2024-01-26 03:45:20,994:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-01-26 03:45:20,995:DEBUG:certbot._internal.main:Arguments: [] 2024-01-26 03:45:20,995:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-01-26 03:45:22,081:DEBUG:certbot._internal.log:Root logging level set at 20 2024-01-26 03:45:22,081:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-01-26 03:45:22,121:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2024-01-26 03:45:22,160:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-26 03:45:22,507:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-26 03:45:22,508:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is signed by the certificate's issuer. 2024-01-26 03:45:22,523:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert8.pem is: OCSPCertStatus.GOOD 2024-01-26 03:45:22,532:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:15 UTC. 2024-01-26 03:45:22,532:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-26 03:45:22,533:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-26 03:45:22,538:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-26 03:45:22,538:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-26 03:45:22,538:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-26 03:45:22,547:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-26 03:45:22,548:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-26 03:45:22,550:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-26 03:45:23,098:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-26 03:45:23,098:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:45:21 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "aBCzpa36fhM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-26 03:45:23,099:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-26 03:45:27,539:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7116_key-certbot.pem 2024-01-26 03:45:31,784:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7114_csr-certbot.pem 2024-01-26 03:45:31,785:DEBUG:acme.client:Requesting fresh nonce 2024-01-26 03:45:31,785:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-26 03:45:31,962:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-26 03:45:31,963:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:45:30 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCbC6xCHJ1x12HVygVQPP0Wl-vRYg0Ve5w_iNmRK6j0ys X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-26 03:45:31,963:DEBUG:acme.client:Storing nonce: Wkq6jgLCbC6xCHJ1x12HVygVQPP0Wl-vRYg0Ve5w_iNmRK6j0ys 2024-01-26 03:45:31,963:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-01-26 03:45:31,969:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENiQzZ4Q0hKMXgxMkhWeWdWUVBQMFdsLXZSWWcwVmU1d19pTm1SSzZqMHlzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "sYLU8JB15sDSDG3XrL2TL7aaUG6c3rpBv1pleriapVqIZ5SGc-cbKYwkZgwI1dEwBIKlr1lEBHuC2AtDE4--0Mqw9o4Ce0eR2C1ElB1Bw1jFS7iNK1pRsGw1bL0ZERRn40AhpUokueZSvE9tdi_Br0FChnbiw-V5nlh24FoTEGeKZ03-UlxtbYNJCk5mSrOJufZYGAfwltSChq4ieRltDXM8blqP-Lsm_wRSXCDwbCw_a7X_n3nwEcUh1zXOMOxLRz7F7o11-nxK80eNYVB_IxwF5iTVqBdjkpCVTTP5CNEI-TSbWKGm-SmJHc2tJGy956lnuEIw_UUKHeEpnsezow", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-01-26 03:45:32,204:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-01-26 03:45:32,205:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Jan 2024 02:45:30 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463125096 Replay-Nonce: Wkq6jgLC0aHJ-iD2FdSFzsZNSre3JxNyP-LfpJ4pl31PifDBqlU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:45:30Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186209716" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463125096" } 2024-01-26 03:45:32,205:DEBUG:acme.client:Storing nonce: Wkq6jgLC0aHJ-iD2FdSFzsZNSre3JxNyP-LfpJ4pl31PifDBqlU 2024-01-26 03:45:32,205:DEBUG:acme.client:JWS payload: b'' 2024-01-26 03:45:32,211:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186209716: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTEMwYUhKLWlEMkZkU0Z6c1pOU3JlM0p4TnlQLUxmcEo0cGwzMVBpZkRCcWxVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyMDk3MTYifQ", "signature": "YjH3yTmPlCBnneS6ehuoX2frwleFzcbhnXIMJd0j9uWcXkp3UHGt4pylyqUmM3daBAovhVfmP-BxaArTKOKG-uAQyOs0HVTxgVEmvh3eK0SY_UIxFlZO_j304ajfJpWY5_dkt8tbF9wKwncVDvX4F0-Y2SiU7g9DP38Vl7f77tK0TaPSJPXfi7FPgnUsg60oUPj84x-9_TnpG5ISdzK0LiSSDaf_HEN1DD1mYPRYjMFM6-NdbhHzzLH65rqCinHgJwn2mrTZv6MpbnyNesYeBPcH-rj7iiyguWZI30wIOMnHQh1Mxs_A9XJUWaalcAb_pzmzWN0ElvfJ0xfQNClS-g", "payload": "" } 2024-01-26 03:45:32,392:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186209716 HTTP/1.1" 200 810 2024-01-26 03:45:32,392:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:45:30 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZFEvM8cgt-oVGPaee6vacV2MLPJcsT2SKCDV-8AkEIelU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:45:30Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/6f0kFQ", "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/TzPnqw", "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186209716/f71chA", "token": "67hYHknnIIqFVJtFSwK-o1dwbhsz1W6YIsB7NpDimjo" } ] } 2024-01-26 03:45:32,393:DEBUG:acme.client:Storing nonce: fBfjtdZFEvM8cgt-oVGPaee6vacV2MLPJcsT2SKCDV-8AkEIelU 2024-01-26 03:45:32,393:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-26 03:45:32,394:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-01-26 03:45:32,394:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-26 03:45:32,394:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-26 03:45:32,409:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-26 03:45:32,409:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-26 03:45:32,409:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-26 03:45:32,410:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-26 03:45:32,417:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-26 03:45:32,457:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-26 03:45:32,672:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-26 03:45:32,673:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-26 03:45:32,674:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-26 03:45:32,679:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:32 UTC. 2024-01-26 03:45:32,679:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-26 03:45:32,679:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-26 03:45:32,684:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-26 03:45:32,684:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-26 03:45:32,684:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-26 03:45:32,698:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-26 03:45:32,699:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-26 03:45:32,701:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-26 03:45:33,231:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-26 03:45:33,231:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:45:31 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "lKqZyRrVhQM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-26 03:45:33,232:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-26 03:45:37,057:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7117_key-certbot.pem 2024-01-26 03:45:40,765:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7115_csr-certbot.pem 2024-01-26 03:45:40,765:DEBUG:acme.client:Requesting fresh nonce 2024-01-26 03:45:40,765:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-26 03:45:40,943:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-26 03:45:40,944:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:45:39 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZF-gru9nQZvmgNrMUOrA8hbVecj0dHgUupYB0t6duChz8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-26 03:45:40,944:DEBUG:acme.client:Storing nonce: fBfjtdZF-gru9nQZvmgNrMUOrA8hbVecj0dHgUupYB0t6duChz8 2024-01-26 03:45:40,944:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-01-26 03:45:40,949:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkYtZ3J1OW5RWnZtZ05yTVVPckE4aGJWZWNqMGRIZ1V1cFlCMHQ2ZHVDaHo4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "TI_pO8AqXWiM-FixuEUKXuRla91e3qqO__GkX2G9V6NwWJoXoPqY7cVV-7oW-LPXh2dTrzuWLj3J9UvMXJOv9O80UuvO7014WTY6bEJingBj8QYwm5g2lBCZKSxU-ZbobdjdMiEFsV_XFxcw1h7A19Ya94GVZT9hY9tZN6PLz1qb9xq1PF8B-Jp4Bx99w2IGQJw1nI_I5vCrbPtpV_XrbdAfTeGUHJc47LbItuyTW3mIBfw2XhciplO1OweClXr1kigoV6FjemHk2fm-tn7a18hlqeJfdErumoePm6Upw9g6YKE59C6WOsEj5nsexWDm3nW9R_uFY_haYPm66rCNhA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-01-26 03:45:41,159:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-01-26 03:45:41,160:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Jan 2024 02:45:39 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463146186 Replay-Nonce: Wkq6jgLCe45kj19p_LDmKnQgyZ9nU7og_4qLTFmzwP44YUmL71g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:45:39Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186240836" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463146186" } 2024-01-26 03:45:41,160:DEBUG:acme.client:Storing nonce: Wkq6jgLCe45kj19p_LDmKnQgyZ9nU7og_4qLTFmzwP44YUmL71g 2024-01-26 03:45:41,161:DEBUG:acme.client:JWS payload: b'' 2024-01-26 03:45:41,168:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186240836: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENlNDVrajE5cF9MRG1LblFneVo5blU3b2dfNHFMVEZtendQNDRZVW1MNzFnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyNDA4MzYifQ", "signature": "DHnuxzzcdfruy6PmEcWi6xpFhpK6JAig0YX72cjPJRuHb_y3gMzxDoFCEsDaUVBYuXyECsQNVeNHT59xLcCzrd_RhJaI9WQ6mMNNfxbFltv9UcDHtTOOaYGQpdv-3xXKenGSC6UUXE7U9OqOM_pi20sDIS0lm4Yuc3ao7Rs_i2ZaGQqmVqCMnBiAXuYTsalM6J4CPtEVxJPGXzm8tNWsd1tIOVWuua0U2soLceOuFAnlaVAKvsMCKD04HrRTm9se0HJOpyx6XLZ0oUEpwIPGgpfQuf2ZpPylIZ4CpLrJ8PyeAkUJUxCvwoOMZVtaviF7ba_ZgEW46JANvBSqzk0veA", "payload": "" } 2024-01-26 03:45:41,350:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186240836 HTTP/1.1" 200 804 2024-01-26 03:45:41,351:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:45:39 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCB6QNV8kwyNN6POMAF77UeFaS3UCwjdYLW3SlTPvvIPA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:45:39Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/g8SMBA", "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/KdDipg", "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186240836/N41DHw", "token": "MolFoSrkHU1o1e7YH2rtM9apCtaT5DI9dclhhfrrx2I" } ] } 2024-01-26 03:45:41,351:DEBUG:acme.client:Storing nonce: Wkq6jgLCB6QNV8kwyNN6POMAF77UeFaS3UCwjdYLW3SlTPvvIPA 2024-01-26 03:45:41,351:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-26 03:45:41,352:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-01-26 03:45:41,352:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-26 03:45:41,353:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-26 03:45:41,353:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-26 03:45:41,353:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-26 03:45:41,354:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-26 03:45:41,354:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-26 03:45:41,355:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-26 03:45:41,405:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-26 03:45:41,626:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-26 03:45:41,627:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-01-26 03:45:41,628:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-01-26 03:45:41,632:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:36:49 UTC. 2024-01-26 03:45:41,632:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-26 03:45:41,632:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-26 03:45:41,636:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-26 03:45:41,636:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-26 03:45:41,637:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-26 03:45:41,641:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-26 03:45:41,642:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-26 03:45:41,644:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-26 03:45:42,090:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-26 03:45:42,091:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:45:40 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "dypQ2wO7N8Y": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-26 03:45:42,091:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-26 03:45:46,260:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7118_key-certbot.pem 2024-01-26 03:45:49,952:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7116_csr-certbot.pem 2024-01-26 03:45:49,953:DEBUG:acme.client:Requesting fresh nonce 2024-01-26 03:45:49,953:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-26 03:45:50,115:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-26 03:45:50,115:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:45:48 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YJxwI4_8wfeafgXSTcgYUTmNT0BzR5TRwXJzQ-WvbLmM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-26 03:45:50,115:DEBUG:acme.client:Storing nonce: VKfU247YJxwI4_8wfeafgXSTcgYUTmNT0BzR5TRwXJzQ-WvbLmM 2024-01-26 03:45:50,116:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-01-26 03:45:50,121:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lKeHdJNF84d2ZlYWZnWFNUY2dZVVRtTlQwQnpSNVRSd1hKelEtV3ZiTG1NIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "tiIVXqHyx1dAmg3T2YkiwaEJ6PNkPd7Iq63H2h_hniLMcDK62DKWAUlxA3kfBHj5KL6SRAFHiEawk0qxfYsE6epXsGP3UPv4d3688BAVi5-Xfte9nafQ0c-iQk13esJzY_8P8MCYF1tKTaGhBqISnOp4E2uFaokjzdKrhtkiJNq9SROKg7aN1Y1_Csdpf_FMhvdFqVsLVm1jbpCkRzZbJkXdA-odD1NXyLlNcP8BC5i5G_jdl10rmioncFNB4Pvt-Aj0R9q1G0Wq6B7uwmG6veiarBPB9gZtK3voKKEkPPnsSQyZfxFJcI3gI8H3Y60v1680C2-BaBDvnuCieo7yrA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-01-26 03:45:50,437:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-01-26 03:45:50,437:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Jan 2024 02:45:48 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463167526 Replay-Nonce: VKfU247Y3atZxIpRubLnwmDm3zH_lk_tEwEcz3M-j838X8xa4Os X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:45:48Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186273596" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463167526" } 2024-01-26 03:45:50,437:DEBUG:acme.client:Storing nonce: VKfU247Y3atZxIpRubLnwmDm3zH_lk_tEwEcz3M-j838X8xa4Os 2024-01-26 03:45:50,438:DEBUG:acme.client:JWS payload: b'' 2024-01-26 03:45:50,443:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186273596: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1kzYXRaeElwUnViTG53bURtM3pIX2xrX3RFd0VjejNNLWo4MzhYOHhhNE9zIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYyNzM1OTYifQ", "signature": "dJneRS_ZMa6Fvchh5bHYN_a16TAwUbCqqO1aiQ_P2X8ZzMfnepSS8BfjteiGTJtAZh4JAt3DIeYGIkwyySc79LzRqSIfbQ-XdZztJmNgr9kgCOwiTVN7I-qibn39Kh5sl7ZsBjsTDO0PqJQXXmwG0jVTN2VJne22sGF6PMfYTLsNfl_UGCKcUqUOgxC5aa6SjYIG5X7vPcx_dKAaOY6mIb_Lwloj6cGhqjdENm7IvIQlYyQpgqVtGw75jV2Wx5BevOhrwYtYd9tKDmlOiCErij_ohOit-Q8FmMRGEPLGycZDqPCGPdLtar7cIdhDGK74vz-cjMr-oS2rGpAWUjnNgw", "payload": "" } 2024-01-26 03:45:50,600:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186273596 HTTP/1.1" 200 807 2024-01-26 03:45:50,601:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:45:49 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247Y2UYvPJQzDa2GJoGUB0G3WXgeBTy6WYCHxU4n196_ogk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:45:48Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/KNqRXQ", "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/KMda1w", "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186273596/f-1bag", "token": "nnkP_zmwdDEE6dyPHx-FYOSj7moxzu1Q6GsfzzTWNOE" } ] } 2024-01-26 03:45:50,601:DEBUG:acme.client:Storing nonce: VKfU247Y2UYvPJQzDa2GJoGUB0G3WXgeBTy6WYCHxU4n196_ogk 2024-01-26 03:45:50,602:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-26 03:45:50,602:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-01-26 03:45:50,602:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-26 03:45:50,602:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-26 03:45:50,603:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-26 03:45:50,603:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-26 03:45:50,603:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-26 03:45:50,604:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-26 03:45:50,605:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-26 03:45:50,655:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-26 03:45:50,867:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-26 03:45:50,868:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-26 03:45:50,868:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-26 03:45:50,873:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:03 UTC. 2024-01-26 03:45:50,873:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-26 03:45:50,874:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-26 03:45:50,879:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-26 03:45:50,879:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-26 03:45:50,879:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-26 03:45:50,894:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-26 03:45:50,895:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-26 03:45:50,896:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-26 03:45:51,343:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-26 03:45:51,344:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:45:49 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "FnNkdJY17qs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-26 03:45:51,344:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-26 03:45:55,431:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7119_key-certbot.pem 2024-01-26 03:45:59,145:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7117_csr-certbot.pem 2024-01-26 03:45:59,146:DEBUG:acme.client:Requesting fresh nonce 2024-01-26 03:45:59,146:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-26 03:45:59,297:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-26 03:45:59,297:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:45:57 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YilgwBGkQ2pbahiEmXNrPodaBuilo3cqqqfe91mqbJu4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-26 03:45:59,297:DEBUG:acme.client:Storing nonce: VKfU247YilgwBGkQ2pbahiEmXNrPodaBuilo3cqqqfe91mqbJu4 2024-01-26 03:45:59,298:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-01-26 03:45:59,302:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lpbGd3QkdrUTJwYmFoaUVtWE5yUG9kYUJ1aWxvM2NxcXFmZTkxbXFiSnU0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "u8RvikeVeVEcG96VEg88929cyFfxVMap3Wo6HdiM0fFgGGbXDasfl_wQjhtSoZayJYr6m76BZLg2rhuFiqF69X49hik7hI_Y4ZuUVdlkmehrUueD_OJTYgS9kyukgBhjZPWnmtf4OzWfUmKsVud-0hX95gg3rukPF9pt6Q0u0RiRErVLNs_y0FWHzy1SsnLEJ_zeI6oPt3tHA0D0SIu1KAaVq2KJ1rH4m9C1rfGob9P2sfV6SwONyMQfTOZ7vWAOOd3s3KluNgavR_mtpymeIME-ZAbYjwTu8Qr1Z_7uiZFzxEPHyQy1tLPTBQEc7lGJQbZY9bbj2ugWxA23RP59uw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-01-26 03:45:59,628:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-01-26 03:45:59,628:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Jan 2024 02:45:58 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463187546 Replay-Nonce: R3i4Vkc50HRHdEvt58lD7yLl-uU0V_EIU8vypKyGTTX-oQwj2G8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:45:58Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186305236" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463187546" } 2024-01-26 03:45:59,628:DEBUG:acme.client:Storing nonce: R3i4Vkc50HRHdEvt58lD7yLl-uU0V_EIU8vypKyGTTX-oQwj2G8 2024-01-26 03:45:59,629:DEBUG:acme.client:JWS payload: b'' 2024-01-26 03:45:59,634:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186305236: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzUwSFJIZEV2dDU4bEQ3eUxsLXVVMFZfRUlVOHZ5cEt5R1RUWC1vUXdqMkc4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzMDUyMzYifQ", "signature": "aZ1SnCWbp4VoKTa4GEKeEg4b6pIgZvPF3oMWVt1QeOSrCnKyT_hRBY28ntswfWVyH1nSgdqWTMooLxmW3v8strTQiXBNaV7c73bbtcLSdxZh_pF3YVj7puKi-DPiPapgk0UTb6oOTlFH-BdzHSb2FHC2bIqDYtNXNBO57CtBcA5wFrFHH3jRnfB3N1QDw3FbdPjKk0F2jH1fksdvk-07JKI5GmP_mg7yiwoe-3HL7C8SrgCD9fDqB_IlBvXqwvwli3BFVQccswTZmL4b7VBXiUXF1Aym8oxz3U20Rof74ofO3e3Bd_BWH9wMw6ydvJz2UE3zOFCJecQeY_L4LCQL3w", "payload": "" } 2024-01-26 03:45:59,786:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186305236 HTTP/1.1" 200 801 2024-01-26 03:45:59,786:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:45:58 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc5VIpXhI-JVSdS7kHbH8TiAro_6ly4VNL3nNeutdMykOE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:45:58Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/H-2NUg", "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/SPl0kw", "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186305236/dBmW2A", "token": "4lOENt66OWgFwtpyXJSUbL3ooxTCeRcUNq7Y22pwlFY" } ] } 2024-01-26 03:45:59,786:DEBUG:acme.client:Storing nonce: R3i4Vkc5VIpXhI-JVSdS7kHbH8TiAro_6ly4VNL3nNeutdMykOE 2024-01-26 03:45:59,787:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-26 03:45:59,788:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-01-26 03:45:59,788:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-26 03:45:59,788:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-26 03:45:59,789:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-26 03:45:59,789:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-26 03:45:59,789:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-26 03:45:59,790:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-26 03:45:59,790:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-26 03:45:59,838:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-26 03:46:00,063:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-26 03:46:00,064:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-26 03:46:00,064:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-26 03:46:00,069:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:20 UTC. 2024-01-26 03:46:00,069:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-26 03:46:00,070:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-26 03:46:00,074:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-26 03:46:00,074:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-26 03:46:00,074:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-26 03:46:00,090:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-26 03:46:00,091:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-26 03:46:00,093:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-26 03:46:00,634:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-26 03:46:00,635:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:45:59 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "WcX05RIyKac": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-26 03:46:00,635:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-26 03:46:04,527:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7120_key-certbot.pem 2024-01-26 03:46:08,149:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7118_csr-certbot.pem 2024-01-26 03:46:08,149:DEBUG:acme.client:Requesting fresh nonce 2024-01-26 03:46:08,150:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-26 03:46:08,332:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-26 03:46:08,333:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:46:06 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCeBjc84bOeqIL_5HInmK9_9dNnzgRORM10bLCtgiRpPU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-26 03:46:08,333:DEBUG:acme.client:Storing nonce: Wkq6jgLCeBjc84bOeqIL_5HInmK9_9dNnzgRORM10bLCtgiRpPU 2024-01-26 03:46:08,333:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-01-26 03:46:08,341:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENlQmpjODRiT2VxSUxfNUhJbm1LOV85ZE5uemdST1JNMTBiTEN0Z2lScFBVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "JMzw_HKDt-6SQtiOsrE2se3dAuEjqv-yyp-gWRGByt3bEnNOdayB0WpZPqe8GCfRqCUPUNssO2UvjP4HcHkTwIOznQEMhJT5l5Kz-3R7_WajzlYs6HqSlgd-OYP3U6fEIC12EBamWPl4HYR9akQJVh5AI5E5khLuvLFmSqduNdihmXe0ZUZDgxYB90AixhmJfn_IVuRtYHnRhWUY1hxYb2aW5aj3k0_nMGYra90Yv88Ny3WBWaGZdbjB_ZSktQZwlvlBamqNv4bqXhIsvKGZB2sNGbc6FomECRV8UND3uW-aLeJ013nngl2SgPIGeMZGnGvtf-m4dNScGZ447ZqYpQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-01-26 03:46:08,583:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-01-26 03:46:08,584:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Jan 2024 02:46:07 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463215876 Replay-Nonce: fBfjtdZFhFxCbSGKqwUVyvJbrUID0WLBavMcMbS6b_XTyY6g-uI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:07Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186343916" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463215876" } 2024-01-26 03:46:08,584:DEBUG:acme.client:Storing nonce: fBfjtdZFhFxCbSGKqwUVyvJbrUID0WLBavMcMbS6b_XTyY6g-uI 2024-01-26 03:46:08,584:DEBUG:acme.client:JWS payload: b'' 2024-01-26 03:46:08,590:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186343916: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZoRnhDYlNHS3F3VVZ5dkpiclVJRDBXTEJhdk1jTWJTNmJfWFR5WTZnLXVJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzNDM5MTYifQ", "signature": "tkIMRHLUO4KSmcqzFkTtKeoFwx1C9ahAdrzOpcn0nlyBI1BjgIuQXEmlm4NhuX85cXV_5AtOKojznYaGQGuO7lBqjM9I7SZ2XpvWl5YArM29eSF-sdyoaHG8300dPJVa00QwPTfdbFHF5UsIof2PYe_NhY0BiFyzWJa_OSjAwAfB9Zec33mqXmFX-Lihn6aLk1SnUnARdczUsOxu_YQ7Hcede5OKBnN5-GVqQEnOfoXJjBOr8IjWTlQmk1s8aUh5MG1QB2RROxsD9LihLuuy_Xo5bM5xEpK-XiBlXfrB_uaN9ZmBoJtmkgLjXEcSV6BHNY5Ft2CNNDFFY1vWQOXvjg", "payload": "" } 2024-01-26 03:46:08,788:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186343916 HTTP/1.1" 200 805 2024-01-26 03:46:08,788:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:46:07 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCp-Ua5iul91erLZfNSDFz5TSxX2bH0YYFRtvPwI2_s0M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:07Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/FQmNLA", "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/nw3Heg", "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186343916/o7wJkQ", "token": "PiMp-VkLgmip93z4vbS9ntvg3oiShSP-HLJV1wAbfOE" } ] } 2024-01-26 03:46:08,789:DEBUG:acme.client:Storing nonce: Wkq6jgLCp-Ua5iul91erLZfNSDFz5TSxX2bH0YYFRtvPwI2_s0M 2024-01-26 03:46:08,789:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-26 03:46:08,790:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-01-26 03:46:08,791:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-26 03:46:08,791:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-26 03:46:08,793:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-26 03:46:08,793:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-26 03:46:08,793:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-26 03:46:08,794:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-26 03:46:08,795:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-26 03:46:08,843:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-26 03:46:09,058:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-26 03:46:09,059:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-01-26 03:46:09,060:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-01-26 03:46:09,064:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:36 UTC. 2024-01-26 03:46:09,065:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-26 03:46:09,065:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-26 03:46:09,070:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-26 03:46:09,070:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-26 03:46:09,070:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-26 03:46:09,074:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-26 03:46:09,075:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-26 03:46:09,077:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-26 03:46:09,695:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-26 03:46:09,696:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:46:08 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "9Qsd6a0V8Ng": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-26 03:46:09,696:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-26 03:46:13,610:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7121_key-certbot.pem 2024-01-26 03:46:17,296:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7119_csr-certbot.pem 2024-01-26 03:46:17,297:DEBUG:acme.client:Requesting fresh nonce 2024-01-26 03:46:17,297:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-26 03:46:17,474:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-26 03:46:17,474:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:46:15 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCzzgAJbi2RRfDc_QMeEVDJxr-rZx8rz9xLcAeu0zZ1nQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-26 03:46:17,475:DEBUG:acme.client:Storing nonce: Wkq6jgLCzzgAJbi2RRfDc_QMeEVDJxr-rZx8rz9xLcAeu0zZ1nQ 2024-01-26 03:46:17,475:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-01-26 03:46:17,480:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTEN6emdBSmJpMlJSZkRjX1FNZUVWREp4ci1yWng4cno5eExjQWV1MHpaMW5RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "gVbBwWLvYVVXrlyssWoGwR7meuI1sQ6mc3Zg2BtS0CH0W2BNO9-PONNAXTE0mhfUqod47U7Um-0nI5YHaNGJnYS3QeUPwHBGC3Onfx3aDjJPvIsCI2OPfitPoECMZsx6F6R09cK07_GcomrBmfP51UbXvLHlHdD7ZuFAvYPgMJeQ3yey_1pWvZgAteh6UEgZemBGiXhk_nhoyqtlcdOs1xzc31DWVTOpkUUjn1OkXOi_59JRCeTpmSEyaPkYVy7CuuwvJYJXBKgGg1GywgbD_cUJ2m8uhi5JNOtZdGHod2wvYCsAWJERzAE_6_gWPhNz5uZ0uHwje-6cVDp3FYHNwA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-01-26 03:46:17,729:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-01-26 03:46:17,730:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Jan 2024 02:46:16 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463242076 Replay-Nonce: fBfjtdZF07NUiUTCtJgvyDZwvMKEIzi506o8AqH7905wZcTYz6M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:16Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186384516" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463242076" } 2024-01-26 03:46:17,730:DEBUG:acme.client:Storing nonce: fBfjtdZF07NUiUTCtJgvyDZwvMKEIzi506o8AqH7905wZcTYz6M 2024-01-26 03:46:17,730:DEBUG:acme.client:JWS payload: b'' 2024-01-26 03:46:17,735:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186384516: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkYwN05VaVVUQ3RKZ3Z5RFp3dk1LRUl6aTUwNm84QXFINzkwNXdaY1RZejZNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODYzODQ1MTYifQ", "signature": "Q-oBkMHG5i6aJJARpFNxFb_-KoH_s5xrerp4ST2Tgmrr_UxoJ5rRwMQp68Bp3-igfQIVWNkhEJYznBWEIgMjQ179J1W6P_i3BHd2NYsd77hZirMKZmLZfsHfbMYZEdqqi3Spm7Rr8AMM1vlHHzCm2Dfp2HccdjWsBhBHLkkuFXA-4bWCznj1231Y8EdbtB497FfNBerht7Np-s39DZuLPWJRCLv5cNgECW_zi6ueMXKNagmGiysSaQqgi7nf8IiZk9QchWqh0ABo-LoofvYQVxI_bueNRU4nLGHRVt-uT7wB4_69LhemPmbCdovQ-Ganigq3O3qBwffsGvoiBeHxKg", "payload": "" } 2024-01-26 03:46:17,916:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186384516 HTTP/1.1" 200 809 2024-01-26 03:46:17,916:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:46:16 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZF2rEyIhFif_JmWfW_sWFXX_swnjtsxaV_T7FeJ8RF9_I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:16Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/iy166A", "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/FJ3duA", "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186384516/0qWA8w", "token": "jn_BiHhrJA8AN0gJnIjhCR3PeeoQVTtlO6MDfFVlEPY" } ] } 2024-01-26 03:46:17,916:DEBUG:acme.client:Storing nonce: fBfjtdZF2rEyIhFif_JmWfW_sWFXX_swnjtsxaV_T7FeJ8RF9_I 2024-01-26 03:46:17,917:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-26 03:46:17,917:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-01-26 03:46:17,918:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-26 03:46:17,918:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-26 03:46:17,919:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-26 03:46:17,919:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-26 03:46:17,919:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-26 03:46:17,920:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-26 03:46:17,921:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-26 03:46:18,007:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-26 03:46:18,248:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-26 03:46:18,249:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-26 03:46:18,250:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-26 03:46:18,254:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:37:50 UTC. 2024-01-26 03:46:18,255:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-26 03:46:18,255:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-26 03:46:18,260:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-26 03:46:18,260:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-26 03:46:18,260:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-26 03:46:18,265:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-26 03:46:18,266:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-26 03:46:18,268:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-26 03:46:18,798:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-26 03:46:18,799:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:46:17 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "SfDD2_33RiQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-26 03:46:18,800:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-26 03:46:22,912:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7122_key-certbot.pem 2024-01-26 03:46:26,561:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7120_csr-certbot.pem 2024-01-26 03:46:26,562:DEBUG:acme.client:Requesting fresh nonce 2024-01-26 03:46:26,562:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-26 03:46:26,740:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-26 03:46:26,741:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:46:25 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZF6luvdsWJs8_kJhcKcyekXEwtoR-wcuefDOjzukVslXk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-26 03:46:26,741:DEBUG:acme.client:Storing nonce: fBfjtdZF6luvdsWJs8_kJhcKcyekXEwtoR-wcuefDOjzukVslXk 2024-01-26 03:46:26,741:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-01-26 03:46:26,747:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkY2bHV2ZHNXSnM4X2tKaGNLY3lla1hFd3RvUi13Y3VlZkRPanp1a1ZzbFhrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "mMLklBaKGS5iKfO-0uFThXWxpeTRqU_AI_Jl_Mvd0rIMPSJ-XHOAJEX7SCl8IlDGd85c2T7eFB9LKDMx4JyHn0bQ_K6r3bZz3KbqmDRQmllcGRc10YfWF9hcqStGPf3y3h5ovm0bpQ9ShWPfvKvruuAjz4Vq-I8wQ93ZEF2H9TlB8rXR1GZi26DAza-FARlFP15jjZG8olArvE4pkBjztb81gDSyyd0ENY7jDOUdmxqDi9cqogZ6RTplxyg8qm_waDLItekQcrISHMZQKxs_u2xUBM_hz4kYEtp4DNxSkChPtUK5foJVz2BqYhKWR4O33um1tNf8ZqsNhcoNoq1i9A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-01-26 03:46:26,961:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-01-26 03:46:26,962:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Jan 2024 02:46:25 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463267436 Replay-Nonce: Wkq6jgLCrWaz9vst0S-2YZQtewU-dOlJaTUN5-ftvdLKhGhhySk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:25Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186423616" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463267436" } 2024-01-26 03:46:26,962:DEBUG:acme.client:Storing nonce: Wkq6jgLCrWaz9vst0S-2YZQtewU-dOlJaTUN5-ftvdLKhGhhySk 2024-01-26 03:46:26,962:DEBUG:acme.client:JWS payload: b'' 2024-01-26 03:46:26,968:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186423616: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiV2txNmpnTENyV2F6OXZzdDBTLTJZWlF0ZXdVLWRPbEphVFVONS1mdHZkTEtoR2hoeVNrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY0MjM2MTYifQ", "signature": "QmgMp8Cf8Lmhyg5XJB4c1QgtKWvKOdwBzlFEA7_UapHGoXWSDa9IZDBANrFnPryZ3VmRYAkXIwtJylUJGjWek9oLDD-Duyy7Iwe3XJRv8eK46C9Z53OULmqZzv2MRWnSmsnk8KsvW9gJBaZK1SRmCKALo1VPpJy5MdeIZKQIdlhVLvJffLhnNNK5SFXbdEIIYKwfJCfzSVXxBKjtTEJ_ohnvDsFp6bXVNQNFnpgXyDEvMW6OvbCs9Jt9kNWz-ecMeKJ8CWFPORbKG3XdClT8L-g4GyMXlZd5rCntaP5xzOlPg-V-lIMAqc7HglWX5TS5R8vl9PcGiXK7QygvWip-Ag", "payload": "" } 2024-01-26 03:46:27,150:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186423616 HTTP/1.1" 200 806 2024-01-26 03:46:27,150:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:46:25 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCd16QXaXzglNByTjUhkt5cdQ4jvSTsynWuG98qEcNFaA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:25Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/sGt3LQ", "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/-siQUw", "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186423616/rUgQOA", "token": "rcYaBnE5hu_LuC4w5ovHJN3dO3zPMS862aj7U1JpCKg" } ] } 2024-01-26 03:46:27,151:DEBUG:acme.client:Storing nonce: Wkq6jgLCd16QXaXzglNByTjUhkt5cdQ4jvSTsynWuG98qEcNFaA 2024-01-26 03:46:27,151:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-26 03:46:27,151:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-01-26 03:46:27,152:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-26 03:46:27,152:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-26 03:46:27,153:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-26 03:46:27,153:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-26 03:46:27,153:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-26 03:46:27,154:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-26 03:46:27,155:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-26 03:46:27,201:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-01-26 03:46:27,201:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-26 03:46:27,202:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-01-26 03:46:27,209:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-01-26 03:46:27,213:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-01-26 03:46:27,213:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-01-26 03:46:27,213:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-01-26 03:46:27,214:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-01-26 03:46:27,216:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-01-26 03:46:27,256:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-26 03:46:27,485:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-26 03:46:27,486:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-26 03:46:27,487:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-26 03:46:27,491:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:07 UTC. 2024-01-26 03:46:27,491:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-26 03:46:27,492:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-26 03:46:27,496:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-26 03:46:27,496:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-26 03:46:27,496:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-26 03:46:27,512:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-26 03:46:27,513:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-26 03:46:27,515:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-26 03:46:27,977:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-26 03:46:27,977:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:46:26 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "JdUAxljqEKQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-26 03:46:27,978:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-26 03:46:31,884:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7123_key-certbot.pem 2024-01-26 03:46:35,626:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7121_csr-certbot.pem 2024-01-26 03:46:35,626:DEBUG:acme.client:Requesting fresh nonce 2024-01-26 03:46:35,626:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-26 03:46:35,789:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-26 03:46:35,790:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:46:34 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: R3i4Vkc5laQ6OM2Z6lbVcKDpGdaS5irv9AT7YzczXGRB2X9cx2o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-26 03:46:35,790:DEBUG:acme.client:Storing nonce: R3i4Vkc5laQ6OM2Z6lbVcKDpGdaS5irv9AT7YzczXGRB2X9cx2o 2024-01-26 03:46:35,790:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-01-26 03:46:35,796:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzVsYVE2T00yWjZsYlZjS0RwR2RhUzVpcnY5QVQ3WXpjelhHUkIyWDljeDJvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "a0dIsDxMRddN6OUmjfNVQFeX3VsNHJnC3oQ2cK1AvvERar-CnWgsAHT_yK7rs6oAoFywlXYscDmxQI3KEBMJhXyUek53tJB8kA0Aet4TIrq_7MQs-UN-A1cL6rWmyqnenRbI0ooR2bQv1znh57HsHZoLC_klGdVGCJ18n5_Hg1hMLv4yaJVnD4CpQKD2v_fK_Tc-S0uFVoUP_sWS5Yzg3rNjjz7u-tEqUa5bSP9zaEeUs-r9ihUX63tavF8Kta0QzkRoM7A-d2BqzuzQrO-NYfXkrFVo8oOSUQGnil7ARfoTpJz-_cXcCZNzU11uGjVHaSoTg7gwzTEN3M3h6xzztA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-01-26 03:46:36,287:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-01-26 03:46:36,288:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Jan 2024 02:46:34 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463293726 Replay-Nonce: R3i4Vkc53FVM1ck2EWiskIzS0nu751I0EJpAMyAuGx2ZV71SPQ0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:34Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186467546" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463293726" } 2024-01-26 03:46:36,288:DEBUG:acme.client:Storing nonce: R3i4Vkc53FVM1ck2EWiskIzS0nu751I0EJpAMyAuGx2ZV71SPQ0 2024-01-26 03:46:36,288:DEBUG:acme.client:JWS payload: b'' 2024-01-26 03:46:36,294:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186467546: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiUjNpNFZrYzUzRlZNMWNrMkVXaXNrSXpTMG51NzUxSTBFSnBBTXlBdUd4MlpWNzFTUFEwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY0Njc1NDYifQ", "signature": "ROLF3IM9AyNgnyFBYHLxuFgDadv2i0L54b4QT-rHa2J8OKfWhHbiSReHttp2ZZFA2xmWVMHsMfrft8EI9tqUvcE4T5OtZ4HnBRoX-P06YG618qsIJ4Zzfr1eI4QR1-bkM_40UFyfDl4nbeMeftWBmpDmR3-_E661OpdHsCN93rmtKlS0d92tUk_7jjQf9NPBQ9ZKKtOuaiJitqDddIugkRajPmba6ywydBMo7Gc5bTEZGmymFYkT-ljm9NdBsWcrwOUxGJ_ajfWLVRGuTqAIbTMovWdlDo1NQ5TASi9MyejmW-dAAft7EIw4wF-brquSyA7sqvjTt6nY1YiWedqo3A", "payload": "" } 2024-01-26 03:46:36,452:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186467546 HTTP/1.1" 200 811 2024-01-26 03:46:36,453:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:46:34 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YmTCif1CV0p_avqIrAIu2qRBN-jN8Sjy9lgOkOKEjrrE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:34Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/n-ZWjw", "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/NYrS2A", "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186467546/g51OFg", "token": "lR7sganKQycJREA9u4WQ2udA6ltYm5soBKznmYpzKVU" } ] } 2024-01-26 03:46:36,453:DEBUG:acme.client:Storing nonce: VKfU247YmTCif1CV0p_avqIrAIu2qRBN-jN8Sjy9lgOkOKEjrrE 2024-01-26 03:46:36,454:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-26 03:46:36,454:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-01-26 03:46:36,455:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-26 03:46:36,455:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-26 03:46:36,456:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-26 03:46:36,456:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-26 03:46:36,456:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-26 03:46:36,457:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-26 03:46:36,458:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-26 03:46:36,507:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-26 03:46:36,719:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-26 03:46:36,720:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-26 03:46:36,721:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-26 03:46:36,725:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:38:31 UTC. 2024-01-26 03:46:36,725:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-26 03:46:36,726:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-26 03:46:36,731:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-26 03:46:36,731:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-26 03:46:36,731:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-26 03:46:36,746:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-26 03:46:36,747:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-26 03:46:36,749:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-26 03:46:37,197:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-26 03:46:37,198:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:46:35 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "9SqcTP-4r9U": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-26 03:46:37,198:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-26 03:46:41,112:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7124_key-certbot.pem 2024-01-26 03:46:44,836:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7122_csr-certbot.pem 2024-01-26 03:46:44,836:DEBUG:acme.client:Requesting fresh nonce 2024-01-26 03:46:44,837:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-26 03:46:44,998:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-26 03:46:44,999:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:46:43 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YDSbNYwlVhV79xnMmMhUo_PDB7HuAzuqcoqo7Ns6EbWA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-26 03:46:44,999:DEBUG:acme.client:Storing nonce: VKfU247YDSbNYwlVhV79xnMmMhUo_PDB7HuAzuqcoqo7Ns6EbWA 2024-01-26 03:46:44,999:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-01-26 03:46:45,006:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lEU2JOWXdsVmhWNzl4bk1tTWhVb19QREI3SHVBenVxY29xbzdOczZFYldBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ClJ41zzPxBeJUuQDMOQzNg1pyJH9Jhr6BrfBautMwhPiHBHVZdmje_so6bspE7iAKRPPtlhdYZ52CjqEfEfAA08uW6IxXYt9ZkCMGgXwn8XuQet4ZWxVDlIUBTir6M7KC3tN7ohzb3x2oSRFN5HHSWMcvqU_hw-ko_DEt1GpVq6VN-qNcwHZmDFad6b1gTdn62xlMCvhOvR1SBPxfsm_kQJID-NYeiBblwxkgto9uWp51fEHTa0vlY9eZWotcoPpnr-bj2j8-nJxQFIcE6W8DmOUIob9yFKWgE8wFa9mYYyJ7ELCo-DUn9ZVFfEvNHhkV_wtaYlGcU90UzwVDH-wIA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-01-26 03:46:45,333:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-01-26 03:46:45,334:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Jan 2024 02:46:43 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463315236 Replay-Nonce: VKfU247YjJlXzefjpP4vwsDycdjMdeFAk3NKdv2Ex5oBB7A89Bw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:43Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186500336" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463315236" } 2024-01-26 03:46:45,335:DEBUG:acme.client:Storing nonce: VKfU247YjJlXzefjpP4vwsDycdjMdeFAk3NKdv2Ex5oBB7A89Bw 2024-01-26 03:46:45,335:DEBUG:acme.client:JWS payload: b'' 2024-01-26 03:46:45,340:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186500336: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lqSmxYemVmanBQNHZ3c0R5Y2RqTWRlRkFrM05LZHYyRXg1b0JCN0E4OUJ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1MDAzMzYifQ", "signature": "Fe0c5KG0A_BDpScGrsYkdmQBt_TpAhAgilGzm0JwAtcHNWGCq6H7y10kYa6LDb4_3j_S6Gwkx_ihf6dx9g8PeSeSIYw5EdhaLIDo4Ck0Nx9DtpcgXzsCuXYQcuUL3R_LLU8LZmpvVLMvYJopEN7cXJ8WRkUNWkDFNYO5thbfrJ8geAzRsDCfbXMWe_8EqzIjnPx9jPA8iLik_tgsSK8oDZ68wtoFLsIGiW6DKYbKHaGkaFyOkRJnkCEbhidAwsgPHCEmgcCZlb-9mX5kfMQUjmGRZ7_mO0OVRdjBCqj0Zl0wy7L5Nw9cxBQlYcP7s_37_hOYhN9FjpeKC09HX3qezA", "payload": "" } 2024-01-26 03:46:45,506:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186500336 HTTP/1.1" 200 810 2024-01-26 03:46:45,507:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:46:44 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247Y0O7iGwQ8xnXoMuz9qA_uxU2Fxb10rTR12SsvnA355b8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:43Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/MLFeSA", "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/NegWfw", "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186500336/0vtuKQ", "token": "XCoejEnu9k78T7S0jz6XHrFIcw2ltUE_4tT5u0nBtN0" } ] } 2024-01-26 03:46:45,507:DEBUG:acme.client:Storing nonce: VKfU247Y0O7iGwQ8xnXoMuz9qA_uxU2Fxb10rTR12SsvnA355b8 2024-01-26 03:46:45,507:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-26 03:46:45,508:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-01-26 03:46:45,508:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-26 03:46:45,509:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-26 03:46:45,509:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-26 03:46:45,510:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-26 03:46:45,510:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-26 03:46:45,510:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-26 03:46:45,512:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-26 03:46:45,550:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-26 03:46:45,815:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-26 03:46:45,817:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-01-26 03:46:45,818:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-01-26 03:46:45,823:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:09 UTC. 2024-01-26 03:46:45,823:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-26 03:46:45,824:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-26 03:46:45,829:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-26 03:46:45,830:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-26 03:46:45,830:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-26 03:46:45,835:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-26 03:46:45,835:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-26 03:46:45,837:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-26 03:46:46,320:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-26 03:46:46,321:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:46:44 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "BG_VWiJ05JQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-26 03:46:46,321:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-26 03:46:50,362:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7125_key-certbot.pem 2024-01-26 03:46:54,029:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7123_csr-certbot.pem 2024-01-26 03:46:54,030:DEBUG:acme.client:Requesting fresh nonce 2024-01-26 03:46:54,030:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-26 03:46:54,185:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-26 03:46:54,186:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:46:52 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247Y8p00GsVjNJlcRaijS4HCjLlvzpu3tcxHxtgg_LZLfB8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-26 03:46:54,186:DEBUG:acme.client:Storing nonce: VKfU247Y8p00GsVjNJlcRaijS4HCjLlvzpu3tcxHxtgg_LZLfB8 2024-01-26 03:46:54,186:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-01-26 03:46:54,192:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1k4cDAwR3NWak5KbGNSYWlqUzRIQ2pMbHZ6cHUzdGN4SHh0Z2dfTFpMZkI4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "to4QsUeP0IT1ehlcuueIGwFwr-_pAZiwQ9RPkyfSsMQbzMpdom6vPHKTKUNY_D8uV5ngRHc1_HWYfxiinJ0XKYfvahusVxaa4WZ2cE-IwUqAPyAz9kzehREJBBE5-JAmFrJ8S0D0yK3lYNpkv4kmqQDa_Z0fN1V2Hyqy8FrHAbuBQBfw7pvxoAFRYZHmnd-hQCgfz15wZ0mKg7P9FVbf7ToJhubkWDNJmb_XTqtPlfLJA0pWVX95e65pqE7BE4HHN_cn0QUhHws0UVVBxWl3u3BlUMkvgZbdIC3tEMp1qCWBIvxuJ3heZXAdDDYU32dAkP90xF7BAOcDFJd0SGokKQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-01-26 03:46:54,536:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-01-26 03:46:54,536:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Jan 2024 02:46:53 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463336576 Replay-Nonce: VKfU247YNSTrHrdFi-DkMChkdDJX4YJOU8Dsqg0saLOQ3GAD6Es X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:46:52Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186530456" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463336576" } 2024-01-26 03:46:54,537:DEBUG:acme.client:Storing nonce: VKfU247YNSTrHrdFi-DkMChkdDJX4YJOU8Dsqg0saLOQ3GAD6Es 2024-01-26 03:46:54,537:DEBUG:acme.client:JWS payload: b'' 2024-01-26 03:46:54,542:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186530456: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lOU1RySHJkRmktRGtNQ2hrZERKWDRZSk9VOERzcWcwc2FMT1EzR0FENkVzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1MzA0NTYifQ", "signature": "XZpKenz7hZyiiJuTbVDmyWg7MUcaAv2ppo4mi8XoHUtHH8B5If-r7jMPIvitcHyWLj7kAG0mxAdMHvE5XpgP8YD2J132uWza2Vy0P_FvzWafT-967Gfs69bcR5Te49331jFc2u_9opFKn-2i1u97m9ectVi3XB2iVNaDsFc2MryqmKH8ANMJ83hfzz0cNXGBKwc3idKYCFCruih53ir7H6VhMHjzZWuVuwWj7bD-O6L2HRCfe5sDCxzY0xWbx5HVE_l9FP-H6GWEmfA5iJiYGkD6S8IvN-EtQZlKZDWtzqF3ZY8SviBcQP9m7BMWSmY_oqK_0CWJhJXUO39RrOfyfA", "payload": "" } 2024-01-26 03:46:54,708:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186530456 HTTP/1.1" 200 809 2024-01-26 03:46:54,709:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:46:53 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YLBAkJuP1NWAsLXxZuHmtJVCnEEYLPDwLQNpfK5QBH3M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:46:52Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/ibbbOA", "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/W42erg", "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186530456/xDGKCQ", "token": "jw_r9efMVFir1Ce0C4BVU4eXfjUW9kRPWv97qCJZJGI" } ] } 2024-01-26 03:46:54,709:DEBUG:acme.client:Storing nonce: VKfU247YLBAkJuP1NWAsLXxZuHmtJVCnEEYLPDwLQNpfK5QBH3M 2024-01-26 03:46:54,709:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-26 03:46:54,710:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-01-26 03:46:54,710:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-26 03:46:54,711:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-26 03:46:54,711:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-26 03:46:54,712:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-26 03:46:54,712:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-26 03:46:54,712:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-26 03:46:54,713:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-26 03:46:54,753:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-26 03:46:55,005:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-26 03:46:55,006:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is signed by the certificate's issuer. 2024-01-26 03:46:55,007:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert11.pem is: OCSPCertStatus.GOOD 2024-01-26 03:46:55,012:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:26 UTC. 2024-01-26 03:46:55,012:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-26 03:46:55,012:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-26 03:46:55,017:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-26 03:46:55,017:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-26 03:46:55,017:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-26 03:46:55,033:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-26 03:46:55,034:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-26 03:46:55,036:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-26 03:46:55,483:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-26 03:46:55,484:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:46:54 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "3rVojoKZPyM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-26 03:46:55,484:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-26 03:46:59,390:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7126_key-certbot.pem 2024-01-26 03:47:03,061:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7124_csr-certbot.pem 2024-01-26 03:47:03,062:DEBUG:acme.client:Requesting fresh nonce 2024-01-26 03:47:03,062:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-26 03:47:03,216:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-26 03:47:03,216:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:47:01 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YYCRCxMHd-4BPUnpotHch8Bf7aQbgUPbw8V8Yy3alzAY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-26 03:47:03,217:DEBUG:acme.client:Storing nonce: VKfU247YYCRCxMHd-4BPUnpotHch8Bf7aQbgUPbw8V8Yy3alzAY 2024-01-26 03:47:03,217:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-01-26 03:47:03,224:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1lZQ1JDeE1IZC00QlBVbnBvdEhjaDhCZjdhUWJnVVBidzhWOFl5M2FsekFZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "d3v9RoxZWsN0t958o2wzUMprJbIqjz8VfcARkw9-r87jbFxg4OaWh16byPuKoXcfkKtI-seY2cEFaSu7_ZXwG-Hw_8CkC-q1tS8Hyij1nnebDAIP83-clUgmNlOs0BwNAuEFceRglz9yS2HpWMv4PZsr2i6MrrAZ4-vsg0dzeeZv7Rdjkx6dKw-FeaG-7DpogdtKxOcEsGY5Gc7Pm31Fn4matv3LYP4ZzPJ6r4ebGsXR21AVMlQkT5Q5E_8wMKd4_PW3TKiTIuq1-7wn1Ve6Uh5fy_phHtj3Yhqr1adoQsRMnPPBewENS7PokPUIxkwy1PxaXEaWPvHgMZiaysoWhA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-01-26 03:47:03,630:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-01-26 03:47:03,631:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Jan 2024 02:47:02 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463357966 Replay-Nonce: VKfU247Y49NrAGRr8QBC4ByKsw2GXcNvFVcx6Mbj-7QWaxMXpoE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:47:01Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186562236" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463357966" } 2024-01-26 03:47:03,631:DEBUG:acme.client:Storing nonce: VKfU247Y49NrAGRr8QBC4ByKsw2GXcNvFVcx6Mbj-7QWaxMXpoE 2024-01-26 03:47:03,632:DEBUG:acme.client:JWS payload: b'' 2024-01-26 03:47:03,637:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186562236: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVktmVTI0N1k0OU5yQUdScjhRQkM0QnlLc3cyR1hjTnZGVmN4Nk1iai03UVdheE1YcG9FIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY1NjIyMzYifQ", "signature": "DZZ5I-eLv4RGsT1-6u8tYb0NmeZLdHOj7qXi4_XaL8gZQPtQDT0USnoe4hbVWonP4Ie0l_eVbgEGQrze8O5l0JP3366fBXXnn6akPRTzOazt0yzAqHT1rBZvBQRQvwCefYxZNSj4N4WexEg9L1AfbvohPOuzMPgOGvtvokTWJ65uiuNjW1RdGotFGHAjFU_kL1oyQrwRz1-jTrI1k0Uv4nlZM9B_5keoAwAvuJv7icdzhGp5viVo019uxsKiCWrVDfNPNCNBEmOyhs5AOFID8Su2MlcTE0f2p4q478ZHMR4pD-kv00m693PN4TLDVoVGhkjsSC_uUYzyLF3FAumTUg", "payload": "" } 2024-01-26 03:47:03,820:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186562236 HTTP/1.1" 200 805 2024-01-26 03:47:03,821:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:47:02 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: VKfU247YYj742hipTgiwd8QwMhOeQGmthp5bQWATLQtf7J2sCrw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:47:01Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/d2C2Aw", "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/yk_m2Q", "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186562236/2CxhFQ", "token": "H01LpXuRxQpCRjYSZCN34ItglP6kF0Hdvv07bQXTnyE" } ] } 2024-01-26 03:47:03,821:DEBUG:acme.client:Storing nonce: VKfU247YYj742hipTgiwd8QwMhOeQGmthp5bQWATLQtf7J2sCrw 2024-01-26 03:47:03,822:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-26 03:47:03,822:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-01-26 03:47:03,823:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-26 03:47:03,823:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-26 03:47:03,824:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-26 03:47:03,824:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-26 03:47:03,824:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-26 03:47:03,825:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-26 03:47:03,826:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-26 03:47:03,876:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-26 03:47:04,519:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-26 03:47:04,520:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-01-26 03:47:04,520:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-01-26 03:47:04,524:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:39:43 UTC. 2024-01-26 03:47:04,524:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-26 03:47:04,524:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-26 03:47:04,529:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-26 03:47:04,529:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-26 03:47:04,529:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-26 03:47:04,534:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-26 03:47:04,535:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-26 03:47:04,537:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-26 03:47:05,065:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-26 03:47:05,066:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:47:03 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "k7V6KbNvf8o": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-01-26 03:47:05,066:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-26 03:47:08,865:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7127_key-certbot.pem 2024-01-26 03:47:12,382:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7125_csr-certbot.pem 2024-01-26 03:47:12,382:DEBUG:acme.client:Requesting fresh nonce 2024-01-26 03:47:12,382:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-26 03:47:12,559:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-26 03:47:12,560:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:47:11 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZFAcUUYwtprkCmbox0YAz1qcsvqGFZ5Li_-jcs50zVUnA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-26 03:47:12,560:DEBUG:acme.client:Storing nonce: fBfjtdZFAcUUYwtprkCmbox0YAz1qcsvqGFZ5Li_-jcs50zVUnA 2024-01-26 03:47:12,560:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-01-26 03:47:12,567:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZBY1VVWXd0cHJrQ21ib3gwWUF6MXFjc3ZxR0ZaNUxpXy1qY3M1MHpWVW5BIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Ezpi-BnRmbmBE9tz1Rsc9CRJCNOjE5adEjtF8n5xoBOY7rpHIbc5g-tnz3gD4c_o6MnUBXuzGU2mXAMv_2iC8LjSmwsw802N2rAdpIAJX7mTWF9ToGHbsnD_M9Rt37Lv0fzvXjpKhs2QE40h77z_5uxu2SscyeO_nmZJqkZX5O0YswlKFvEcPoWrIQMFsRHgflizoIKCNXJQv0_0LsYd8XOd8Wiqio6SOJzdWR1jfEml74xJiEYgzpglnlV8mSYwLcNKUuWLMOBqN_jfOfDhU3PYDE9E-3ocqBecYVS-y78TfnndGoIGSA3dD_h5CittBekF49hYhxyvMjBrR_EUGA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-01-26 03:47:12,817:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-01-26 03:47:12,818:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Jan 2024 02:47:11 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463390816 Replay-Nonce: fBfjtdZFTCj4Ck2rJuqIrKWDdDGJRpt2IE4ezOVNLZ5Ux4YqGIY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:47:11Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186609606" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463390816" } 2024-01-26 03:47:12,818:DEBUG:acme.client:Storing nonce: fBfjtdZFTCj4Ck2rJuqIrKWDdDGJRpt2IE4ezOVNLZ5Ux4YqGIY 2024-01-26 03:47:12,818:DEBUG:acme.client:JWS payload: b'' 2024-01-26 03:47:12,824:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186609606: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZUQ2o0Q2syckp1cUlyS1dEZERHSlJwdDJJRTRlek9WTkxaNVV4NFlxR0lZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY2MDk2MDYifQ", "signature": "KEoBo5wJmE69ZxGqUmo4o3ghgS_xP47L0dQ05P6oQI8RkukmxbFTCIUjp7J2qUUknAnQoBbtXfq1R_EfdVX_oML0IwHa7mSc2RxkH95_ggOlrgarBuhPno4lt05YV8VnoihDuzni-c14oXIiwbsj3sbK5Wc65V6YBzbrlDeghuqmAvSUQKcXyMRHr05BFd5RcWLLFPpYZ449l0urxTt9eDQx_gmTOJjw2-fmpEJ4abHSklSm6yMRY1cjF4cec2K1t5AE5kprEKG34Y_QHtroy513KjdvKChLnYKNV9Rj2QL03QAWjfXn2fFsoFyCjRcUWGA55zAjc64l0Yd6LxPbWQ", "payload": "" } 2024-01-26 03:47:13,006:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186609606 HTTP/1.1" 200 805 2024-01-26 03:47:13,007:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:47:11 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZFFiMArqGuQ52SJs27AfMEvgGUUX_KqmyEPa1NuB4lEqg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:47:11Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/u86J_A", "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/GMvoKw", "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186609606/skcDcA", "token": "sAZ8mbnIa2LWiESl4n6aWo-uRkP3-fhESwea2XXyZUA" } ] } 2024-01-26 03:47:13,007:DEBUG:acme.client:Storing nonce: fBfjtdZFFiMArqGuQ52SJs27AfMEvgGUUX_KqmyEPa1NuB4lEqg 2024-01-26 03:47:13,007:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-26 03:47:13,008:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-01-26 03:47:13,008:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-26 03:47:13,008:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-26 03:47:13,009:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-26 03:47:13,009:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-26 03:47:13,010:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-26 03:47:13,010:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-26 03:47:13,012:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-26 03:47:13,059:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-01-26 03:47:13,080:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-01-26 03:47:13,081:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2024-01-26 03:47:13,082:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2024-01-26 03:47:13,086:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-02-24 16:40:02 UTC. 2024-01-26 03:47:13,086:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-01-26 03:47:13,087:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-01-26 03:47:13,091:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2024-01-26 03:47:13,092:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-01-26 03:47:13,092:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-01-26 03:47:13,096:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2024-01-26 03:47:13,097:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-01-26 03:47:13,099:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-01-26 03:47:13,617:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2024-01-26 03:47:13,618:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:47:12 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-02/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "xl4ow9M5IKI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-01-26 03:47:13,619:INFO:certbot._internal.main:Renewing an existing certificate 2024-01-26 03:47:17,885:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7128_key-certbot.pem 2024-01-26 03:47:21,556:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7126_csr-certbot.pem 2024-01-26 03:47:21,557:DEBUG:acme.client:Requesting fresh nonce 2024-01-26 03:47:21,557:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-01-26 03:47:21,733:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-01-26 03:47:21,733:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:47:20 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fBfjtdZFwWoDu_rMtTCo8VK-Ve09o1Xc340Oblm2dFGFm6v6apk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-01-26 03:47:21,733:DEBUG:acme.client:Storing nonce: fBfjtdZFwWoDu_rMtTCo8VK-Ve09o1Xc340Oblm2dFGFm6v6apk 2024-01-26 03:47:21,734:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-01-26 03:47:21,739:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZ3V29EdV9yTXRUQ284VkstVmUwOW8xWGMzNDBPYmxtMmRGR0ZtNnY2YXBrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "nO2yK-pWJiXfGUfSfXyAcVCllvMCeAVi8tc6qsAKVEGvCrlUjrK8Jgdtp1Qrl6qBB8PBSj9KSMWVkxPlhAHguOiS72q21b-iBP6rI-ZWeGS-61tzzMgr7CQPMI2fD01-5YM-4QOK8TQD2ZztqzmDU3qy7H0Ea3hhHkHoNbCgwhgKiCFW8OIfMU7LUIFr3eWEU9knbomiaZwHek7dDOWWIm9r8k1an0-bMAS3ONw_TTf7EVzyv6BCkCNbEltg2quXtfXi9c-vNQIaTweN0REqA0T-UgUVyywiwyNqJfVq41-B6FWXT9CqofROFNdJ6qq0NF2XmCHK0Ivw9fYndAtyVg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-01-26 03:47:21,959:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-01-26 03:47:21,960:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 26 Jan 2024 02:47:20 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/239463415626 Replay-Nonce: fBfjtdZFQh4wrLUaVo3kEYeHhIjcpq6qdIoDC0egQjCXvSLHCq4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-02-02T02:47:20Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186648386" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/239463415626" } 2024-01-26 03:47:21,960:DEBUG:acme.client:Storing nonce: fBfjtdZFQh4wrLUaVo3kEYeHhIjcpq6qdIoDC0egQjCXvSLHCq4 2024-01-26 03:47:21,960:DEBUG:acme.client:JWS payload: b'' 2024-01-26 03:47:21,965:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/308186648386: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZkJmanRkWkZRaDR3ckxVYVZvM2tFWWVIaElqY3BxNnFkSW9EQzBlZ1FqQ1h2U0xIQ3E0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zMDgxODY2NDgzODYifQ", "signature": "jW-PWgq1WA2lwOUMu1A6FyicjH4cHM63c1jQuqXQuX6qHDrMqHOyrcYN5HlOB57PgM5R1KHkZV72o_75r7lVkIEiqZIGnf4xNmS6ZBrregZSYj8F_uDyv-IeiEsxWhd-fn0EhxI9QqR5WkSxXDoVaXl_y2qA3K8iitg28-QoJEdSdYeixbd-9OlQrK6qb6P5WUhDwVoS6Kuhtr8Nccrd3gj-CZJQp9LxIsPW9ahB4xvobAVEI8nmvxUgjP77zVFSaFkYE3RHX_lbkLOHMJ8I_bNr9a99zhd2AaRxiJoXibIwbSCPkKEqag5vOz3dDxeZbNixS0etgjuqsYrU6VHOgQ", "payload": "" } 2024-01-26 03:47:22,143:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/308186648386 HTTP/1.1" 200 805 2024-01-26 03:47:22,144:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 26 Jan 2024 02:47:20 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Wkq6jgLCvWz-9hZhYPbvmsrrgODmLbho2YfVxpZ_m87Wvt9V2kw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-02-02T02:47:20Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/AfqDTw", "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/2qup_g", "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/308186648386/cLgsJg", "token": "pdyz7HEOMR6J-XAdKqhlqu1eZ4OO7TbpaJrOdT3T3ZE" } ] } 2024-01-26 03:47:22,144:DEBUG:acme.client:Storing nonce: Wkq6jgLCvWz-9hZhYPbvmsrrgODmLbho2YfVxpZ_m87Wvt9V2kw 2024-01-26 03:47:22,144:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-01-26 03:47:22,145:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-01-26 03:47:22,146:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-01-26 03:47:22,146:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-01-26 03:47:22,147:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-26 03:47:22,147:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-01-26 03:47:22,147:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-01-26 03:47:22,148:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-01-26 03:47:22,149:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-01-26 03:47:22,149:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-01-26 03:47:22,150:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-01-26 03:47:22,151:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-01-26 03:47:22,153:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)