2025-01-31 04:37:23,049:DEBUG:certbot._internal.main:certbot version: 1.6.0 2025-01-31 04:37:23,049:DEBUG:certbot._internal.main:Arguments: [] 2025-01-31 04:37:23,049:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2025-01-31 04:37:23,700:DEBUG:certbot._internal.log:Root logging level set at 20 2025-01-31 04:37:23,700:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2025-01-31 04:37:23,738:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2025-01-31 04:37:23,776:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-31 04:37:24,038:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 04:37:24,039:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2025-01-31 04:37:24,043:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2025-01-31 04:37:24,051:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-31 04:37:24,054:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 04:37:24,092:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-31 04:37:24,418:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 04:37:24,419:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is signed by the certificate's issuer. 2025-01-31 04:37:24,420:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD 2025-01-31 04:37:24,425:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-31 04:37:24,428:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 04:37:24,465:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-31 04:37:24,730:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 04:37:24,731:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2025-01-31 04:37:24,732:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2025-01-31 04:37:24,736:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-31 04:37:24,740:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 04:37:24,784:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-31 04:37:25,046:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 04:37:25,047:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is signed by the certificate's issuer. 2025-01-31 04:37:25,048:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is: OCSPCertStatus.GOOD 2025-01-31 04:37:25,052:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-31 04:37:25,055:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 04:37:25,102:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-31 04:37:25,298:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 04:37:25,300:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert22.pem is signed by the certificate's issuer. 2025-01-31 04:37:25,300:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD 2025-01-31 04:37:25,305:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-31 04:37:25,309:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 04:37:25,354:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-31 04:37:25,577:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 04:37:25,578:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-31 04:37:25,579:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-31 04:37:25,583:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:13:49 UTC. 2025-01-31 04:37:25,583:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-31 04:37:25,584:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 04:37:25,589:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-31 04:37:25,589:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-31 04:37:25,589:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-31 04:37:25,605:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-31 04:37:25,607:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-31 04:37:25,609:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-31 04:37:26,044:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-31 04:37:26,045:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:36:44 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "vXzfUJRHecg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2025-01-31 04:37:26,045:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-31 04:37:32,985:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9003_key-certbot.pem 2025-01-31 04:37:39,533:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9001_csr-certbot.pem 2025-01-31 04:37:39,534:DEBUG:acme.client:Requesting fresh nonce 2025-01-31 04:37:39,534:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-31 04:37:39,676:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-31 04:37:39,677:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:36:58 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6XXlm0Pc7EwQKW1-ITIDNuH7AKk-VH9ID3kmmwWdw3u8w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-31 04:37:39,677:DEBUG:acme.client:Storing nonce: TUC11O6XXlm0Pc7EwQKW1-ITIDNuH7AKk-VH9ID3kmmwWdw3u8w 2025-01-31 04:37:39,677:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2025-01-31 04:37:39,683:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhYbG0wUGM3RXdRS1cxLUlUSUROdUg3QUtrLVZIOUlEM2ttbXdXZHczdTh3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "BFcMzo3x668PACtnYuyi2-3LGE1ELRzC45CJ-Zma4DINJfOL3oDS2qXILZGVdxVfbnFoff1K534jGYRvY-BJE9v_bYsCjNcc99_OF7o7fRObX6XtXp1WnmHvxTE-2pWK8a8LK3ZcwhOe_5a6U0boXjfCNt3eXSUPoLHmcRqin2rNpV5_Qx6uoQPlHDLpQd_wTWnERNyvH1-T2JX9NzAoVAqQ6fGLk5MuOJjSfNhbAFJPA2oQVhCaoE8iiUHrmCza7OPIf5wPq6X35J5PzHX5mkiMFnbeit7WZP2BwsYVRM5hVB2a6dst4AGSJeSYddU2BDoJrmgaZJbH-lCBgZgaSg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-31 04:37:39,860:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-31 04:37:39,861:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 31 Jan 2025 03:36:58 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603648845 Replay-Nonce: TUC11O6XpMOsMk7RHnJF6SX4fHOL6djJhbAqx7_tV16H-Hugchk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:15:56Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613419375" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603648845" } 2025-01-31 04:37:39,861:DEBUG:acme.client:Storing nonce: TUC11O6XpMOsMk7RHnJF6SX4fHOL6djJhbAqx7_tV16H-Hugchk 2025-01-31 04:37:39,861:DEBUG:acme.client:JWS payload: b'' 2025-01-31 04:37:39,866:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613419375: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhwTU9zTWs3UkhuSkY2U1g0ZkhPTDZkakpoYkFxeDdfdFYxNkgtSHVnY2hrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM0MTkzNzUifQ", "signature": "nCuE-5Ze9sND6vs3PolSZRKs848AE441hgG4qv0njS4Vzzzwnx4cYG6sur5P-QOQvTyHgFahvhLx4YnFDWyJygfIYo--O2aTHBS2H9Puj04TlNWcl6HEv6L5Y-X62oUk3xDxkZraXVEsyAuzbHzapw8dhjSebJ9C0gdLDHdYeqtpqtiS3_Ab5YARO-atkPjsnbNGWgsBHj3kvYLnNhRoGdm_OQIFKe7xrWTYroVBKEQaO1vLBdd4mHuUuh_CgQqUO_YDJ2pLPLEk-f7XoVDdUVojXc5v7Xr781JWbbGiDLDQqqMSJsMKdw0IEDtdgjakdj6MPkvKZ2zVbBi8Ahnvug", "payload": "" } 2025-01-31 04:37:40,021:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613419375 HTTP/1.1" 200 823 2025-01-31 04:37:40,021:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:36:58 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UvlUZ57PuMRNGeBNqnMGgeWMPZj-gW8wl2gKSfid30QDpLgGMuo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:15:56Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613419375/yJLmdw", "status": "pending", "token": "9EnXT6FT7rznT8ngp10HxQzCcXcgDHNCsRx5DOBACns" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613419375/bahWuQ", "status": "pending", "token": "9EnXT6FT7rznT8ngp10HxQzCcXcgDHNCsRx5DOBACns" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613419375/T3sOUw", "status": "pending", "token": "9EnXT6FT7rznT8ngp10HxQzCcXcgDHNCsRx5DOBACns" } ] } 2025-01-31 04:37:40,022:DEBUG:acme.client:Storing nonce: UvlUZ57PuMRNGeBNqnMGgeWMPZj-gW8wl2gKSfid30QDpLgGMuo 2025-01-31 04:37:40,022:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-31 04:37:40,022:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2025-01-31 04:37:40,034:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-31 04:37:40,034:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-31 04:37:40,036:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 04:37:40,036:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-31 04:37:40,036:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-31 04:37:40,037:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-31 04:37:40,039:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 04:37:40,075:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-31 04:37:40,335:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 04:37:40,336:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2025-01-31 04:37:40,337:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2025-01-31 04:37:40,341:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:20 UTC. 2025-01-31 04:37:40,341:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-31 04:37:40,342:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 04:37:40,346:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-31 04:37:40,346:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-31 04:37:40,347:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-31 04:37:40,351:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-31 04:37:40,352:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-31 04:37:40,354:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-31 04:37:40,819:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-31 04:37:40,820:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:36:59 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "TYzN_EYiEsU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-31 04:37:40,820:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-31 04:37:47,148:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9004_key-certbot.pem 2025-01-31 04:37:53,326:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9002_csr-certbot.pem 2025-01-31 04:37:53,327:DEBUG:acme.client:Requesting fresh nonce 2025-01-31 04:37:53,327:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-31 04:37:53,481:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-31 04:37:53,482:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:37:12 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8iCKRnfoqQNqJWtgW2FzNppT9L2fcwgBIG96KambReeYg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-31 04:37:53,482:DEBUG:acme.client:Storing nonce: hXNDuA8iCKRnfoqQNqJWtgW2FzNppT9L2fcwgBIG96KambReeYg 2025-01-31 04:37:53,482:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2025-01-31 04:37:53,487:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGlDS1JuZm9xUU5xSld0Z1cyRnpOcHBUOUwyZmN3Z0JJRzk2S2FtYlJlZVlnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "sRxR8Mu4F2yoLworZlheoukBQnM99G0zb7Uz1cp3LMjOFaF9nQ6oc9h3_DkCdsmYA4m-NaPtRfI0yIMbwcuEMDW6ey6YTMMZrZQMX63oRewOJghs9h96VkL9NvnPbgTgI1EPpHWuUt0w6LmqdEHvh9K_B1RmoeecL4Jw4NUuF9v80h7RlOYnpOhykMqVVUsyaVEX-HrTgRqZWJWXGJusTecPvMjEU_kLCGFi3qo-eIr87mCf5aoIAwVcOUJ9v-QDm-7vaHkJNHZ2W_L8rA8-Qy6KXfNMw8QW78ZMUIV1p0P6oFMU5z-3mojZVUL_KpwBP7eWq5MtWoERxdRHyfJekw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-01-31 04:37:53,729:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2025-01-31 04:37:53,730:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 31 Jan 2025 03:37:12 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603700365 Replay-Nonce: hXNDuA8i4eav4NXgBPEr0stmcLb681bxVRjxz7__L56v36DN1U4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:16:10Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613495675" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603700365" } 2025-01-31 04:37:53,730:DEBUG:acme.client:Storing nonce: hXNDuA8i4eav4NXgBPEr0stmcLb681bxVRjxz7__L56v36DN1U4 2025-01-31 04:37:53,730:DEBUG:acme.client:JWS payload: b'' 2025-01-31 04:37:53,737:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613495675: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGk0ZWF2NE5YZ0JQRXIwc3RtY0xiNjgxYnhWUmp4ejdfX0w1NnYzNkROMVU0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM0OTU2NzUifQ", "signature": "JFLo9uxsGC4atm9QdX1jc9U3H9AYR7u-5wJBsPm-SbrKM29eOAuzs0TYWoalHV7pfiz104eDpzyBe1sFAUOXBMgcZaKIGCU9Ns7iVlDcHioBDXeAzP33JNBEc7e4OqwK74DHEQTxE5yh3Mq7kT6EjoSl97TVDv0IrbpPpbwk2jalupEYovJlybN12gimx0RCUHo1DbnRL0ktHMYCoDjOxqntNC4HoyXU3hhBt0T_ovnvLm-kAf6NCIveeD7BVPHUQweXdzr4csBM0ipj3bHKERF4rt5TnJalVu0HOx0mekfBtL27kD8BwxX_F_dEyrE2bywfXrm41QdEJItgJfcBmA", "payload": "" } 2025-01-31 04:37:53,894:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613495675 HTTP/1.1" 200 827 2025-01-31 04:37:53,895:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:37:12 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8iPkdaAwe9sdkKYZ4jMp3B_XoFeyVnJIfnXW2HW8N-JSo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:16:10Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613495675/TKifNg", "status": "pending", "token": "-N4wWQFOkzSF8ZGn4EebknObkGtUQ-conbTGk8O9Reo" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613495675/DpTZMg", "status": "pending", "token": "-N4wWQFOkzSF8ZGn4EebknObkGtUQ-conbTGk8O9Reo" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613495675/OR7sGQ", "status": "pending", "token": "-N4wWQFOkzSF8ZGn4EebknObkGtUQ-conbTGk8O9Reo" } ] } 2025-01-31 04:37:53,895:DEBUG:acme.client:Storing nonce: hXNDuA8iPkdaAwe9sdkKYZ4jMp3B_XoFeyVnJIfnXW2HW8N-JSo 2025-01-31 04:37:53,896:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-31 04:37:53,896:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2025-01-31 04:37:53,896:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-31 04:37:53,897:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-31 04:37:53,897:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 04:37:53,897:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-31 04:37:53,898:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-31 04:37:53,898:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-31 04:37:53,899:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 04:37:53,933:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-31 04:37:54,140:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 04:37:54,141:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is signed by the certificate's issuer. 2025-01-31 04:37:54,142:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is: OCSPCertStatus.GOOD 2025-01-31 04:37:54,145:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:51 UTC. 2025-01-31 04:37:54,145:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-31 04:37:54,145:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 04:37:54,150:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-31 04:37:54,151:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-31 04:37:54,151:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-31 04:37:54,167:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-31 04:37:54,167:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-31 04:37:54,169:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-31 04:37:54,635:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-31 04:37:54,636:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:37:13 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "TbY9WObKxPY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-31 04:37:54,636:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-31 04:38:00,946:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9005_key-certbot.pem 2025-01-31 04:38:06,971:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9003_csr-certbot.pem 2025-01-31 04:38:06,972:DEBUG:acme.client:Requesting fresh nonce 2025-01-31 04:38:06,972:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-31 04:38:07,126:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-31 04:38:07,126:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:37:25 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aTttXYyydRJ0HX86av7c4AWTAni5CuFZCnzmUC7_UtXiBRrB0YE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-31 04:38:07,127:DEBUG:acme.client:Storing nonce: aTttXYyydRJ0HX86av7c4AWTAni5CuFZCnzmUC7_UtXiBRrB0YE 2025-01-31 04:38:07,127:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2025-01-31 04:38:07,133:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXlkUkowSFg4NmF2N2M0QVdUQW5pNUN1RlpDbnptVUM3X1V0WGlCUnJCMFlFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "SwEcwJgcCrEfuik050GDfXDJCrr3vxFn4T1lFUPAwnaPl19E91XRBy9x2ELHW-FKQMszgI9nb9z0ST5i2LBLPl8DK0e-G7taehBQ-jz_VMIhnckmN-nGMFiztqIbEcDTd6H81En_78GTQdo3UnLWFE7Kfy5GY6YJPk0-TvfknrHdSjSZVaQ2axWKEOrv9Gy4cZOUARBWrRFxLEWduPWc85FrAN4iHfJqjch7ewvN1qQMyQG_dMzRgoKeTEiyGPWbOmgurWuxqasSAijpEaS7VjpjOHaW4j4ySBnVKtMGxJI46FsHwBYF7CtaqKxPI0TLsK_CdtDymd307-d10bkgFg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2025-01-31 04:38:07,314:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 353 2025-01-31 04:38:07,314:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 31 Jan 2025 03:37:25 GMT Content-Type: application/json Content-Length: 353 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603747715 Replay-Nonce: aTttXYyymSyLK5Iqoa8_tsPsC_d6WdBMAhOZkOi_RKhLn0pRXds X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:16:23Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613569085" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603747715" } 2025-01-31 04:38:07,315:DEBUG:acme.client:Storing nonce: aTttXYyymSyLK5Iqoa8_tsPsC_d6WdBMAhOZkOi_RKhLn0pRXds 2025-01-31 04:38:07,315:DEBUG:acme.client:JWS payload: b'' 2025-01-31 04:38:07,321:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613569085: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXltU3lMSzVJcW9hOF90c1BzQ19kNldkQk1BaE9aa09pX1JLaExuMHBSWGRzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM1NjkwODUifQ", "signature": "dMYOy6YIZRAaImm_h-bKouVlvtjCsJBe9ofG_v30bEDFQx7oHUwvUtafR4Bde7hQzTMbYiJ2VOzkY7O2_Po4G7A6l_uxjpnDR_VS5bRl82l2aLYheqLDIbYCIhxUm-R15kHvGbgo6EGYiUk_gdZ0JGiiNqMLXWkwNXlVZrnXmTaApTxyrorf-b0gUnXomvKtZaW92jXpMNBiirWJgL24_Sx8YNEegRyPpWO8x-tLNf2dP5cCgzYWTxkxxz29CWin5Yfu0VNz9CxYfD0r7qeVamfHQPJXaJQPenP-NDcgsMbrQ8Zz3F8zg5osjtD_zHMe392HD2VIgMHTFBukR6q6Xg", "payload": "" } 2025-01-31 04:38:07,479:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613569085 HTTP/1.1" 200 825 2025-01-31 04:38:07,481:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:37:26 GMT Content-Type: application/json Content-Length: 825 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8ie_9oY45eF8lq9x44-d93nQvGYTpaOVajZ8mFDPnCe3c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:16:23Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613569085/_lVOeQ", "status": "pending", "token": "voycDLD6WaIuZqIiZii35bQ8xrl32oR994HNkskXaVM" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613569085/i556TQ", "status": "pending", "token": "voycDLD6WaIuZqIiZii35bQ8xrl32oR994HNkskXaVM" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613569085/67S_cA", "status": "pending", "token": "voycDLD6WaIuZqIiZii35bQ8xrl32oR994HNkskXaVM" } ] } 2025-01-31 04:38:07,481:DEBUG:acme.client:Storing nonce: hXNDuA8ie_9oY45eF8lq9x44-d93nQvGYTpaOVajZ8mFDPnCe3c 2025-01-31 04:38:07,482:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-31 04:38:07,482:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2025-01-31 04:38:07,482:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-31 04:38:07,482:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-31 04:38:07,484:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 04:38:07,494:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-31 04:38:07,494:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-31 04:38:07,494:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-31 04:38:07,495:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 04:38:07,531:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-31 04:38:08,551:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 04:38:08,552:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-31 04:38:08,553:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-31 04:38:08,556:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:13 UTC. 2025-01-31 04:38:08,557:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-31 04:38:08,557:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 04:38:08,562:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-31 04:38:08,562:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-31 04:38:08,563:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-31 04:38:08,567:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-31 04:38:08,568:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-31 04:38:08,570:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-31 04:38:09,041:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-31 04:38:09,041:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:37:27 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "nVQxx2Ra6uk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-31 04:38:09,042:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-31 04:38:15,312:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9006_key-certbot.pem 2025-01-31 04:38:21,389:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9004_csr-certbot.pem 2025-01-31 04:38:21,390:DEBUG:acme.client:Requesting fresh nonce 2025-01-31 04:38:21,390:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-31 04:38:21,548:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-31 04:38:21,548:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:37:40 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8i1ubaZi-kv9IeFhSGolvkibYiUTzKm05DHAIAbzMG374 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-31 04:38:21,548:DEBUG:acme.client:Storing nonce: hXNDuA8i1ubaZi-kv9IeFhSGolvkibYiUTzKm05DHAIAbzMG374 2025-01-31 04:38:21,549:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2025-01-31 04:38:21,555:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGkxdWJhWmkta3Y5SWVGaFNHb2x2a2liWWlVVHpLbTA1REhBSUFiek1HMzc0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "qgTzXOH_6KgpWjKtE4AfWiy85q0Snu5JCQu6BEfOC4Iiyi8AtA5IisCc7-OIl6ctuFB9LAbhLcZJucHGpZ0gpxSZVBMDHX-5wjC7haZ4_yW8WwdELjMWM1gnsSlOcsB0c0nY9BA7B9TwiQeWuVGdQx_2oCaIflFndQM4QTaVX-EXTkI30aymTQnRilRvpVGsREXsxjow41TliRAURE2S0kI7GCR4eVWE1_w5zwSB6TQrhDn8Vff5zpHjcIOQjdMo2-wrWUtRTSzxqZJr9x7t555pbUr9Dk-E0h1Ma1RBKuFTFX3qqMa5fRakgZsw2j626IgLT3sbPYzxzZ6QoqpR3Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-01-31 04:38:21,751:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 352 2025-01-31 04:38:21,751:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 31 Jan 2025 03:37:40 GMT Content-Type: application/json Content-Length: 352 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603792325 Replay-Nonce: aTttXYyy5aN-Kb2i_61ZJKt90QWJXnNgW-wB1LqJg0Foz_pvxBA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:16:37Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613637565" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603792325" } 2025-01-31 04:38:21,752:DEBUG:acme.client:Storing nonce: aTttXYyy5aN-Kb2i_61ZJKt90QWJXnNgW-wB1LqJg0Foz_pvxBA 2025-01-31 04:38:21,752:DEBUG:acme.client:JWS payload: b'' 2025-01-31 04:38:21,757:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613637565: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXk1YU4tS2IyaV82MVpKS3Q5MFFXSlhuTmdXLXdCMUxxSmcwRm96X3B2eEJBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM2Mzc1NjUifQ", "signature": "lDUY1eeWhq03HMqf3pYlVBfrYTSq7WpO9RBjRSijeDR2GXy3NphIyH3p28fcCpZgMqMI8VSh9FEPxd_XRH1Fvzvv4tlt8P6SW6JhK-tpDxy2LfhywTOxr0FxYNF7msDoNIBE-d4NnoKAGOVxDAkz4JhP6FXkJWJcdsiQHdwHjJipt2Q0RziNCLBwJ_DUqqf3FOhAI8uLM0jipbt7CwBqv8v8UndCZ9BgW6dLkxBi4K4W2VX0RA1SSuBrHFxvaiBfvc03Ed7d-0Ho-ntfj30rPWoHTsgeTqHQzVe3AgLxoVVs53FMPpp_2-JQ6rX_d1ni08TwFvsdx-6ZUTRR3gIAfA", "payload": "" } 2025-01-31 04:38:21,922:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613637565 HTTP/1.1" 200 824 2025-01-31 04:38:21,922:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:37:40 GMT Content-Type: application/json Content-Length: 824 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8i6B8G94dQJNiunhQosZYmm8-ofCNhFDI35ENvXr8IRQ4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:16:37Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613637565/_4E6Mg", "status": "pending", "token": "koSUgsC_SD5VGbDQ3X2SLH_w9qYfJ8H3V8YT4kweWIk" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613637565/5bZpJA", "status": "pending", "token": "koSUgsC_SD5VGbDQ3X2SLH_w9qYfJ8H3V8YT4kweWIk" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613637565/HkAMUw", "status": "pending", "token": "koSUgsC_SD5VGbDQ3X2SLH_w9qYfJ8H3V8YT4kweWIk" } ] } 2025-01-31 04:38:21,923:DEBUG:acme.client:Storing nonce: hXNDuA8i6B8G94dQJNiunhQosZYmm8-ofCNhFDI35ENvXr8IRQ4 2025-01-31 04:38:21,924:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-31 04:38:21,924:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2025-01-31 04:38:21,924:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-31 04:38:21,926:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-31 04:38:21,926:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 04:38:21,927:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-31 04:38:21,927:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-31 04:38:21,927:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-31 04:38:21,927:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 04:38:21,973:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2025-01-31 04:38:21,973:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-31 04:38:21,973:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2025-01-31 04:38:21,981:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2025-01-31 04:38:21,982:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2025-01-31 04:38:21,982:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2025-01-31 04:38:21,982:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2025-01-31 04:38:21,983:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2025-01-31 04:38:21,983:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2025-01-31 04:38:22,022:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-31 04:38:22,223:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 04:38:22,224:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-31 04:38:22,225:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-31 04:38:22,229:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:35 UTC. 2025-01-31 04:38:22,229:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-31 04:38:22,230:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 04:38:22,235:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-31 04:38:22,235:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-31 04:38:22,235:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-31 04:38:22,239:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-31 04:38:22,240:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-31 04:38:22,242:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-31 04:38:22,714:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-31 04:38:22,715:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:37:41 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "diUjKpFje-U": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-31 04:38:22,715:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-31 04:38:29,086:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9007_key-certbot.pem 2025-01-31 04:38:35,190:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9005_csr-certbot.pem 2025-01-31 04:38:35,191:DEBUG:acme.client:Requesting fresh nonce 2025-01-31 04:38:35,191:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-31 04:38:35,349:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-31 04:38:35,350:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:37:53 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8i1d3sAhBz7zq_jb9wUcc85t2_wSyWdXoggoAufxupm04 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-31 04:38:35,350:DEBUG:acme.client:Storing nonce: hXNDuA8i1d3sAhBz7zq_jb9wUcc85t2_wSyWdXoggoAufxupm04 2025-01-31 04:38:35,351:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2025-01-31 04:38:35,356:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGkxZDNzQWhCejd6cV9qYjl3VWNjODV0Ml93U3lXZFhvZ2dvQXVmeHVwbTA0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "buC1F7mhQpc5StNsuwyafNFm_sQs2aO0NZ6WQnG6SWaS_FS1sVu399lAVfpBE8F5NahEYW1T3MCaCN1hDNQFmNXNcLS1AaYaGZhmz4_A3ha4c4YGS3r8t4lB35s2fybUoWS9xVRJWGgth357CLvRpNaP31EWcCGIVV4jIvj44WEybOAS7b6INzEJRzPHUH7SDHCi6S0Ilj7dUViD1xBZAn-J1m-SOckvTVC8wNGx04edV2_DVfdOwced8jWN3AHS9Bzk_X5ivQtLAzhAsjLwt9cq8XjgDtOSugMirLq6Un3ggwU73tiTKTBkpjyS-W8HU3baCHLTFA85ayEriAO8Iw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-31 04:38:35,547:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 357 2025-01-31 04:38:35,547:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 31 Jan 2025 03:37:54 GMT Content-Type: application/json Content-Length: 357 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603833745 Replay-Nonce: aTttXYyyExqLMb0QWUGZK2Fz_G2zmcmD4pNY6IJIcGYOTU4AY7M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:16:51Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613700475" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603833745" } 2025-01-31 04:38:35,547:DEBUG:acme.client:Storing nonce: aTttXYyyExqLMb0QWUGZK2Fz_G2zmcmD4pNY6IJIcGYOTU4AY7M 2025-01-31 04:38:35,548:DEBUG:acme.client:JWS payload: b'' 2025-01-31 04:38:35,553:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613700475: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXlFeHFMTWIwUVdVR1pLMkZ6X0cyem1jbUQ0cE5ZNklKSWNHWU9UVTRBWTdNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM3MDA0NzUifQ", "signature": "xWDTyfwaIw3t23uqFQg2RsBnwu2Mmg1QfrlZ91BQeorAK4I060NGyQrniBbKHjgda_RDvQKqAEm1JOx-zphYW6eAiq7JF1K7ICfoGqKExZbO9DOJAcxM3M95x1ro7wqF6r--Bc4wwk0P3zfDGKqQcm7oy75nqIyJ6pu4UFeI4CdOFyNO84I-OnckZ_s4pGjB7UF9-Kl5l-4WvJSQ4l60RX85CuSjBKNA3KLynpGQmChaP23utoeDwl4_0HdiGOONCSEnRZIrsyzE_BCuYBm5jw0FLqilbNvGZWhXHf14CC43FRVpGiw9JtrJiDavujEUarP9tYPYCPdUmtiW50HXnA", "payload": "" } 2025-01-31 04:38:35,716:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613700475 HTTP/1.1" 200 829 2025-01-31 04:38:35,716:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:37:54 GMT Content-Type: application/json Content-Length: 829 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8i3fK_WHpvkcEJu--2dG6BjT1kxJW2FEcPx0E20onexjQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:16:51Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613700475/4GWkdQ", "status": "pending", "token": "_3T_C3yuCWV4XSeLeRXCPycDIQnwxDGf-AyaPY9XlxE" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613700475/jElvnA", "status": "pending", "token": "_3T_C3yuCWV4XSeLeRXCPycDIQnwxDGf-AyaPY9XlxE" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613700475/B2drkw", "status": "pending", "token": "_3T_C3yuCWV4XSeLeRXCPycDIQnwxDGf-AyaPY9XlxE" } ] } 2025-01-31 04:38:35,717:DEBUG:acme.client:Storing nonce: hXNDuA8i3fK_WHpvkcEJu--2dG6BjT1kxJW2FEcPx0E20onexjQ 2025-01-31 04:38:35,717:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-31 04:38:35,718:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2025-01-31 04:38:35,718:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-31 04:38:35,718:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-31 04:38:35,719:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 04:38:35,719:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-31 04:38:35,719:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-31 04:38:35,720:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-31 04:38:35,721:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 04:38:35,768:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-31 04:38:35,989:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 04:38:35,991:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-31 04:38:35,991:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-31 04:38:35,996:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:05 UTC. 2025-01-31 04:38:35,996:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-31 04:38:35,996:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 04:38:36,000:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-31 04:38:36,001:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-31 04:38:36,001:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-31 04:38:36,006:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-31 04:38:36,006:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-31 04:38:36,008:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-31 04:38:36,447:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-31 04:38:36,448:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:37:55 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Es8zAt2souE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-31 04:38:36,448:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-31 04:38:42,730:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9008_key-certbot.pem 2025-01-31 04:38:48,761:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9006_csr-certbot.pem 2025-01-31 04:38:48,762:DEBUG:acme.client:Requesting fresh nonce 2025-01-31 04:38:48,762:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-31 04:38:48,909:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-31 04:38:48,909:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:38:07 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6XQT_CR7NaBuhwN0bMWPFBI4Ingj8FQnn_pyUX2TH9S2g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-31 04:38:48,910:DEBUG:acme.client:Storing nonce: TUC11O6XQT_CR7NaBuhwN0bMWPFBI4Ingj8FQnn_pyUX2TH9S2g 2025-01-31 04:38:48,910:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2025-01-31 04:38:48,916:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhRVF9DUjdOYUJ1aHdOMGJNV1BGQkk0SW5najhGUW5uX3B5VVgyVEg5UzJnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "tFcc-2PGws0AEdXQ5gD2KpImLE7hw6LI1lSaFVp6jw5pC05sYnSIqazcoQtxZxWqYknwcdXSC9TuLF4-66ikHt-tuAoxSb_wsMEdOiuyA3z_yzKE45S0YebXl51VIVJUzjmOefo6sD4V1SE1neZzgI8WWNoyE4PvbvXQa2WnuGm9BlRb61MLyB2uyJiRUs-GYnoFOD_Fvanpo3V9X6XhaPDZQnw-kkso2B9Zky5zhgHw5f9TQnG_yE2lHeL7ifMNMw9BWzPEMmPv6Qe7RBX3YF_cI-duhfzAdORxe-aFxmhBvbi8A7fExe6Ohg2Vl61JLz_jYi9m9xH1FceLVeLaEA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2025-01-31 04:38:49,115:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356 2025-01-31 04:38:49,116:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 31 Jan 2025 03:38:07 GMT Content-Type: application/json Content-Length: 356 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603881465 Replay-Nonce: UvlUZ57PDm-HURxVdcQ1CziVZoZ8NgCEvg9fhz3NVc_rZvoijMs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:17:04Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613770605" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603881465" } 2025-01-31 04:38:49,116:DEBUG:acme.client:Storing nonce: UvlUZ57PDm-HURxVdcQ1CziVZoZ8NgCEvg9fhz3NVc_rZvoijMs 2025-01-31 04:38:49,116:DEBUG:acme.client:JWS payload: b'' 2025-01-31 04:38:49,122:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613770605: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVXZsVVo1N1BEbS1IVVJ4VmRjUTFDemlWWm9aOE5nQ0V2ZzlmaHozTlZjX3Jadm9pak1zIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM3NzA2MDUifQ", "signature": "BajeHs0ulg-orMY40FfIkP1uNg55Qlum1xwBVzn9rD0BITheImkVT_ZG9WDMHttvnv51KopgJECzvCrrDER7A9TjOhBaZZ949883w0uqoPU4jR_GbCW66OZHGlR0QVaUqxj6GClGAcIs_Vf05c3s9AL8MbkICfR6VMNUf448imPe6Dpx7uO-Ci_7kqeISfjJoCfrCZJaPNLRK7ABFFC0cFqy5vWQBVtX1G_Y26uYJ1ERuW3DVeEWJqSWUy1b5EM_fqGeVRfWq6aQ9nrZGAhjBIYo0AoPx9No9TnvMoFYaPZSPB9IOmgoktRybHAL1eDilOoBYc4bwtY_rs5SAkx56A", "payload": "" } 2025-01-31 04:38:49,277:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613770605 HTTP/1.1" 200 828 2025-01-31 04:38:49,278:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:38:07 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UvlUZ57PqIgOd-ukLr0yPykl2w7Diu8CSIrIFoRnMzEu03Aunqk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:17:04Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613770605/QBtWUw", "status": "pending", "token": "a_L9ZYSN7UCXXgi8qZoJiOQo70GFjG_W81I9wg8pLws" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613770605/9nrvYA", "status": "pending", "token": "a_L9ZYSN7UCXXgi8qZoJiOQo70GFjG_W81I9wg8pLws" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613770605/F9o6HQ", "status": "pending", "token": "a_L9ZYSN7UCXXgi8qZoJiOQo70GFjG_W81I9wg8pLws" } ] } 2025-01-31 04:38:49,278:DEBUG:acme.client:Storing nonce: UvlUZ57PqIgOd-ukLr0yPykl2w7Diu8CSIrIFoRnMzEu03Aunqk 2025-01-31 04:38:49,278:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-31 04:38:49,279:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2025-01-31 04:38:49,279:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-31 04:38:49,280:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-31 04:38:49,280:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 04:38:49,280:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-31 04:38:49,280:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-31 04:38:49,281:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-31 04:38:49,282:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 04:38:49,319:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-31 04:38:49,544:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 04:38:49,546:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2025-01-31 04:38:49,547:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2025-01-31 04:38:49,550:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:33 UTC. 2025-01-31 04:38:49,550:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-31 04:38:49,551:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 04:38:49,556:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-31 04:38:49,556:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-31 04:38:49,556:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-31 04:38:49,561:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-31 04:38:49,562:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-31 04:38:49,563:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-31 04:38:50,035:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-31 04:38:50,036:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:38:08 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "w288x5MZ1Do": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2025-01-31 04:38:50,036:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-31 04:38:56,163:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9009_key-certbot.pem 2025-01-31 04:39:02,199:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9007_csr-certbot.pem 2025-01-31 04:39:02,200:DEBUG:acme.client:Requesting fresh nonce 2025-01-31 04:39:02,200:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-31 04:39:02,357:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-31 04:39:02,358:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:38:20 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aTttXYyyodzq9NC1GcYtsujtf4GldquHqg1Cti1sn8rnEvf_pvQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-31 04:39:02,358:DEBUG:acme.client:Storing nonce: aTttXYyyodzq9NC1GcYtsujtf4GldquHqg1Cti1sn8rnEvf_pvQ 2025-01-31 04:39:02,358:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2025-01-31 04:39:02,364:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXlvZHpxOU5DMUdjWXRzdWp0ZjRHbGRxdUhxZzFDdGkxc244cm5FdmZfcHZRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "wSyijFjniXQD6yrE-tdfOcBlIM2TfDs8HV98YQIm37hZaYwf62PWqsbjcBkQFchm2pqB5jbICE6R75eRM0hyuvPwWrLXQaXXSzg3zjalCR2izaWVRkMCqjDgkdb4va7vzRuwdtVzto1AcI8B5i8ngzyvSiSSqkXXNnzSMuy9MVIJlnztusn5Ri0HaPctt-gtVHQiuw-ZA5Db0WGKfV6MMKZao_iacIzetNmXY0tbbkWGp2qhZiP6IQ8nzHw0chuFl2IYrsUFflQNZ-SunVgHRSChLb2On8FNRxhxJstZ8Z5zgxH9vhZauRU1TPRg9YObJssD3KFefUAxXuoe8JyMKw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-01-31 04:39:02,549:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2025-01-31 04:39:02,550:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 31 Jan 2025 03:38:21 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603934575 Replay-Nonce: hXNDuA8iQqeJ6iOFI1RNck0k2I9oNdfjz1kcC1s-8LCIDWCkdMQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:17:18Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613854905" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603934575" } 2025-01-31 04:39:02,550:DEBUG:acme.client:Storing nonce: hXNDuA8iQqeJ6iOFI1RNck0k2I9oNdfjz1kcC1s-8LCIDWCkdMQ 2025-01-31 04:39:02,550:DEBUG:acme.client:JWS payload: b'' 2025-01-31 04:39:02,555:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613854905: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGlRcWVKNmlPRkkxUk5jazBrMkk5b05kZmp6MWtjQzFzLThMQ0lEV0NrZE1RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM4NTQ5MDUifQ", "signature": "DMPvsivwNPIBfYjbW9o8tIoF4xU_HW0GKN4HGoJq68INp9z8tSSlKljRPS097orIuv3cj0AN4mZpQBun_E9skv0gek_voF7Qe49eHInuTHhH7OLsUcvhTlox_0eM60PIrNB28WydPzYB8dcj8Gs7ZqYF3vQHcrmlLoYeIAQTu2JYJkxRdxXWTkxs-Hl5RlVpUvao0rB2KK1ZB78OwMaPPM4oWbu-s6AatwW2D5W1qum1pwOIaFv3CDYmP_8XsVLcYGeCoydhqHz70p9c1mXmpmqEN3XIqhlheWiXQ6k8T15oxGM4OyHypfCvOfwt5S2NLGsSAv3Wh9eC_wVf2LIDMg", "payload": "" } 2025-01-31 04:39:02,719:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613854905 HTTP/1.1" 200 827 2025-01-31 04:39:02,719:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:38:21 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aTttXYyyeKRMlyDvVN48tEWbWcE08k3IOOeyjcgLDwRa3rsfh9E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:17:18Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613854905/ke1eMQ", "status": "pending", "token": "IK7vYZaRda0VTDtKKQsecohpYPhsEngjBQ1X3SBv7HQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613854905/7RtzaQ", "status": "pending", "token": "IK7vYZaRda0VTDtKKQsecohpYPhsEngjBQ1X3SBv7HQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613854905/bMnPCg", "status": "pending", "token": "IK7vYZaRda0VTDtKKQsecohpYPhsEngjBQ1X3SBv7HQ" } ] } 2025-01-31 04:39:02,719:DEBUG:acme.client:Storing nonce: aTttXYyyeKRMlyDvVN48tEWbWcE08k3IOOeyjcgLDwRa3rsfh9E 2025-01-31 04:39:02,720:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-31 04:39:02,720:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2025-01-31 04:39:02,721:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-31 04:39:02,721:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-31 04:39:02,722:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 04:39:02,722:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-31 04:39:02,722:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-31 04:39:02,723:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-31 04:39:02,723:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 04:39:02,773:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-31 04:39:02,978:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 04:39:02,979:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2025-01-31 04:39:02,981:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2025-01-31 04:39:02,985:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:54 UTC. 2025-01-31 04:39:02,985:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-31 04:39:02,986:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 04:39:02,991:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-31 04:39:02,991:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-31 04:39:02,991:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-31 04:39:02,995:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-31 04:39:02,996:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-31 04:39:02,998:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-31 04:39:03,436:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-31 04:39:03,437:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:38:22 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "CWI2MI3xpRs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-31 04:39:03,437:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-31 04:39:09,606:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9010_key-certbot.pem 2025-01-31 04:39:15,709:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9008_csr-certbot.pem 2025-01-31 04:39:15,709:DEBUG:acme.client:Requesting fresh nonce 2025-01-31 04:39:15,710:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-31 04:39:15,856:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-31 04:39:15,857:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:38:34 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6XAFzCGx25uFHFoes6MbJ5-Q2-fiYmjiK7hxyUGY9g50Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-31 04:39:15,857:DEBUG:acme.client:Storing nonce: TUC11O6XAFzCGx25uFHFoes6MbJ5-Q2-fiYmjiK7hxyUGY9g50Q 2025-01-31 04:39:15,857:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2025-01-31 04:39:15,863:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhBRnpDR3gyNXVGSEZvZXM2TWJKNS1RMi1maVltamlLN2h4eVVHWTlnNTBRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ZQKnObcxiaHr76iT01rmSf2X10_gpO3vlxUmgN4L1L8FdNj0xec72bhx5mhQ65GWFXYqjH8OXPP6xee8nh1a1kijpOU-qtHabxRUMvnaDU6dc50oIrUnnAa3QWDKeqXYvGQaJrrsteKvgzKpFkxMJ7e1_Z91fPOs54VRjybMjSt0_Rw4aKVVmG8-teG6kM_U2KkOliop8rc6b9VlWXxVGixbbOWgsfZan6x14Fw1l5Hpmc0H6MbwXOMxUH4YOCNIqtPF2HIuXvyNjKy_6vOL1c1UeCHrd-ydXk9nkG9tmUCFLR8riqkQDg-9UlPyAofFzPR43nMoDnS3OwuHzRLSaQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-31 04:39:16,045:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-31 04:39:16,045:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 31 Jan 2025 03:38:34 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603978585 Replay-Nonce: UvlUZ57PP_ekpg299JhGB0gFWCkC1OC4vD-Yq7TWRRzsF_NQlQY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:17:32Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613923815" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603978585" } 2025-01-31 04:39:16,046:DEBUG:acme.client:Storing nonce: UvlUZ57PP_ekpg299JhGB0gFWCkC1OC4vD-Yq7TWRRzsF_NQlQY 2025-01-31 04:39:16,046:DEBUG:acme.client:JWS payload: b'' 2025-01-31 04:39:16,052:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613923815: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVXZsVVo1N1BQX2VrcGcyOTlKaEdCMGdGV0NrQzFPQzR2RC1ZcTdUV1JSenNGX05RbFFZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM5MjM4MTUifQ", "signature": "EtxyIut-paKQ-PXgn3DFmDnMzNrm_FAoNEBOhNj_6f-3weB-FEiPsM0M64rVjjF9MQjg81DNGbVo6os5aq_Xket6I8fqA34jMztedIPkRa0cafREf2Sxwa_VQPUodWgCesHyFW4sL_8M7aBxn_c3q-M9J3ysSK57KPf9cqpq6ptNYJOjqGj6Y09y4P7MVx7STGzfVpBlN4unUzwEdYju_c63H3v_50PeAzVEyK708PruisdOh-tkqeP2xTlOmVrS7aL2T0Y3rGupm6Ufvs5I2oO2zLShJhDTLqJIKKhlUWaR3FG63VN37heewmh0BHohhFNV8tUC0x_Nvi1Cas7EHA", "payload": "" } 2025-01-31 04:39:16,206:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613923815 HTTP/1.1" 200 823 2025-01-31 04:39:16,206:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:38:34 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UvlUZ57PdjzJ0ATDQY80fCtx5S4l2EmwScI7g0IRN5Db0G6Yh-M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:17:32Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613923815/wNRiHQ", "status": "pending", "token": "m7yyxIJSFIemVfF7rkix7A6ntmc25SA7QMkT0Knl1qI" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613923815/t9VvUw", "status": "pending", "token": "m7yyxIJSFIemVfF7rkix7A6ntmc25SA7QMkT0Knl1qI" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613923815/wvLngQ", "status": "pending", "token": "m7yyxIJSFIemVfF7rkix7A6ntmc25SA7QMkT0Knl1qI" } ] } 2025-01-31 04:39:16,206:DEBUG:acme.client:Storing nonce: UvlUZ57PdjzJ0ATDQY80fCtx5S4l2EmwScI7g0IRN5Db0G6Yh-M 2025-01-31 04:39:16,207:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-31 04:39:16,207:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2025-01-31 04:39:16,208:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-31 04:39:16,208:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-31 04:39:16,209:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 04:39:16,209:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-31 04:39:16,209:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-31 04:39:16,210:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-31 04:39:16,211:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 04:39:16,258:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-31 04:39:16,482:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 04:39:16,483:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-31 04:39:16,484:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-31 04:39:16,489:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:15 UTC. 2025-01-31 04:39:16,489:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-31 04:39:16,489:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 04:39:16,494:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-31 04:39:16,494:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-31 04:39:16,494:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-31 04:39:16,499:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-31 04:39:16,499:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-31 04:39:16,502:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-31 04:39:16,960:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-31 04:39:16,961:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:38:35 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "49iJ3slPe7M": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-31 04:39:16,961:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-31 04:39:23,352:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9011_key-certbot.pem 2025-01-31 04:39:29,402:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9009_csr-certbot.pem 2025-01-31 04:39:29,404:DEBUG:acme.client:Requesting fresh nonce 2025-01-31 04:39:29,404:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-31 04:39:29,558:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-31 04:39:29,558:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:38:48 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8iETxi8ACMJ5r6SNns8P5PmSx4MoBRJ96WmjrJrbi4Ezo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-31 04:39:29,558:DEBUG:acme.client:Storing nonce: hXNDuA8iETxi8ACMJ5r6SNns8P5PmSx4MoBRJ96WmjrJrbi4Ezo 2025-01-31 04:39:29,559:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2025-01-31 04:39:29,566:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGlFVHhpOEFDTUo1cjZTTm5zOFA1UG1TeDRNb0JSSjk2V21qckpyYmk0RXpvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "v8pjLpYKpEQYgQzHceWGD3HGJ5vDQMpcETAwxbmMr_TlvN2D95RB5jB3Ts19iU_NrmoPsPl4oUf95nCE6skrojq2EiX3TDSRi0GUBIJZR36o_r8RBUBYoZzEDiRK2F3i8HtejMLTs4UnZBTd2mrp5SbTONcBqH5rGQ6Im3Jq2OcC1_5cDkTN0ite1NqEqshCEpDpttzhBJMIl5sPa9VVqsbAchIsn3sEUdmnWQ3-2PCCDWSOdhqm8qF24_G6jQdIrNFF3IcEqc4v5WOadk3GB14bl7DuAtlXwb2O_Xy86MNrmTEzQtqRwQvS8RefncSNS7wOqwmcZqDUysYQoHjLaQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-31 04:39:29,744:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-31 04:39:29,745:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 31 Jan 2025 03:38:48 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349604024205 Replay-Nonce: aTttXYyyM8f8N68zXMBQKY-Po6ePvsu4ecFqYMLCdezw-SD144A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:17:46Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613992955" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349604024205" } 2025-01-31 04:39:29,745:DEBUG:acme.client:Storing nonce: aTttXYyyM8f8N68zXMBQKY-Po6ePvsu4ecFqYMLCdezw-SD144A 2025-01-31 04:39:29,745:DEBUG:acme.client:JWS payload: b'' 2025-01-31 04:39:29,751:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613992955: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXlNOGY4TjY4elhNQlFLWS1QbzZlUHZzdTRlY0ZxWU1MQ2RlenctU0QxNDRBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM5OTI5NTUifQ", "signature": "B7JotDTCrJJYoQvoaxb4GcfdwNm_glnW0RhQyFB6WKM1V_qY4ErgAhlarnTvfp4OvHzHWBO-7rD2UHecnZ5g3OIVMsMX-SdsOIpEPVXaIvoFbf4E29gI0RR1DdNO42lRDompvNgn_gkdjU7MSRQcgxu1qyFxz_OE5tCeJB5hAuNSgPdj__Yag1r6Nqrz9puhxbIhrElmJxAVQh9xc3FLyPUHd-SSd_DKfJfE7NM_WX1q2mGGe9uiqFEz4bbcSDmsHDuA_DufICS8MaEZzehtwuCibj9FQLDAIeks6LVTMfkjInl7jxEPi-9ckQSeo6Qfe0BIK86BcteCfplA6XPqQg", "payload": "" } 2025-01-31 04:39:29,911:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613992955 HTTP/1.1" 200 823 2025-01-31 04:39:29,911:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:38:48 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8irXUDQy1lA4ohd79gBKP6sxx5B2x7Eet2B8Wq2ilDKjI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:17:46Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613992955/xSdP2A", "status": "pending", "token": "6MJOC_tlqp2eo7XHm1FAxeHMF3eocZ9KkmW5bas3nAw" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613992955/Sy2Pkg", "status": "pending", "token": "6MJOC_tlqp2eo7XHm1FAxeHMF3eocZ9KkmW5bas3nAw" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613992955/G_4bSw", "status": "pending", "token": "6MJOC_tlqp2eo7XHm1FAxeHMF3eocZ9KkmW5bas3nAw" } ] } 2025-01-31 04:39:29,911:DEBUG:acme.client:Storing nonce: hXNDuA8irXUDQy1lA4ohd79gBKP6sxx5B2x7Eet2B8Wq2ilDKjI 2025-01-31 04:39:29,912:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-31 04:39:29,912:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2025-01-31 04:39:29,913:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-31 04:39:29,913:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-31 04:39:29,914:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 04:39:29,914:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-31 04:39:29,914:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-31 04:39:29,915:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-31 04:39:29,916:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 04:39:29,952:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-31 04:39:30,187:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-31 04:39:30,188:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2025-01-31 04:39:30,189:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2025-01-31 04:39:30,192:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:38 UTC. 2025-01-31 04:39:30,192:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-31 04:39:30,192:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-31 04:39:30,198:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-31 04:39:30,198:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-31 04:39:30,198:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-31 04:39:30,203:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-31 04:39:30,204:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-31 04:39:30,206:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-31 04:39:30,643:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-31 04:39:30,644:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:38:49 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "kC8gCOhMuus": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-31 04:39:30,645:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-31 04:39:36,828:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9012_key-certbot.pem 2025-01-31 04:39:42,846:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9010_csr-certbot.pem 2025-01-31 04:39:42,847:DEBUG:acme.client:Requesting fresh nonce 2025-01-31 04:39:42,847:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-31 04:39:42,994:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-31 04:39:42,994:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:39:01 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6X0lomkOdA39KEANP7qICtHMuZExT820gUhU9dpmVLUCs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-31 04:39:42,995:DEBUG:acme.client:Storing nonce: TUC11O6X0lomkOdA39KEANP7qICtHMuZExT820gUhU9dpmVLUCs 2025-01-31 04:39:42,995:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2025-01-31 04:39:43,001:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlgwbG9ta09kQTM5S0VBTlA3cUlDdEhNdVpFeFQ4MjBnVWhVOWRwbVZMVUNzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "qqsF0Bz7CMLM_VU9ZaY6GKZ2EROVhpuxfdjYvGixDdgLuJ_3Aa954HgdmszTUPCwk_x7vgopxj4A7tVRMqZ2NzjG_i8pCtUDnpVrNshQEOf7psRDlHiOqHy4AKRzrIS--MXU_OLrR78gFgke0HVo6PeNDGHs6pDGCAXQ2kIPhGDwczpGQewfCZUryBXuwVmzJcNALLT_w-lo7SaNQeauQitRaHB2SdbBk1yQetWVQSSowGQVuAukt7i8oMry2QSaqh51eGiUwfyFnCFx5W_OZwmAfFY8gnFOMNc5jMNLBmex8PAtvnuQBBaIOHNB-KT6_LIRineAZGLE6ezLcdO-Fg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-31 04:39:43,250:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-31 04:39:43,251:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Fri, 31 Jan 2025 03:39:01 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349604068465 Replay-Nonce: TUC11O6XYf58KVWfBQecOduXlLbrSEOzJ_SPo51BxMIY_NjBELE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:18:00Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468614059925" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349604068465" } 2025-01-31 04:39:43,251:DEBUG:acme.client:Storing nonce: TUC11O6XYf58KVWfBQecOduXlLbrSEOzJ_SPo51BxMIY_NjBELE 2025-01-31 04:39:43,251:DEBUG:acme.client:JWS payload: b'' 2025-01-31 04:39:43,257:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468614059925: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhZZjU4S1ZXZkJRZWNPZHVYbExiclNFT3pKX1NQbzUxQnhNSVlfTmpCRUxFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTQwNTk5MjUifQ", "signature": "D2_woj6Vh1mbf8kgP744PWGk8XzO7N4V0PnJFJkcPHq0J34vM3mf401I_DfNyEkfOS92LacRq58CW4gR0yHQGmyzjnuII-3PQvmaDelgtq8dccoTdeIcOoXv0rBJBr7kfRrhWIjvdFBa2Se1qgHsHYrr9JbTCYuw3EDDwTxsOgCQF7O7t8ffl1iYr-s-swBSibyt9ZaSdYk6gd5aptyLurorrxGfLsqP0eLN946sUZYrzZZriBIoZTRyzPDRHN8k8dGPgYC0Ht6aGieIIFTXw19DtGdPkGYVQnnEDg4XRgUxI2c7KXKNkRwwPLjsW43_wuiie6jRTomkSuavWSgpDQ", "payload": "" } 2025-01-31 04:39:43,412:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468614059925 HTTP/1.1" 200 823 2025-01-31 04:39:43,413:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Fri, 31 Jan 2025 03:39:02 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6XCgLAJmRb0SasPIe0KDFqORkpDQRuwsSDZKJU95CMTDw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:18:00Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468614059925/YrgyBQ", "status": "pending", "token": "wxzPthxA_2D1WM9MuMnylOPR_2v6PcertENLY_gigks" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468614059925/B9cGNQ", "status": "pending", "token": "wxzPthxA_2D1WM9MuMnylOPR_2v6PcertENLY_gigks" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468614059925/f-K6ug", "status": "pending", "token": "wxzPthxA_2D1WM9MuMnylOPR_2v6PcertENLY_gigks" } ] } 2025-01-31 04:39:43,413:DEBUG:acme.client:Storing nonce: TUC11O6XCgLAJmRb0SasPIe0KDFqORkpDQRuwsSDZKJU95CMTDw 2025-01-31 04:39:43,413:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-31 04:39:43,414:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2025-01-31 04:39:43,414:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-31 04:39:43,415:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-31 04:39:43,415:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 04:39:43,415:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-31 04:39:43,415:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-31 04:39:43,416:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-31 04:39:43,417:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-31 04:39:43,417:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2025-01-31 04:39:43,418:ERROR:certbot._internal.renewal: C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2025-01-31 04:39:43,418:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 11 renew failure(s), 0 parse failure(s) 2025-01-31 04:39:43,420:ERROR:certbot._internal.log:11 renew failure(s), 0 parse failure(s)