186562236 HTTP/1.1" 200 805 2024-01-27 10:41:26,105:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:41:23 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: R3i4Vkc5c3omK3WOWmta88Og6bM5BNVn-Ecpb34b6z_zUh6R04g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:47:01Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/d2C2Aw", "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/yk_m2Q", "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/2CxhFQ", "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE" } ] } 2024-01-27 10:41:26,106:DEBUG:acme.client:Storing nonce: R3i4Vkc5c3omK3WOWmta88Og6bM5BNVn-Ecpb34b6z_zUh6R04g 2024-01-27 10:41:26,106:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-27 10:41:26,107:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-01-27 10:41:26,107:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-27 10:41:26,107:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-27 10:41:26,108:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 10:41:26,109:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-27 10:41:26,109:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-27 10:41:26,109:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-27 10:41:26,110:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 10:41:26,160:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-27 10:41:26,368:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-27 10:41:26,369:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-27 10:41:26,370:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-27 10:41:26,374:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:43 UTC. 2024-01-27 10:41:26,374:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 10:41:26,374:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-27 10:41:26,378:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x00D47490> Prep: True 2024-01-27 10:41:26,378:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x00D47490> and installer None 2024-01-27 10:41:26,378:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-27 10:41:26,382:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-01-27 10:41:26,383:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-27 10:41:26,385:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-27 10:41:26,921:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-27 10:41:26,922:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:41:24 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "qtnj7HRIcgY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-27 10:41:26,923:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-27 10:41:30,603:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7153_key-certbot.pem 2024-01-27 10:41:34,165:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7151_csr-certbot.pem 2024-01-27 10:41:34,165:DEBUG:acme.client:Requesting fresh nonce 2024-01-27 10:41:34,165:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-27 10:41:34,343:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-27 10:41:34,343:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:41:31 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: Wkq6jgLCGfa2030k1FwZOV7mhdhx6Dm1YQ1EAN_60AO8N24qtJI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-27 10:41:34,344:DEBUG:acme.client:Storing nonce: Wkq6jgLCGfa2030k1FwZOV7mhdhx6Dm1YQ1EAN_60AO8N24qtJI 2024-01-27 10:41:34,344:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-01-27 10:41:34,351:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENHZmEyMDMwazFGd1pPVjdtaGRoeDZEbTFZUTFFQU5fNjBBTzhOMjRxdEpJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "D3x8PUMvTT24NVg3J_L5uxunwf0L8g8XZ-9N9WBXjVUDJGpc6mrjBZl4IWQ2QaSqFjiYg-HNdaATM7-kbKbNt5ei_uCC9FKGWjUNOwUakqWBmgj-UMdqEkHtchnRc5im2yz1FYWd91Fr0BO4dNIoaMf8c41QBIHaEPiRTfsQ_KNfSElqh0jxEzYg69zO83wvK-0n3ozRkgBIbZTVmJqJcq6z7rEZIB4Oui7QSnl38Iw0Rn_A6tkxwtd9k-yfGIJJWdKmIafqViPMT-pABMffW6Fp6bn9yU65gEVMbzvfnvjM9qV5wFaWz7ZOpYkHZrtVOV-efsI4tv0G2fOYyp4AVg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-01-27 10:41:34,546:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-01-27 10:41:34,547:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 27 Jan 2024 09:41:31 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463390816 Replay-Nonce: fBfjtdZFnv_HjugFO_M2zszoG9uk3iZHbtryLlcqxyaUfEh4HlU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:47:11Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186609606" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463390816" } 2024-01-27 10:41:34,547:DEBUG:acme.client:Storing nonce: fBfjtdZFnv_HjugFO_M2zszoG9uk3iZHbtryLlcqxyaUfEh4HlU 2024-01-27 10:41:34,547:DEBUG:acme.client:JWS payload: b'' 2024-01-27 10:41:34,552:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186609606: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZudl9IanVnRk9fTTJ6c3pvRzl1azNpWkhidHJ5TGxjcXh5YVVmRWg0SGxVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY2MDk2MDYifQ", "signature": "ptz4QRlVlGCRiyc7cBShSmxYhmc5PeXtne-TQCuIeUjhyPQ-mgxhFArk6zEVi_bfVIyVT9tSHHre56mv9VfUu7rjx21zkTHIn-NhIfnCvPafyLOTUTH1zAfucK7qCa8Qe2px9F5p8K62oBRSDlCrpMOHZl8htQk_qxJLeMUygX4UIMdiqXUdcGPRyB7PEPGmU5emBxgFsIMg_LwYbxZVm5MeBhsCunEg0T2nTxIpQn4TQFx9PFWfqIV_FlyY5ZO58kpxoo2nERGR0UneurPIdd9hF5qkcbsBeHFMFrPUpmFgK9VY72zSnJC0a0fMtwigkn36zfzLVyqKFzLOId_RqA", "payload": "" } 2024-01-27 10:41:34,734:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186609606 HTTP/1.1" 200 805 2024-01-27 10:41:34,735:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:41:32 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: fBfjtdZFptMp0LUkFZiQDdXMU4-7qOD47pMvYVHtyWGeCSFKgow X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:47:11Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/u86J_A", "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/GMvoKw", "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/skcDcA", "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA" } ] } 2024-01-27 10:41:34,735:DEBUG:acme.client:Storing nonce: fBfjtdZFptMp0LUkFZiQDdXMU4-7qOD47pMvYVHtyWGeCSFKgow 2024-01-27 10:41:34,736:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-27 10:41:34,736:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-01-27 10:41:34,737:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-27 10:41:34,737:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-27 10:41:34,737:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 10:41:34,738:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-27 10:41:34,738:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-27 10:41:34,738:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-27 10:41:34,739:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 10:41:34,788:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-27 10:41:35,024:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-27 10:41:35,024:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-01-27 10:41:35,025:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-01-27 10:41:35,029:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:40:02 UTC. 2024-01-27 10:41:35,029:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-27 10:41:35,030:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-27 10:41:35,034:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x00D475D0> Prep: True 2024-01-27 10:41:35,034:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x00D475D0> and installer None 2024-01-27 10:41:35,035:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-27 10:41:35,039:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-01-27 10:41:35,040:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-27 10:41:35,042:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-27 10:41:35,495:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-27 10:41:35,496:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:41:32 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "RXcQCp6Glew": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-27 10:41:35,497:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-27 10:41:39,213:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7154_key-certbot.pem 2024-01-27 10:41:42,763:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7152_csr-certbot.pem 2024-01-27 10:41:42,764:DEBUG:acme.client:Requesting fresh nonce 2024-01-27 10:41:42,764:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-27 10:41:42,918:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-27 10:41:42,918:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:41:40 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: VKfU247YQFz0dGcQhR8u8lm2PBMXIqpZsPma-CmbPfNNO8h_nhw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-27 10:41:42,919:DEBUG:acme.client:Storing nonce: VKfU247YQFz0dGcQhR8u8lm2PBMXIqpZsPma-CmbPfNNO8h_nhw 2024-01-27 10:41:42,919:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-01-27 10:41:42,926:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lRRnowZEdjUWhSOHU4bG0yUEJNWElxcFpzUG1hLUNtYlBmTk5POGhfbmh3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "wtjyPh5jE9zgYDk2QlRWCi0A_4batVS-KcFWJChF4XiOxShhTpxBUbIH0S7fJLurBPrNrgCHHyssbkv_v1SorqxMHEW17wmovurf8RBgU3DiZXvbzYddAZmV1hXtKHPPISp5DJuGnL9m_80yJy3icA1bYvLqXZoiXmQ2YGmM3kTzuQDxKZMcO-wjX8qvg-mUkogsSIy1Ax2LMJctvDsecf2kl-F933f3Wj6yDBY9a2XD9MChvn-4m068Oy9fX8nB5FFPfvuPvbIhXUtCnZTMXJZgU2kixCn7GZHhv3K3Zo3OLasiE6SwviocmSsTyC_wtNaE17WbzI09ByBdRxrvMA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-01-27 10:41:43,096:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-01-27 10:41:43,096:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 27 Jan 2024 09:41:40 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463415626 Replay-Nonce: R3i4Vkc5TFTYd0IGFgjQzKxr0GmwaYD8jYcDdJ6VTr5hh-gO0u4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:47:20Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186648386" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463415626" } 2024-01-27 10:41:43,097:DEBUG:acme.client:Storing nonce: R3i4Vkc5TFTYd0IGFgjQzKxr0GmwaYD8jYcDdJ6VTr5hh-gO0u4 2024-01-27 10:41:43,097:DEBUG:acme.client:JWS payload: b'' 2024-01-27 10:41:43,102:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186648386: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVURlRZZDBJR0ZnalF6S3hyMEdtd2FZRDhqWWNEZEo2VlRyNWhoLWdPMHU0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY2NDgzODYifQ", "signature": "VISCi5sUzOQe_ZeM8VoCg0DIwdGA46MpkkpFsYXDtRDQq7XpoTksgbjVX2wqgC3-iy2svqyBXSpSLujP7QZfVXvecgrqr5ojlUlOm-Z7BhnIALt05Jl9gpwM71UNMM_sBnyB2jms3YqymTPAg2RLP5zlPIDo_v-YCG626xnFv-kignI72pzvMUuNLWlchhXwYkrRPjAPcObOdNUv5u7CKy2RWxG0CI1_ZGJr0HGtWON2PFuaTa27y-iAhMNYOGe-2_-_fyFMrEUqu-WsvBsKVswOqMy90feJTGvmJd07VF8GIsO5GZ20s6l1BmJRgI7antyoRA2viEQO3yOFZ82zxQ", "payload": "" } 2024-01-27 10:41:43,258:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186648386 HTTP/1.1" 200 805 2024-01-27 10:41:43,258:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 27 Jan 2024 09:41:40 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: R3i4Vkc5CiY_vL2r3tSAlC1DptWn51AgIgQdbCM0ZElreFw2mr4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:47:20Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/AfqDTw", "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/2qup_g", "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/cLgsJg", "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE" } ] } 2024-01-27 10:41:43,258:DEBUG:acme.client:Storing nonce: R3i4Vkc5CiY_vL2r3tSAlC1DptWn51AgIgQdbCM0ZElreFw2mr4 2024-01-27 10:41:43,258:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-27 10:41:43,259:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-01-27 10:41:43,259:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-27 10:41:43,259:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-27 10:41:43,260:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 10:41:43,260:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-27 10:41:43,260:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-27 10:41:43,261:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-27 10:41:43,262:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-27 10:41:43,262:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-01-27 10:41:43,263:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-01-27 10:41:43,264:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module> sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-01-27 10:41:43,266:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)