2025-01-31 21:02:53,555:DEBUG:certbot._internal.main:certbot version: 1.6.0 2025-01-31 21:02:53,555:DEBUG:certbot._internal.main:Arguments: [] 2025-01-31 21:02:53,556:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2025-01-31 21:02:55,575:DEBUG:certbot._internal.log:Root logging level set at 20 2025-01-31 21:02:55,576:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2025-01-31 21:02:55,689:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2025-01-31 21:02:55,778:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-31 21:02:55,992:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 21:02:55,994:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2025-01-31 21:02:56,000:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2025-01-31 21:02:56,014:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-31 21:02:56,019:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 21:02:56,080:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-31 21:02:56,268:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 21:02:56,272:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is signed by the certificate's issuer. 2025-01-31 21:02:56,274:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD 2025-01-31 21:02:56,286:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-31 21:02:56,295:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 21:02:56,486:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-31 21:02:56,700:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 21:02:56,702:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2025-01-31 21:02:56,703:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2025-01-31 21:02:56,716:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-31 21:02:56,725:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 21:02:56,788:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-31 21:02:56,982:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 21:02:56,983:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is signed by the certificate's issuer. 2025-01-31 21:02:56,984:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is: OCSPCertStatus.GOOD 2025-01-31 21:02:56,989:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-31 21:02:56,994:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 21:02:57,072:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-31 21:02:57,256:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 21:02:57,258:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert22.pem is signed by the certificate's issuer. 2025-01-31 21:02:57,259:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD 2025-01-31 21:02:57,264:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-31 21:02:57,268:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 21:02:57,416:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-31 21:02:57,596:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 21:02:57,598:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-31 21:02:57,599:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-31 21:02:57,605:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:13:49 UTC. 2025-01-31 21:02:57,605:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-31 21:02:57,606:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 21:02:57,614:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-31 21:02:57,615:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-31 21:02:57,615:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-31 21:02:57,621:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-31 21:02:57,623:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-31 21:02:57,626:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-31 21:02:58,087:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-31 21:02:58,087:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:02:16 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "LAxEnuCR1rU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-31 21:02:58,088:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-31 21:03:07,497:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9013_key-certbot.pem 2025-01-31 21:03:16,837:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9011_csr-certbot.pem 2025-01-31 21:03:16,837:DEBUG:acme.client:Requesting fresh nonce 2025-01-31 21:03:16,837:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-31 21:03:16,990:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-31 21:03:16,992:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:02:35 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UvlUZ57PqmvFshHuF-c-UXeIDlWGTLco1xtX2bpcHuVdGLJhFP0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-31 21:03:16,992:DEBUG:acme.client:Storing nonce: UvlUZ57PqmvFshHuF-c-UXeIDlWGTLco1xtX2bpcHuVdGLJhFP0 2025-01-31 21:03:16,993:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2025-01-31 21:03:17,000:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVXZsVVo1N1BxbXZGc2hIdUYtYy1VWGVJRGxXR1RMY28xeHRYMmJwY0h1VmRHTEpoRlAwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "a2HdyxVmGxsrkr0uCpHHwbjj_HwRHy99ez0o_Lx4l9i1JWVMOqnTQUdeBbaShk33ZlfD__vSyX01vSjEK1I9exGtneIslHSChz0THAuZyfP8jcTlxRhQZgY0nYMds88n9i-XbAdeswIZvDInqmCY9oiLIgk393p2aJ81HGqqe9rVvdzdOOz3iSfyrkZ4hi146vmB1LWtCiq7bQBiAEMbPIkERZJRMt_Fuj5ega5m6HzJQNbgXXoiFraC4Hm2e8IiRL29c9UXclHoN8S7PgF6gMNmgP8XqXFSkkulY4OMtlOJCCA5IjOdP66dcCWIyAMtn46grgf_Pq6ZH3zQVQwPFg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-31 21:03:17,215:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-31 21:03:17,216:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 31 Jan 2025 20:02:35 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603648845 Replay-Nonce: UvlUZ57PyiqDY3yMoR2cE7PKLd2TGFFNDb1m6pFhxOtzAzUoPOA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:15:56Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613419375" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603648845" } 2025-01-31 21:03:17,216:DEBUG:acme.client:Storing nonce: UvlUZ57PyiqDY3yMoR2cE7PKLd2TGFFNDb1m6pFhxOtzAzUoPOA 2025-01-31 21:03:17,217:DEBUG:acme.client:JWS payload: b'' 2025-01-31 21:03:17,224:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613419375: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVXZsVVo1N1B5aXFEWTN5TW9SMmNFN1BLTGQyVEdGRk5EYjFtNnBGaHhPdHpBelVvUE9BIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM0MTkzNzUifQ", "signature": "lwpvIUF_P-22vobvMelrmj5I5ejOV6uWO7Pq2WxgOsd-E_7pSEPq0pmc9KbwRjC-U57srpIOdQ7VLhidIL8u02YyAE9idu3ejwwkBy8TjrtFpRQ8CTnd4AFkoMkCzMDwkCBx4-prnC2nObENfeW8effXVltZ-HKytRQqoiN5cnhJwc5lIjh32hAcnvp38D02K8zsFEXl5JEja1FqOM9MQmLYAnoLtU5o_oTYGM0SIwH-ngc6hZ8Y5JfMI508TOnhnTPSoE0Y00f4NOhSj3CnzLBbEmGwkv-1stjpOs-YAsRV8eSNiTS8momzKh7rOKmmJRxyl57mPYm4AMYI7PN6Bg", "payload": "" } 2025-01-31 21:03:17,389:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613419375 HTTP/1.1" 200 823 2025-01-31 21:03:17,390:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:02:36 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6X57LC_zDDVm2UwCv6tTCmOLVWBu24ZQbxNXUJqve0LQU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:15:56Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613419375/bahWuQ", "status": "pending", "token": "9EnXT6FT7rznT8ngp10HxQzCcXcgDHNCsRx5DOBACns" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613419375/yJLmdw", "status": "pending", "token": "9EnXT6FT7rznT8ngp10HxQzCcXcgDHNCsRx5DOBACns" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613419375/T3sOUw", "status": "pending", "token": "9EnXT6FT7rznT8ngp10HxQzCcXcgDHNCsRx5DOBACns" } ] } 2025-01-31 21:03:17,390:DEBUG:acme.client:Storing nonce: TUC11O6X57LC_zDDVm2UwCv6tTCmOLVWBu24ZQbxNXUJqve0LQU 2025-01-31 21:03:17,391:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-31 21:03:17,391:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2025-01-31 21:03:17,392:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-31 21:03:17,393:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-31 21:03:17,402:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 21:03:17,403:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-31 21:03:17,403:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-31 21:03:17,403:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-31 21:03:17,419:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 21:03:17,477:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-31 21:03:17,670:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 21:03:17,670:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2025-01-31 21:03:17,672:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2025-01-31 21:03:17,676:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:20 UTC. 2025-01-31 21:03:17,676:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-31 21:03:17,677:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 21:03:17,682:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-31 21:03:17,682:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-31 21:03:17,682:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-31 21:03:17,698:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-31 21:03:17,699:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-31 21:03:17,701:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-31 21:03:18,135:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-31 21:03:18,136:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:02:36 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Emd-d_I3MEg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-31 21:03:18,137:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-31 21:03:26,036:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9014_key-certbot.pem 2025-01-31 21:03:33,421:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9012_csr-certbot.pem 2025-01-31 21:03:33,422:DEBUG:acme.client:Requesting fresh nonce 2025-01-31 21:03:33,422:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-31 21:03:33,569:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-31 21:03:33,569:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:02:52 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6Xc57NRR-_HoaeSsGbxAnggxg5cwZ3FAi0vyObCpH98CA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-31 21:03:33,569:DEBUG:acme.client:Storing nonce: TUC11O6Xc57NRR-_HoaeSsGbxAnggxg5cwZ3FAi0vyObCpH98CA 2025-01-31 21:03:33,569:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2025-01-31 21:03:33,577:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhjNTdOUlItX0hvYWVTc0dieEFuZ2d4ZzVjd1ozRkFpMHZ5T2JDcEg5OENBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "m3EJrl12RxRtpVewzZi5awnh7AxVbvPAnn6Flh3PBwTWPNAcBlWXsVM9L5BY7aFcDiFMUn3cgStZa8Fp40-xREzBT6NSF8siA4u5X7OjZicw2RB-TdKTxY9rYGUWOvD8EazE76kQqLZQlzZc0LDa81KCFhiOlQ3xJP-tNnB5mIWlaZO3HWPi59rbgfbMUf6dXaZEekq9Fk0r3FRuaYvphM6qfZUT0Sk1Eo1cZCI6KvalwbxcW1DCnWKH2z6q_xKFv1uLPSQVqvIlv-XOO5xVeACETvrki9dmAGTbkcBm1Jpp5ZSiZ_kgEHde7rsZ4vHrmJsaMahctu7y_EyiopgZRw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-01-31 21:03:33,772:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2025-01-31 21:03:33,774:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 31 Jan 2025 20:02:52 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603700365 Replay-Nonce: UvlUZ57PVRfjn3wCLDrmSingslG2reLzpGjIV6mqLLEziJrk7u0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:16:10Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613495675" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603700365" } 2025-01-31 21:03:33,774:DEBUG:acme.client:Storing nonce: UvlUZ57PVRfjn3wCLDrmSingslG2reLzpGjIV6mqLLEziJrk7u0 2025-01-31 21:03:33,775:DEBUG:acme.client:JWS payload: b'' 2025-01-31 21:03:33,785:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613495675: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVXZsVVo1N1BWUmZqbjN3Q0xEcm1TaW5nc2xHMnJlTHpwR2pJVjZtcUxMRXppSnJrN3UwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM0OTU2NzUifQ", "signature": "RO4xd9-SpQ9xhLY3Yc9ABHcyN884m5eOLNBtGcJc5BXIjb1TQCDYErszMsUzn-ZjYzmEOl68y3C4JuHIx0b7pefBAkShtVj19LqBpfes4YgV_DGOfKDYF130fWhjU5Chy5RJGZ8MElcPYBAufyxCiHJ0AgzlPLSzkdS8-tnSPR5Ralk7JaG5u7dJUj3NUvK67nXLHeIvEYuBz21ktZiEfTUrVow4bU-volCzB7zP7z9qw4Jq73vKu8FKyvytfNhVdDLbt23vTa3D1rHpjw-_kOdC9uS-NjGRzdJXSNhxQVfSkVZEAmC1VRQFZuuDYUqjp5L3zJztT0M4Y5vJGGknFQ", "payload": "" } 2025-01-31 21:03:33,936:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613495675 HTTP/1.1" 200 827 2025-01-31 21:03:33,937:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:02:52 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6XLI8nhNiXVE25bnaRPzlGpCFGpoqfkXBlB97uaRRl2V4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:16:10Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613495675/OR7sGQ", "status": "pending", "token": "-N4wWQFOkzSF8ZGn4EebknObkGtUQ-conbTGk8O9Reo" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613495675/DpTZMg", "status": "pending", "token": "-N4wWQFOkzSF8ZGn4EebknObkGtUQ-conbTGk8O9Reo" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613495675/TKifNg", "status": "pending", "token": "-N4wWQFOkzSF8ZGn4EebknObkGtUQ-conbTGk8O9Reo" } ] } 2025-01-31 21:03:33,938:DEBUG:acme.client:Storing nonce: TUC11O6XLI8nhNiXVE25bnaRPzlGpCFGpoqfkXBlB97uaRRl2V4 2025-01-31 21:03:33,939:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-31 21:03:33,939:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2025-01-31 21:03:33,940:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-31 21:03:33,940:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-31 21:03:33,941:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 21:03:33,942:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-31 21:03:33,942:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-31 21:03:33,944:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-31 21:03:33,946:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 21:03:34,021:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-31 21:03:34,228:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 21:03:34,230:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is signed by the certificate's issuer. 2025-01-31 21:03:34,232:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is: OCSPCertStatus.GOOD 2025-01-31 21:03:34,238:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:51 UTC. 2025-01-31 21:03:34,238:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-31 21:03:34,239:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 21:03:34,247:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-31 21:03:34,248:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-31 21:03:34,248:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-31 21:03:34,255:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-31 21:03:34,256:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-31 21:03:34,259:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-31 21:03:34,742:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-31 21:03:34,743:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:02:53 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "5zQPtBRn0lg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-31 21:03:34,743:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-31 21:03:42,255:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9015_key-certbot.pem 2025-01-31 21:03:49,336:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9013_csr-certbot.pem 2025-01-31 21:03:49,336:DEBUG:acme.client:Requesting fresh nonce 2025-01-31 21:03:49,337:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-31 21:03:49,497:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-31 21:03:49,498:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:03:08 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8iLDce-c5FkeOUzSKMqs4sMvBUa74o2wsuB9XQRWtuehU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-31 21:03:49,498:DEBUG:acme.client:Storing nonce: hXNDuA8iLDce-c5FkeOUzSKMqs4sMvBUa74o2wsuB9XQRWtuehU 2025-01-31 21:03:49,498:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2025-01-31 21:03:49,505:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGlMRGNlLWM1RmtlT1V6U0tNcXM0c012QlVhNzRvMndzdUI5WFFSV3R1ZWhVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "hNmvrYTE7KUBtol4R7_o8pOiZZP3uMFfBG1gxLNOMIzhD09RPBgRyHtigl6NPdbyPSQSmSsQDxrOQgt1RPcUvpdWgRJ1ep-kvNQ-Q4xZJrCegu10bVtB3Y26bTcRSUwjcBBfxg1Xr8jLPyDlcvgltyi_c7FlYcB_VEBjJhQw2iijJwadS4NnORPBAtpkjd4tHLHHAtW5kq6gltnSVw7UU2FpcKfwFGsD7JD5QjPm4rE-jhlSqTW-q4j4Lkzm4Kwd1o30KTD5VsdCQAlltd7HWEvj2nTZlHmg1JB2W-79KUzYCjGTvJRUeCxZKG-IWz9w18EZO8UBGBrokjIkg0Guxw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2025-01-31 21:03:49,699:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 353 2025-01-31 21:03:49,700:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 31 Jan 2025 20:03:08 GMT Content-Type: application/json Content-Length: 353 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603747715 Replay-Nonce: aTttXYyyUJPKlFzBeC5g5JCoTaHkvf6idsAjV_IWqdqLLX612QY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:16:23Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613569085" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603747715" } 2025-01-31 21:03:49,701:DEBUG:acme.client:Storing nonce: aTttXYyyUJPKlFzBeC5g5JCoTaHkvf6idsAjV_IWqdqLLX612QY 2025-01-31 21:03:49,701:DEBUG:acme.client:JWS payload: b'' 2025-01-31 21:03:49,710:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613569085: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXlVSlBLbEZ6QmVDNWc1SkNvVGFIa3ZmNmlkc0FqVl9JV3FkcUxMWDYxMlFZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM1NjkwODUifQ", "signature": "HBfvWK3RURn7yDW0fOFU1vF1gpiXoaOtZxAtNlHATc3flOZlbevmyG_4yykMe5ZepwNazowsrsLHMcuhs9Zjh53Tr8P0OFoxqyWuzrHyKcOekZfu-d0ewxGszrcqti_T-xZZH9CyY9XHhlP7kpyZCDa9LD08BTswPVn15rpCH1SY3ZqvIGOAqdH2ara9iASZFzPdK9QpWEtVA2P9hKGjfmigZpsnSILKU4PTrckehjtsqYRGUrtATSJTycwJ1_ww2nAMOJdteHAyX0YqUISVP7pSvt2xBt8EJdHtw0JL-1bpNXTGgcmlqYIz63VrRqVSsUf6vcxbSeJ2qsYgDKkpLA", "payload": "" } 2025-01-31 21:03:49,878:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613569085 HTTP/1.1" 200 825 2025-01-31 21:03:49,881:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:03:08 GMT Content-Type: application/json Content-Length: 825 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aTttXYyyhLHGPrrElgnGycw2cQ8NAMwA7UJbhd-zcWEOBn65cmc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:16:23Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613569085/i556TQ", "status": "pending", "token": "voycDLD6WaIuZqIiZii35bQ8xrl32oR994HNkskXaVM" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613569085/_lVOeQ", "status": "pending", "token": "voycDLD6WaIuZqIiZii35bQ8xrl32oR994HNkskXaVM" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613569085/67S_cA", "status": "pending", "token": "voycDLD6WaIuZqIiZii35bQ8xrl32oR994HNkskXaVM" } ] } 2025-01-31 21:03:49,882:DEBUG:acme.client:Storing nonce: aTttXYyyhLHGPrrElgnGycw2cQ8NAMwA7UJbhd-zcWEOBn65cmc 2025-01-31 21:03:49,882:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-31 21:03:49,883:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2025-01-31 21:03:49,884:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-31 21:03:49,884:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-31 21:03:49,885:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 21:03:49,886:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-31 21:03:49,886:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-31 21:03:49,886:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-31 21:03:49,887:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 21:03:49,946:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-31 21:03:50,137:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 21:03:50,139:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-31 21:03:50,140:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-31 21:03:50,148:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:13 UTC. 2025-01-31 21:03:50,148:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-31 21:03:50,149:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 21:03:50,155:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-31 21:03:50,155:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-31 21:03:50,155:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-31 21:03:50,162:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-31 21:03:50,163:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-31 21:03:50,167:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-31 21:03:50,650:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-31 21:03:50,652:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:03:09 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "-bogT0IFwGE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-31 21:03:50,652:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-31 21:04:00,527:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9016_key-certbot.pem 2025-01-31 21:04:14,391:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9014_csr-certbot.pem 2025-01-31 21:04:14,393:DEBUG:acme.client:Requesting fresh nonce 2025-01-31 21:04:14,394:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-31 21:04:14,564:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-31 21:04:14,565:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:03:33 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aTttXYyyHIXyatjDJY5Et2G2zy7_gVcrWP6bHVQwc1EV_JLXv3s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-31 21:04:14,566:DEBUG:acme.client:Storing nonce: aTttXYyyHIXyatjDJY5Et2G2zy7_gVcrWP6bHVQwc1EV_JLXv3s 2025-01-31 21:04:14,566:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2025-01-31 21:04:14,577:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXlISVh5YXRqREpZNUV0Mkcyenk3X2dWY3JXUDZiSFZRd2MxRVZfSkxYdjNzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "jdw8apEg_psabVwDYvCzpuDOLKrx2cbKc1cdgQyUfEByGJRNVOtGHVhjW2BQF5F5-O4B8-rj5tZhU1mhYTr_qAJrmWodpZlKKhX9xNdCULKhivgIMU0275RYCZlOWHhfdyJnfGECxJB13pEDSvHQbN9zDggn0W4w5IGnYU-JnPSE_ZMt1-vr0ZbSmfS4GTzKgJ2E4BVCPrGfJ4MsD6nS7o57JRaHbn0_w7rkzYjJmd3TXR4mJQZNjVzf6jV9MDFBFZLO_g0vw9PO4K0WoGVlp-8Uixa8yh4v5KN6mpwx7O3ZBQI6pC9St7didJX_dva6TYC1mldR9U0CYIhgd89mdQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-01-31 21:04:14,782:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 352 2025-01-31 21:04:14,783:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 31 Jan 2025 20:03:33 GMT Content-Type: application/json Content-Length: 352 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603792325 Replay-Nonce: hXNDuA8iPxEay_nbQwN1ZuC8akP7W5tLVH5GYl1hfKVpZVEOu_4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:16:37Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613637565" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603792325" } 2025-01-31 21:04:14,783:DEBUG:acme.client:Storing nonce: hXNDuA8iPxEay_nbQwN1ZuC8akP7W5tLVH5GYl1hfKVpZVEOu_4 2025-01-31 21:04:14,783:DEBUG:acme.client:JWS payload: b'' 2025-01-31 21:04:14,792:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613637565: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGlQeEVheV9uYlF3TjFadUM4YWtQN1c1dExWSDVHWWwxaGZLVnBaVkVPdV80IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM2Mzc1NjUifQ", "signature": "wHLjLEfyYS2NWQ_hcGOlCUDpatvxsFjXbUYT2jyIT8QiqPVKeYJVrhSl_Eim5cGnVJFkLSXe1SGR5ar5o1Hsp-FvmBj7DedKJhqzPAZe6wZVQBvgd2KjSHDlDlgK0xjvgrjjZBIkzj2_sxGD_fzht18iSs8F3YTbPV8SfmQ8zpJKX_7T6jxCnZ1Z_AfilCQgp6RzhGx7nQB0DJ1CHOUT1XBhJTipRmjEaxxWHqs9WM26TbJTK_eXmEhbVmZUrm_UJJ0qLtQPwojvhSltrY-_CNayzEsmVnvczFBodnBsCh-Fo757WRbHatezqWnMt1vKZ8lcCdYtamHFhUFZpxvwew", "payload": "" } 2025-01-31 21:04:14,964:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613637565 HTTP/1.1" 200 824 2025-01-31 21:04:14,964:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:03:33 GMT Content-Type: application/json Content-Length: 824 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8ikWEc1ZXLRurbSJfvaaZAqNRlHJAVTDPRYaVUyGfl_Hw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:16:37Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613637565/_4E6Mg", "status": "pending", "token": "koSUgsC_SD5VGbDQ3X2SLH_w9qYfJ8H3V8YT4kweWIk" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613637565/5bZpJA", "status": "pending", "token": "koSUgsC_SD5VGbDQ3X2SLH_w9qYfJ8H3V8YT4kweWIk" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613637565/HkAMUw", "status": "pending", "token": "koSUgsC_SD5VGbDQ3X2SLH_w9qYfJ8H3V8YT4kweWIk" } ] } 2025-01-31 21:04:14,965:DEBUG:acme.client:Storing nonce: hXNDuA8ikWEc1ZXLRurbSJfvaaZAqNRlHJAVTDPRYaVUyGfl_Hw 2025-01-31 21:04:14,968:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-31 21:04:14,968:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2025-01-31 21:04:14,969:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-31 21:04:14,970:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-31 21:04:14,970:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 21:04:14,970:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-31 21:04:14,970:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-31 21:04:14,972:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-31 21:04:14,974:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 21:04:15,036:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2025-01-31 21:04:15,036:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-31 21:04:15,037:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2025-01-31 21:04:15,057:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2025-01-31 21:04:15,067:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2025-01-31 21:04:15,067:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2025-01-31 21:04:15,067:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2025-01-31 21:04:15,068:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2025-01-31 21:04:15,085:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2025-01-31 21:04:15,190:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-31 21:04:15,380:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 21:04:15,382:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-31 21:04:15,384:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-31 21:04:15,392:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:35 UTC. 2025-01-31 21:04:15,392:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-31 21:04:15,393:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 21:04:15,401:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-31 21:04:15,401:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-31 21:04:15,402:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-31 21:04:15,422:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-31 21:04:15,423:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-31 21:04:15,426:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-31 21:04:15,864:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-31 21:04:15,865:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:03:34 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "liuh3p3Rs3k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-31 21:04:15,866:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-31 21:04:37,876:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9017_key-certbot.pem 2025-01-31 21:04:48,669:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9015_csr-certbot.pem 2025-01-31 21:04:48,670:DEBUG:acme.client:Requesting fresh nonce 2025-01-31 21:04:48,670:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-31 21:04:48,816:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-31 21:04:48,817:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:04:07 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UvlUZ57PG9x2asFJ40L9uvUsq2IO5hpFJ04uq3olC4s6Mv03-oo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-31 21:04:48,817:DEBUG:acme.client:Storing nonce: UvlUZ57PG9x2asFJ40L9uvUsq2IO5hpFJ04uq3olC4s6Mv03-oo 2025-01-31 21:04:48,817:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2025-01-31 21:04:48,823:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVXZsVVo1N1BHOXgyYXNGSjQwTDl1dlVzcTJJTzVocEZKMDR1cTNvbEM0czZNdjAzLW9vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "EzAHB2nqlmkD6j-ysDiEVXZWkFkDxkhS--B3pIoMMCGp9rbxn1SOCY2iNySyK33CZXLJpA7c5_L4peTc93DbMiG-RZTdTLXZoMw3LN6PYeP_twdkT1iXhtL4ai93y6G7UEwevapRkD3z59J2JMu5K2SXUWLq-nU6__hAsm6XoxFohQ3mg42RmitJw8nezksfr4IufblgQNOwPKVais8I2UOMulsVdl5TkoESl5C1r1GsjUZPwYKQcuHJjh9NhEANwXbsRUxlUjvRicIrvEhrfrEXIhVQm0YOgS_EVnCd9ecoEq5QbwOvWU_H3WngOaVqSACmTvJUr_TuxIgG9w6XEg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-31 21:04:49,007:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 357 2025-01-31 21:04:49,008:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 31 Jan 2025 20:04:07 GMT Content-Type: application/json Content-Length: 357 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603833745 Replay-Nonce: TUC11O6XjrKxhT1Aqt6jCRY3KbeCMjcnXneENEV7ZfuuJAggzCg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:16:51Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613700475" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603833745" } 2025-01-31 21:04:49,008:DEBUG:acme.client:Storing nonce: TUC11O6XjrKxhT1Aqt6jCRY3KbeCMjcnXneENEV7ZfuuJAggzCg 2025-01-31 21:04:49,008:DEBUG:acme.client:JWS payload: b'' 2025-01-31 21:04:49,015:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613700475: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhqckt4aFQxQXF0NmpDUlkzS2JlQ01qY25YbmVFTkVWN1pmdXVKQWdnekNnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM3MDA0NzUifQ", "signature": "H26WwZ3H0jzoGcvnQxdzmBfFvZ5h0Vq_GAMgLUipJNwdOKKMp6BQl36rzodRuqOaGPyiC8afpN8d0Hu2hB_7RSmMViVAOCcbxWqwXQ-abZkG_dL3gIdC9xWBDD-sPjmntlt9wTpJX8BRJ_xNqGHNHyl5S9cPVN8hfTYAlQJ6WXxcgx3nuw7AMp5RlD2LGraLpXsL4HYIJ17LAZKLr7rOnmot3qdcih2gn5KMJGV-9hURisqJ02t46Nzz3d5PLpVT-4P5uXXvnb12NGjFSp8yEDvLgB7sh8_OlHjiq2tZRI7cLQuVNk2E8-d1ZKmsTC2XaHSX9DSM1dgZg78dHQ4LXg", "payload": "" } 2025-01-31 21:04:49,184:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613700475 HTTP/1.1" 200 829 2025-01-31 21:04:49,185:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:04:07 GMT Content-Type: application/json Content-Length: 829 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6XXgDskjQ2dPsEx9vJM5XWpsALs57oEtWqvKjpzioWZME X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:16:51Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613700475/4GWkdQ", "status": "pending", "token": "_3T_C3yuCWV4XSeLeRXCPycDIQnwxDGf-AyaPY9XlxE" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613700475/B2drkw", "status": "pending", "token": "_3T_C3yuCWV4XSeLeRXCPycDIQnwxDGf-AyaPY9XlxE" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613700475/jElvnA", "status": "pending", "token": "_3T_C3yuCWV4XSeLeRXCPycDIQnwxDGf-AyaPY9XlxE" } ] } 2025-01-31 21:04:49,185:DEBUG:acme.client:Storing nonce: TUC11O6XXgDskjQ2dPsEx9vJM5XWpsALs57oEtWqvKjpzioWZME 2025-01-31 21:04:49,186:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-31 21:04:49,186:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2025-01-31 21:04:49,187:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-31 21:04:49,188:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-31 21:04:49,189:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 21:04:49,189:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-31 21:04:49,189:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-31 21:04:49,190:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-31 21:04:49,191:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 21:04:49,241:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-31 21:04:49,429:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 21:04:49,430:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-31 21:04:49,432:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-31 21:04:49,438:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:05 UTC. 2025-01-31 21:04:49,438:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-31 21:04:49,439:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 21:04:49,445:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-31 21:04:49,445:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-31 21:04:49,446:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-31 21:04:49,453:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-31 21:04:49,454:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-31 21:04:49,457:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-31 21:04:49,942:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-31 21:04:49,943:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:04:08 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "539xvfmGjFM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-31 21:04:49,943:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-31 21:04:59,902:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9018_key-certbot.pem 2025-01-31 21:05:08,598:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9016_csr-certbot.pem 2025-01-31 21:05:08,598:DEBUG:acme.client:Requesting fresh nonce 2025-01-31 21:05:08,599:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-31 21:05:08,760:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-31 21:05:08,761:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:04:27 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8ihK9tzAX05MYOUVASIvaYq9jUChO1BZUA0bYxx5r6riw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-31 21:05:08,761:DEBUG:acme.client:Storing nonce: hXNDuA8ihK9tzAX05MYOUVASIvaYq9jUChO1BZUA0bYxx5r6riw 2025-01-31 21:05:08,761:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2025-01-31 21:05:08,769:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGloSzl0ekFYMDVNWU9VVkFTSXZhWXE5alVDaE8xQlpVQTBiWXh4NXI2cml3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ABcQD9Cww79434cLqtc_Wrp1fEfW_nv3C_NlSzdkycpeBbv2VFcyFv7n_ONZC3LIXdBp3uQPnG6-NlWGPeWt7ftk3EbwPHr9sqMsle4JNokh6A4-POjCR8SikJ0q8d5yLR1X8d0Jmhk0yesN5mqzaXs1ApdSIpZxsV0MW25wpsZDlnubVDzkPyudwEzxOT02YJngGJN2iOC7nYF5luEGs7d3xDezRWwv3CRzW4Q1MFh94JtdZifTfTWNCq7AVeVlgh8GJj9e9_SC-xG8UBRnkvaKeHM0ekyCuH6sJXvvCP9bmieXfDsQl7fdVzAjVeXDfs9vP0U2yesgeySFbyC9NQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2025-01-31 21:05:08,977:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356 2025-01-31 21:05:08,978:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 31 Jan 2025 20:04:27 GMT Content-Type: application/json Content-Length: 356 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603881465 Replay-Nonce: hXNDuA8iwVZlOmVZcurSH-axrEx10-lA-JrNHPKkZetM0Ht_iS4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:17:04Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613770605" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603881465" } 2025-01-31 21:05:08,979:DEBUG:acme.client:Storing nonce: hXNDuA8iwVZlOmVZcurSH-axrEx10-lA-JrNHPKkZetM0Ht_iS4 2025-01-31 21:05:08,979:DEBUG:acme.client:JWS payload: b'' 2025-01-31 21:05:08,987:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613770605: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGl3VlpsT21WWmN1clNILWF4ckV4MTAtbEEtSnJOSFBLa1pldE0wSHRfaVM0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM3NzA2MDUifQ", "signature": "SKQOIZwfXS_ggj2QSeubby1GlvCNemB9NUwhlXwst6J7ylxvcuSqhWF1qiOlUqlMAA7HiNPKlSy8QSkMBlr1LfrunnekZ9OLtE9MTM089haCleKdZV7n6GWixqwA9g0dhb5G9CriOB8L2-YINX5XZLZRMmwhwckvWmh0R2OmpWb1rr-rH26el7YFPIYoa-zEGBbkixLsWj2bXdhecwT7RwGwiUwp-wJpug0ZM1u7rOHs2paXs51fDGrsexvzKaX--1ikyp3rmGBKfZUpG7nSDtwFfxDsWM9_LuRSVlTfUpgBtmEjt4sDCr_gBAT0gK_GWNHCOJp7b35XdXJDmgw1fw", "payload": "" } 2025-01-31 21:05:09,162:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613770605 HTTP/1.1" 200 828 2025-01-31 21:05:09,162:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:04:27 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8ihZbHI8SIwND0HSutEx0jRth2SMbQtAgvxOXpEMGH-PE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:17:04Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613770605/9nrvYA", "status": "pending", "token": "a_L9ZYSN7UCXXgi8qZoJiOQo70GFjG_W81I9wg8pLws" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613770605/QBtWUw", "status": "pending", "token": "a_L9ZYSN7UCXXgi8qZoJiOQo70GFjG_W81I9wg8pLws" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613770605/F9o6HQ", "status": "pending", "token": "a_L9ZYSN7UCXXgi8qZoJiOQo70GFjG_W81I9wg8pLws" } ] } 2025-01-31 21:05:09,163:DEBUG:acme.client:Storing nonce: hXNDuA8ihZbHI8SIwND0HSutEx0jRth2SMbQtAgvxOXpEMGH-PE 2025-01-31 21:05:09,163:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-31 21:05:09,164:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2025-01-31 21:05:09,164:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-31 21:05:09,165:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-31 21:05:09,166:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 21:05:09,166:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-31 21:05:09,166:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-31 21:05:09,166:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-31 21:05:09,168:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 21:05:09,217:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-31 21:05:09,400:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 21:05:09,402:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2025-01-31 21:05:09,403:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2025-01-31 21:05:09,409:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:33 UTC. 2025-01-31 21:05:09,409:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-31 21:05:09,409:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 21:05:09,415:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-31 21:05:09,415:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-31 21:05:09,415:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-31 21:05:09,420:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-31 21:05:09,422:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-31 21:05:09,425:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-31 21:05:09,897:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-31 21:05:09,897:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:04:28 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "X_D_Pn_vqPk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-31 21:05:09,898:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-31 21:05:18,314:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9019_key-certbot.pem 2025-01-31 21:05:26,130:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9017_csr-certbot.pem 2025-01-31 21:05:26,131:DEBUG:acme.client:Requesting fresh nonce 2025-01-31 21:05:26,131:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-31 21:05:26,288:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-31 21:05:26,289:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:04:44 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8iGFzkwQWGvdqQ0_dQdx1GEbgoyvd80HrsStCIMi2MvDc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-31 21:05:26,289:DEBUG:acme.client:Storing nonce: hXNDuA8iGFzkwQWGvdqQ0_dQdx1GEbgoyvd80HrsStCIMi2MvDc 2025-01-31 21:05:26,289:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2025-01-31 21:05:26,296:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGlHRnprd1FXR3ZkcVEwX2RRZHgxR0ViZ295dmQ4MEhyc1N0Q0lNaTJNdkRjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "CXwBDGif2fy3OCT6-PNN9mSjVOOuKo1wj5rLZjdW45i1ZDyjouQmUuBgR5gQm1XHQpfeLQbo7c8rd-iQgEqhpqBgdmJqZB_VUzCWKqX0z6wD650L18SBnze6mTJAbJgQaNEAzJJkGvwV35MlNx0q6Xk2tMGigfAZX6le7ouGb8nV6H4kP2j-fg_7qCA15nB9uJbjFxGBvGdO3iJ2X_F47F_NhC5qojEd8dG4gBbsthHPMEbJak3V52fjKGC5WqOjlkxXVuCRBpSHgXoFgfnvgbyDa6swwCFdzud2ceXekNwbAMHrxhak-HjTeCLL6-S4bm5SYSbCfWGJY6qhJRg26Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-01-31 21:05:26,469:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2025-01-31 21:05:26,470:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 31 Jan 2025 20:04:45 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603934575 Replay-Nonce: hXNDuA8i3cJAPrMkQUSvju0nQicnocwySy1O8jPMxttPL8CRqq4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:17:18Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613854905" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603934575" } 2025-01-31 21:05:26,470:DEBUG:acme.client:Storing nonce: hXNDuA8i3cJAPrMkQUSvju0nQicnocwySy1O8jPMxttPL8CRqq4 2025-01-31 21:05:26,470:DEBUG:acme.client:JWS payload: b'' 2025-01-31 21:05:26,477:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613854905: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGkzY0pBUHJNa1FVU3ZqdTBuUWljbm9jd3lTeTFPOGpQTXh0dFBMOENScXE0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM4NTQ5MDUifQ", "signature": "kIFAZCAUyDqaUJT8hV_aILcTk3Di7b_gXEQcINMltQBE07BylsKt7di_u4iRMjAoeSzmbqUw-qJSfJ5kVsuLOwLVjCvWZud7LEYyKC-mV360cNyuJxVo2qDgoEIy82CmHtX2LVRJrPvIIQTwicfAiA4ILjdTTc63Y75jpGimX0Xw2L2yRl_zBxqA_QmSut6Dyoh-11bLtlGzJM3UItcXw1FX3zEbPRYHdBHQ2N8W23FPGD5LA8wxkhsiH9gpEcmJGxzpJe0NNUfbyvV_9UH4O2YXzLdM6napHOasl0opqUQS9KqWdQGoaGgGn1YrB7TzhlcncC6dLuISbOaFH0zqVw", "payload": "" } 2025-01-31 21:05:26,640:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613854905 HTTP/1.1" 200 827 2025-01-31 21:05:26,641:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:04:45 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aTttXYyyuxRvG8WCuNbXO2aLM48hp5KpaOHBQEMX7f-MWa2a9Z8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:17:18Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613854905/bMnPCg", "status": "pending", "token": "IK7vYZaRda0VTDtKKQsecohpYPhsEngjBQ1X3SBv7HQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613854905/7RtzaQ", "status": "pending", "token": "IK7vYZaRda0VTDtKKQsecohpYPhsEngjBQ1X3SBv7HQ" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613854905/ke1eMQ", "status": "pending", "token": "IK7vYZaRda0VTDtKKQsecohpYPhsEngjBQ1X3SBv7HQ" } ] } 2025-01-31 21:05:26,641:DEBUG:acme.client:Storing nonce: aTttXYyyuxRvG8WCuNbXO2aLM48hp5KpaOHBQEMX7f-MWa2a9Z8 2025-01-31 21:05:26,642:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-31 21:05:26,642:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2025-01-31 21:05:26,643:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-31 21:05:26,643:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-31 21:05:26,644:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 21:05:26,644:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-31 21:05:26,644:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-31 21:05:26,645:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-31 21:05:26,646:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 21:05:26,694:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-31 21:05:26,888:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 21:05:26,890:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2025-01-31 21:05:26,891:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2025-01-31 21:05:26,896:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:54 UTC. 2025-01-31 21:05:26,896:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-31 21:05:26,897:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 21:05:26,902:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-31 21:05:26,903:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-31 21:05:26,903:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-31 21:05:26,916:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-31 21:05:26,918:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-31 21:05:26,921:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-31 21:05:27,388:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-31 21:05:27,389:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:04:46 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "fgLqGJJWDwY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-31 21:05:27,390:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-31 21:05:35,198:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9020_key-certbot.pem 2025-01-31 21:05:42,681:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9018_csr-certbot.pem 2025-01-31 21:05:42,682:DEBUG:acme.client:Requesting fresh nonce 2025-01-31 21:05:42,682:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-31 21:05:42,839:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-31 21:05:42,839:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:05:01 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aTttXYyyY5XqxYEXp9zYpG8P1qgK5Yh7C9EddnUrj4A3POwYD-M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-31 21:05:42,840:DEBUG:acme.client:Storing nonce: aTttXYyyY5XqxYEXp9zYpG8P1qgK5Yh7C9EddnUrj4A3POwYD-M 2025-01-31 21:05:42,840:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2025-01-31 21:05:42,847:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXlZNVhxeFlFWHA5ellwRzhQMXFnSzVZaDdDOUVkZG5Vcmo0QTNQT3dZRC1NIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "igNIji69pXBfYTzUa5tUqyEci7CifaXke_P480fWQGf30CmTibKY1-VwtqNNN5EqK8TpZo6mWum4Ol7as5bbtYOIW8CjLtlAoI3_8nqTaL-ysLD6wIiFgoBJvGPD7Fhwj7D_UpOjlGTD590lBZnoxnaZ36OT6zaeglFHiqpNMurBtO8ujuN6az0f5KpY5pq0jcoXpxRSz830hHV8VsQhplaDn7sotBrEQ-xzNR1mrcMd5lkmVq6GcW099hQIxG_yYlnZyrTvSWDZLHiP6RJ-1QskIOFe3BvDPshi7rCFC_jZJr2xynZX5SkG7v2nO4XywGEwVSiVW2HupvpXrZsJag", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-31 21:05:43,026:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-31 21:05:43,026:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 31 Jan 2025 20:05:01 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603978585 Replay-Nonce: aTttXYyyNgxxPGpPkIlRuERKBDe0G6vjwESZhzbqPsA6IAVdLiE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:17:32Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613923815" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603978585" } 2025-01-31 21:05:43,027:DEBUG:acme.client:Storing nonce: aTttXYyyNgxxPGpPkIlRuERKBDe0G6vjwESZhzbqPsA6IAVdLiE 2025-01-31 21:05:43,027:DEBUG:acme.client:JWS payload: b'' 2025-01-31 21:05:43,033:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613923815: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXlOZ3h4UEdwUGtJbFJ1RVJLQkRlMEc2dmp3RVNaaHpicVBzQTZJQVZkTGlFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM5MjM4MTUifQ", "signature": "EetI6sIo-LO91Gy3hj8VQsfhvzrLNC2gnWnCpa0wag4wIvRQfft4AnK23CuKjhyraWjuhy1C8THx1e8sGjEQcMN0_oluUwp0dFzpJYsWJYaUr9gqNAEwNr07eQ-10zHV6eIiqVbrk7UuqLBJbQD45wj5QGwlfKHSfuQxbe_JVDXijvIMdvPpll4YIPLrjCAdaiEAOTibd6jqMBJvhrtQqOmQbB5E8sB7O35pmxM-n1t8pvEWo_WRABOa7D5fxwKpMMMwAgKUGywdNZs5jZ5vxhzHuEkvEK93FB24w83fOIVNEGJHapP0g8nDMUws7LS1g-FbH50U8l-RDCWCUm_Xig", "payload": "" } 2025-01-31 21:05:43,202:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613923815 HTTP/1.1" 200 823 2025-01-31 21:05:43,203:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:05:01 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aTttXYyyTO8h0609sEMtykugg7mZObTPWwOWbauuui7trZQwc9Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:17:32Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613923815/wNRiHQ", "status": "pending", "token": "m7yyxIJSFIemVfF7rkix7A6ntmc25SA7QMkT0Knl1qI" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613923815/wvLngQ", "status": "pending", "token": "m7yyxIJSFIemVfF7rkix7A6ntmc25SA7QMkT0Knl1qI" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613923815/t9VvUw", "status": "pending", "token": "m7yyxIJSFIemVfF7rkix7A6ntmc25SA7QMkT0Knl1qI" } ] } 2025-01-31 21:05:43,203:DEBUG:acme.client:Storing nonce: aTttXYyyTO8h0609sEMtykugg7mZObTPWwOWbauuui7trZQwc9Y 2025-01-31 21:05:43,204:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-31 21:05:43,204:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2025-01-31 21:05:43,205:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-31 21:05:43,205:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-31 21:05:43,206:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 21:05:43,206:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-31 21:05:43,206:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-31 21:05:43,207:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-31 21:05:43,209:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 21:05:43,270:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-31 21:05:43,459:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 21:05:43,460:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-31 21:05:43,461:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-31 21:05:43,466:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:15 UTC. 2025-01-31 21:05:43,466:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-31 21:05:43,467:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 21:05:43,472:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-31 21:05:43,472:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-31 21:05:43,472:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-31 21:05:43,479:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-31 21:05:43,480:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-31 21:05:43,482:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-31 21:05:43,958:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-31 21:05:43,959:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:05:02 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "w7zF5iV5R5Q": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2025-01-31 21:05:43,959:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-31 21:05:51,842:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9021_key-certbot.pem 2025-01-31 21:05:59,771:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9019_csr-certbot.pem 2025-01-31 21:05:59,771:DEBUG:acme.client:Requesting fresh nonce 2025-01-31 21:05:59,772:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-31 21:05:59,929:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-31 21:05:59,930:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:05:18 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aTttXYyyR3QsHG5b_cZCwwkfM5FwbBDqPjG_HTa_uPTlaVvqSzY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-31 21:05:59,930:DEBUG:acme.client:Storing nonce: aTttXYyyR3QsHG5b_cZCwwkfM5FwbBDqPjG_HTa_uPTlaVvqSzY 2025-01-31 21:05:59,930:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2025-01-31 21:05:59,938:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXlSM1FzSEc1Yl9jWkN3d2tmTTVGd2JCRHFQakdfSFRhX3VQVGxhVnZxU3pZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "NhwyPBe4AYnKWEotL0V0PPqNYCCV3Y4Ku0opIPKxMOSfmCUKtg325ef0H3iijEvRL132_hSDBWPmO6MZpuCuo1PqHuhB_pwMENR6oOK7OUbt2d7fRGNbXOE2nr9LGsceqGeLtwKWxZlZWZ7EUShhYmQiPdh3WdxH5jpPWxpmtzgHc5Vie2ZFadOOWGYaaBx4zO43rSP1OG1Rdy0OPGZH7c6Dp_FAexOBGZVuQRRYrJMDaqYcctovorZebZKcSbmrVVxJ_C-7eMMmLE3kY6dSw_qnQF98AbBfWJdvt3wBR5YZr049sCS0-rtGeRdl3cp0ThsOHao1BHyAHGn10lrCng", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-31 21:06:00,125:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-31 21:06:00,126:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 31 Jan 2025 20:05:18 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349604024205 Replay-Nonce: aTttXYyyos2G3kEr9Y2wF90Qs2exh3hhHDpV3eKHeq8v0ovGs_I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:17:46Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613992955" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349604024205" } 2025-01-31 21:06:00,126:DEBUG:acme.client:Storing nonce: aTttXYyyos2G3kEr9Y2wF90Qs2exh3hhHDpV3eKHeq8v0ovGs_I 2025-01-31 21:06:00,127:DEBUG:acme.client:JWS payload: b'' 2025-01-31 21:06:00,134:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613992955: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXlvczJHM2tFcjlZMndGOTBRczJleGgzaGhIRHBWM2VLSGVxOHYwb3ZHc19JIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM5OTI5NTUifQ", "signature": "qrwrZs5LOPtm_GnoS6X_2cq-upLUVnH84chfwbWFg4YSy5p54CgIy9Lriz9eouL5qgz4o2uJtuj0z6Na8ylipljRaptMz_CJAQtalp1BloRGBTSU1IWAeyJfCaj3qs7rJDkGiGWK9bxfRnfPZKCPO0fsZ0y4VIJJ_oRJCF6b8zE5FNU2OusK47_8Y_98PRhVXI3QFng6i-Z-vvrIEFXj_OrVRG9csla5gOHko_29IqplEBFoRKyQ13HQT7psswMU1QzMj5sQwiDZ3mrXsbsSw-EFzq6tPBwmki1EhQ7CReLlxa6cp2fRTwvGjwEqNjtBW16XmoniEqtt-lHAl1EASA", "payload": "" } 2025-01-31 21:06:00,298:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613992955 HTTP/1.1" 200 823 2025-01-31 21:06:00,298:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:05:19 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aTttXYyymdjCtTKvFfkbYxrKpFKjy3Vf00MZmN6kPOVcDGTeSyA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:17:46Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613992955/G_4bSw", "status": "pending", "token": "6MJOC_tlqp2eo7XHm1FAxeHMF3eocZ9KkmW5bas3nAw" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613992955/Sy2Pkg", "status": "pending", "token": "6MJOC_tlqp2eo7XHm1FAxeHMF3eocZ9KkmW5bas3nAw" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613992955/xSdP2A", "status": "pending", "token": "6MJOC_tlqp2eo7XHm1FAxeHMF3eocZ9KkmW5bas3nAw" } ] } 2025-01-31 21:06:00,299:DEBUG:acme.client:Storing nonce: aTttXYyymdjCtTKvFfkbYxrKpFKjy3Vf00MZmN6kPOVcDGTeSyA 2025-01-31 21:06:00,299:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-31 21:06:00,300:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2025-01-31 21:06:00,301:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-31 21:06:00,301:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-31 21:06:00,302:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 21:06:00,302:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-31 21:06:00,302:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-31 21:06:00,303:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-31 21:06:00,304:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 21:06:00,377:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-31 21:06:00,565:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 21:06:00,567:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2025-01-31 21:06:00,568:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2025-01-31 21:06:00,574:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:38 UTC. 2025-01-31 21:06:00,575:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-31 21:06:00,575:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 21:06:00,581:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-31 21:06:00,581:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-31 21:06:00,581:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-31 21:06:00,596:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-31 21:06:00,597:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-31 21:06:00,599:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-31 21:06:01,054:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-31 21:06:01,055:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:05:19 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "W_WSwnzZKXg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-31 21:06:01,055:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-31 21:06:08,562:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9022_key-certbot.pem 2025-01-31 21:06:15,285:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9020_csr-certbot.pem 2025-01-31 21:06:15,286:DEBUG:acme.client:Requesting fresh nonce 2025-01-31 21:06:15,286:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-31 21:06:15,438:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-31 21:06:15,439:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:05:34 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UvlUZ57PjO-vT-OttPDqtgOZBETK3hE1Y0dtF8ko3FMD5SFQAUg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-31 21:06:15,440:DEBUG:acme.client:Storing nonce: UvlUZ57PjO-vT-OttPDqtgOZBETK3hE1Y0dtF8ko3FMD5SFQAUg 2025-01-31 21:06:15,440:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2025-01-31 21:06:15,448:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVXZsVVo1N1BqTy12VC1PdHRQRHF0Z09aQkVUSzNoRTFZMGR0RjhrbzNGTUQ1U0ZRQVVnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "pEOfj_z11ibqNP7_7v4a8lWg_njeyxoOJKzy78bXtDeF4tTLwhtwFnPE3lvGRP7EGOWS1MTdcx-cEm2Xqy2rlT-vxL4jT5_Vplme6vfgNMTeuLX9tfjez9TMFCIw2oAIkGccXjmTHbyBxEYp5Y6SqTMTpuYhRRQ6COMNRTvEtdEgvRoc6GNv0wf2O2mJe3BDI7UOkKuZvwiMRm0wFSqlNdGby2Z7r5sM_jsIq3CFmU29BGPzEm38y7eexyfhnVLRV149xPyzUgefY04E-YUPV_nyY0yNTfBxWqECnNmC-GvKG6PLioALBG8urHT4Q6ne8_8vMVoIyjk7l-WRP3CNuQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-31 21:06:15,626:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-31 21:06:15,627:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 31 Jan 2025 20:05:34 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349604068465 Replay-Nonce: UvlUZ57PkUzb9udKgoQg2ZGuCzmhnz_MAFNwmPIWuOp_7Bixrfw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:18:00Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468614059925" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349604068465" } 2025-01-31 21:06:15,627:DEBUG:acme.client:Storing nonce: UvlUZ57PkUzb9udKgoQg2ZGuCzmhnz_MAFNwmPIWuOp_7Bixrfw 2025-01-31 21:06:15,628:DEBUG:acme.client:JWS payload: b'' 2025-01-31 21:06:15,636:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468614059925: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVXZsVVo1N1BrVXpiOXVkS2dvUWcyWkd1Q3ptaG56X01BRk53bVBJV3VPcF83Qml4cmZ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTQwNTk5MjUifQ", "signature": "tecubxbmwxAZnlIxT_rPRLyaRR4tSX9f3FcWf9q4Uv7HzJ8jfpRK26PNUuGsPKcGQulKAyPsx6hCUoZdTnAxd1h-woIzwbrfoOt3CtIWPwAPOUft73D5sRNWljM4Ox-BFNd14pxAqcPZNTgHyo1ieTAzqerc4fDGQ7aYcvmLBFvOzGi1ESF_dGjzKiFMfI5SMxXP0d-EoWMbXN8iHdQVq30J3AzxlFyoHS0H-gnPkS3u92dnrZ2ieErVVjZZcyfhKwImPatRwPMR7PELfH6DZGYzSGGkZx2LpN-QXwGDRBU5uj_c1UUBAaLFBLf5__RVS9GHvvXb2HZ9uYe2WzY9aQ", "payload": "" } 2025-01-31 21:06:15,805:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468614059925 HTTP/1.1" 200 823 2025-01-31 21:06:15,805:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 20:05:34 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UvlUZ57PSlb9HeKn3M-tj2dZzCpGgxfQ40dn2yPRZus0O8ogkCs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:18:00Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468614059925/YrgyBQ", "status": "pending", "token": "wxzPthxA_2D1WM9MuMnylOPR_2v6PcertENLY_gigks" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468614059925/f-K6ug", "status": "pending", "token": "wxzPthxA_2D1WM9MuMnylOPR_2v6PcertENLY_gigks" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468614059925/B9cGNQ", "status": "pending", "token": "wxzPthxA_2D1WM9MuMnylOPR_2v6PcertENLY_gigks" } ] } 2025-01-31 21:06:15,806:DEBUG:acme.client:Storing nonce: UvlUZ57PSlb9HeKn3M-tj2dZzCpGgxfQ40dn2yPRZus0O8ogkCs 2025-01-31 21:06:15,806:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-31 21:06:15,807:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2025-01-31 21:06:15,808:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-31 21:06:15,808:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-31 21:06:15,809:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 21:06:15,809:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-31 21:06:15,809:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-31 21:06:15,809:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-31 21:06:15,810:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 21:06:15,810:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2025-01-31 21:06:15,812:ERROR:certbot._internal.renewal: C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2025-01-31 21:06:15,812:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 11 renew failure(s), 0 parse failure(s) 2025-01-31 21:06:15,835:ERROR:certbot._internal.log:11 renew failure(s), 0 parse failure(s)