2025-01-30 21:16:20,256:DEBUG:certbot._internal.main:certbot version: 1.6.0 2025-01-30 21:16:20,257:DEBUG:certbot._internal.main:Arguments: [] 2025-01-30 21:16:20,257:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2025-01-30 21:16:20,972:DEBUG:certbot._internal.log:Root logging level set at 20 2025-01-30 21:16:20,972:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2025-01-30 21:16:21,011:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2025-01-30 21:16:21,051:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-30 21:16:21,288:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-30 21:16:21,289:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2025-01-30 21:16:21,294:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2025-01-30 21:16:21,301:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-30 21:16:21,304:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-30 21:16:21,343:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-30 21:16:21,511:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-30 21:16:21,513:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is signed by the certificate's issuer. 2025-01-30 21:16:21,513:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD 2025-01-30 21:16:21,517:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-30 21:16:21,522:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-30 21:16:21,558:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-30 21:16:21,727:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-30 21:16:21,728:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2025-01-30 21:16:21,729:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2025-01-30 21:16:21,733:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-30 21:16:21,737:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-30 21:16:21,771:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-30 21:16:21,976:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-30 21:16:21,977:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is signed by the certificate's issuer. 2025-01-30 21:16:21,978:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is: OCSPCertStatus.GOOD 2025-01-30 21:16:21,982:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-30 21:16:21,985:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-30 21:16:22,037:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-30 21:16:22,242:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-30 21:16:22,244:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert22.pem is signed by the certificate's issuer. 2025-01-30 21:16:22,244:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD 2025-01-30 21:16:22,247:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-30 21:16:22,253:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-30 21:16:22,295:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-30 21:16:22,491:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-30 21:16:22,492:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-30 21:16:22,493:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-30 21:16:22,497:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:13:49 UTC. 2025-01-30 21:16:22,497:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-30 21:16:22,498:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-30 21:16:22,502:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-30 21:16:22,503:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-30 21:16:22,503:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-30 21:16:22,511:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-30 21:16:22,512:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-30 21:16:22,515:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-30 21:16:22,984:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-30 21:16:22,985:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:15:41 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "W_AYfdHVrLE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-30 21:16:22,985:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-30 21:16:30,590:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8993_key-certbot.pem 2025-01-30 21:16:37,679:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8991_csr-certbot.pem 2025-01-30 21:16:37,679:DEBUG:acme.client:Requesting fresh nonce 2025-01-30 21:16:37,679:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-30 21:16:37,835:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-30 21:16:37,836:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:15:56 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8igoOSm6IEKjGG57k9plDdYleWw_CSmSjnprT9WPdupV4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-30 21:16:37,836:DEBUG:acme.client:Storing nonce: hXNDuA8igoOSm6IEKjGG57k9plDdYleWw_CSmSjnprT9WPdupV4 2025-01-30 21:16:37,836:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2025-01-30 21:16:37,842:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGlnb09TbTZJRUtqR0c1N2s5cGxEZFlsZVd3X0NTbVNqbnByVDlXUGR1cFY0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ERqoGcdr51fcsNcYhQzvPDi7XuBlwSjEGkNxjDZxp-iuICu8vdXsxUwB9YzZFgziBIzXIMZFqgg-o2IAjpRXjDYEDh2y6t77zF_jJbB4-uIjOmCsMCNDe42ncYd_9hXZboO-68_UTgf3jfeXr3LKOKoGMHkPbddgBuXll9F-wGSLrkbZd9SI9TmUB85224riD--hWsQIJ57ezuE0Q27AqwyvqIUcfEogLXs3_iWzOnLxfOG2usOp1e6HutJcPizpoMwK2hFP14-mo6bftpO8ODnQorydZNhbIZ1MJ20fobWAMcTFuHzqdecZThoatIbrgDCdkFLJGRWkWB4fjGHQ0Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-30 21:16:38,043:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-30 21:16:38,043:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 30 Jan 2025 20:15:56 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603648845 Replay-Nonce: aTttXYyyYrITY3YpGftERuMQNnS537UOLUh9EBIYdYfGCkmdKiU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:15:56Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613419375" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603648845" } 2025-01-30 21:16:38,044:DEBUG:acme.client:Storing nonce: aTttXYyyYrITY3YpGftERuMQNnS537UOLUh9EBIYdYfGCkmdKiU 2025-01-30 21:16:38,044:DEBUG:acme.client:JWS payload: b'' 2025-01-30 21:16:38,050:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613419375: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXlZcklUWTNZcEdmdEVSdU1RTm5TNTM3VU9MVWg5RUJJWWRZZkdDa21kS2lVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM0MTkzNzUifQ", "signature": "yRSQ83L05QdIzcj-G66vMAC3ITFvCkNyoZgupwdJjfC2AmOWRlP5ZnHWEqgXuvwoJoGq_M9udCotJK9IFaK-om3y668x08AgTI3nMMre4gHY14eD6jgRIZv_X6_CB9ohm8BOMHaoKG9YG0rj0mbJmCS8mYxodQ99Y3hd8znU_dlBl5_nYDXmxKTHoCWjJXH3-Og4yOHJHjghYB504oIm5TPGBk-NKRruAHoooNmjCciEEPuVfzMlpYz02ATRNw3YOXOjBva_azQcP5ADAqRF5xSgSuBx5Lukzqa4HHfIt3XPfqXuyLdzwRqO9KkKN_mh4H1MfOVwlBpcoS--pIONBQ", "payload": "" } 2025-01-30 21:16:38,208:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613419375 HTTP/1.1" 200 823 2025-01-30 21:16:38,209:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:15:56 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8in1XDaRgJaB3G3MmhcCwUVec09AW7_aIIqYu1nxPmJ4A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:15:56Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613419375/T3sOUw", "status": "pending", "token": "9EnXT6FT7rznT8ngp10HxQzCcXcgDHNCsRx5DOBACns" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613419375/yJLmdw", "status": "pending", "token": "9EnXT6FT7rznT8ngp10HxQzCcXcgDHNCsRx5DOBACns" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613419375/bahWuQ", "status": "pending", "token": "9EnXT6FT7rznT8ngp10HxQzCcXcgDHNCsRx5DOBACns" } ] } 2025-01-30 21:16:38,209:DEBUG:acme.client:Storing nonce: hXNDuA8in1XDaRgJaB3G3MmhcCwUVec09AW7_aIIqYu1nxPmJ4A 2025-01-30 21:16:38,209:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-30 21:16:38,210:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2025-01-30 21:16:38,221:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-30 21:16:38,221:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-30 21:16:38,231:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-30 21:16:38,231:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-30 21:16:38,232:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-30 21:16:38,232:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-30 21:16:38,243:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-30 21:16:38,281:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-30 21:16:38,478:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-30 21:16:38,479:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2025-01-30 21:16:38,480:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2025-01-30 21:16:38,484:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:20 UTC. 2025-01-30 21:16:38,484:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-30 21:16:38,485:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-30 21:16:38,490:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-30 21:16:38,490:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-30 21:16:38,491:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-30 21:16:38,495:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-30 21:16:38,496:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-30 21:16:38,498:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-30 21:16:38,931:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-30 21:16:38,931:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:15:57 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "4RSSsQhghyM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-30 21:16:38,932:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-30 21:16:45,307:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8994_key-certbot.pem 2025-01-30 21:16:51,502:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8992_csr-certbot.pem 2025-01-30 21:16:51,503:DEBUG:acme.client:Requesting fresh nonce 2025-01-30 21:16:51,503:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-30 21:16:51,651:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-30 21:16:51,651:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:16:10 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UvlUZ57PBLPoi3Y6Z58_aMjfL5ZrbpBv_6g_poW85xITw6SkeeA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-30 21:16:51,651:DEBUG:acme.client:Storing nonce: UvlUZ57PBLPoi3Y6Z58_aMjfL5ZrbpBv_6g_poW85xITw6SkeeA 2025-01-30 21:16:51,652:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2025-01-30 21:16:51,657:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVXZsVVo1N1BCTFBvaTNZNlo1OF9hTWpmTDVacmJwQnZfNmdfcG9XODV4SVR3NlNrZWVBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "H5DoeZD-BpHePuyRHkDPnWWWp2mGU1h8_7B18d90qzwjZMBWutyOXeqBOdTK4OsY7StUA96XCOCbp5n-bHBe70j16BhPph6XR0FteyL1yCIwVIi1eYY3fTe2_FFHXgFTnkMSo_tovvv6ZTm8u1UDy_FY6r9PK3JasP25JK1gdUkLawHu5yPLmLcxG9qEeA6A-sT9_9_WsjiCQqwrjkOM4GJNxoP7cGZgd9NLvS6i3ThNZEOP9ZNOE3nc7j7PphLrz9EC_LcW0QhAXeFM-nD4x8hQUjq5OBS-_yC89Ozx3Zb1dySMHSCJXVylBwgIawkBFL3Ie0Q2N6MsMmO-wQFisg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-01-30 21:16:51,962:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2025-01-30 21:16:51,962:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 30 Jan 2025 20:16:10 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603700365 Replay-Nonce: UvlUZ57PlJCNAdPdlx9aKiYTlv1CUK5L8_SmUUHtdam2TpCcyOU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:16:10Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613495675" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603700365" } 2025-01-30 21:16:51,962:DEBUG:acme.client:Storing nonce: UvlUZ57PlJCNAdPdlx9aKiYTlv1CUK5L8_SmUUHtdam2TpCcyOU 2025-01-30 21:16:51,963:DEBUG:acme.client:JWS payload: b'' 2025-01-30 21:16:51,969:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613495675: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVXZsVVo1N1BsSkNOQWRQZGx4OWFLaVlUbHYxQ1VLNUw4X1NtVVVIdGRhbTJUcENjeU9VIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM0OTU2NzUifQ", "signature": "E4WL-aMN7Vb8jd18btK6c8Bxnzbp1VIjHsupphQazLBjdGYyWzpFWlchcaU-tqysozJZLkRnBNT8p5i19qQW8eZnPeyiISr4oXwkg_7C81cdFb3rPaeFcTc0WaVI5THXio_tN18GmFsBZ_8M4Y12qLqfKkU09U7JFFoC2chndzuaYYdWd57ZbeiBH19Eb4NpMjm0gWICPOVy7MQAKZAeYY_sfXFQ1eoGP_DZsfN0oYOuw3_T78G1zHs8W3Y5vaxvb41ACb4ZB8zIZjzcXAreqH_qTzk6hlZR6gMUcPs8EIlzDQeduXQvNPKAhSoj5Mu431caYhg2PKhx8TdxUazJRA", "payload": "" } 2025-01-30 21:16:52,130:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613495675 HTTP/1.1" 200 827 2025-01-30 21:16:52,130:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:16:10 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UvlUZ57PeCheowMfZhc5R7Lwxf_mDThEAa4qUhx4gpWNyFuWzeE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:16:10Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613495675/OR7sGQ", "status": "pending", "token": "-N4wWQFOkzSF8ZGn4EebknObkGtUQ-conbTGk8O9Reo" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613495675/TKifNg", "status": "pending", "token": "-N4wWQFOkzSF8ZGn4EebknObkGtUQ-conbTGk8O9Reo" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613495675/DpTZMg", "status": "pending", "token": "-N4wWQFOkzSF8ZGn4EebknObkGtUQ-conbTGk8O9Reo" } ] } 2025-01-30 21:16:52,131:DEBUG:acme.client:Storing nonce: UvlUZ57PeCheowMfZhc5R7Lwxf_mDThEAa4qUhx4gpWNyFuWzeE 2025-01-30 21:16:52,131:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-30 21:16:52,131:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2025-01-30 21:16:52,132:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-30 21:16:52,132:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-30 21:16:52,133:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-30 21:16:52,133:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-30 21:16:52,133:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-30 21:16:52,133:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-30 21:16:52,134:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-30 21:16:52,182:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-30 21:16:52,367:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-30 21:16:52,369:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is signed by the certificate's issuer. 2025-01-30 21:16:52,369:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is: OCSPCertStatus.GOOD 2025-01-30 21:16:52,373:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:51 UTC. 2025-01-30 21:16:52,373:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-30 21:16:52,373:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-30 21:16:52,378:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-30 21:16:52,379:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-30 21:16:52,379:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-30 21:16:52,384:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-30 21:16:52,385:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-30 21:16:52,387:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-30 21:16:52,813:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-30 21:16:52,814:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:16:11 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "2KV_-Fd82eI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-30 21:16:52,814:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-30 21:16:58,962:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8995_key-certbot.pem 2025-01-30 21:17:05,028:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8993_csr-certbot.pem 2025-01-30 21:17:05,029:DEBUG:acme.client:Requesting fresh nonce 2025-01-30 21:17:05,029:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-30 21:17:05,172:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-30 21:17:05,173:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:16:23 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6Xwp1kpzH312RExleCxzSXyHwEKlJi_Uez9hXcjewiPlI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-30 21:17:05,173:DEBUG:acme.client:Storing nonce: TUC11O6Xwp1kpzH312RExleCxzSXyHwEKlJi_Uez9hXcjewiPlI 2025-01-30 21:17:05,173:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2025-01-30 21:17:05,180:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlh3cDFrcHpIMzEyUkV4bGVDeHpTWHlId0VLbEppX1VlejloWGNqZXdpUGxJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "wKQQz-VaQuCkzL18Onp6qiwAGkj-WAF9W8wyg9AKnbu8RAylvg40HH8KQOXkRjPLLhqppm6xeM6QBWbz-3hEUi5IXzcgRJk5Eb0PVWIXsHb7gOsHN66wh0Jz6uuTcyp_lVuwzZm1hZf9MrnbRMNbwW8djavjDqW_qjPgTMK-ZS-eUDa7jzlk2UaztTHS8aHDkaze636W1L2hduJjEu3aqv-4oeTwe5w1-4DOMuXIm-hdXdAOvWmnGpNgyz2KcVLwTvpcR5GR6BDqq3hT86VUrizzjgu_cDYjfdpZTZ7ptTDOjOqHmKc7DOruH1oENhkS9Ht03_n-YDYYS4UwkbfObw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2025-01-30 21:17:05,530:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 353 2025-01-30 21:17:05,531:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 30 Jan 2025 20:16:24 GMT Content-Type: application/json Content-Length: 353 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603747715 Replay-Nonce: TUC11O6XwbEkVH0tpQ6rvZ7FfqtCpTA4qj6ew0qFgYUfqRHFxs8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:16:23Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613569085" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603747715" } 2025-01-30 21:17:05,531:DEBUG:acme.client:Storing nonce: TUC11O6XwbEkVH0tpQ6rvZ7FfqtCpTA4qj6ew0qFgYUfqRHFxs8 2025-01-30 21:17:05,531:DEBUG:acme.client:JWS payload: b'' 2025-01-30 21:17:05,537:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613569085: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlh3YkVrVkgwdHBRNnJ2WjdGZnF0Q3BUQTRxajZldzBxRmdZVWZxUkhGeHM4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM1NjkwODUifQ", "signature": "jiFSfIz6gv6s6WA3sEBjtQoCvlCmliccXxrYoeMgd8Y6tFz_lbJFD_jpQUl7BwgZ1jDD4gpIX8hMMOrHha2xkR1495t5YOUV5mA1iOP17CsFSUtEKbEi1000Lbg7V8vOafL_wHvcAUlXTAFd_1YtgDqGlsA4V932XVGjKifIMTwMNJAjr57nMTvBQCWSGyzYgAEeDerApYYJQo4HCcLZArWzs5O0wqpTWKlUNypxudTj31pCRsDIwEjBHWNz3wY8DxpZQa1yx5fDsfBM1O9otakUUsyRJ6XhP_10XXOTvS3t4XHVikPxnbD0JHvfKTjOZnUEmRqBEkXuI2BboenVLQ", "payload": "" } 2025-01-30 21:17:05,691:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613569085 HTTP/1.1" 200 825 2025-01-30 21:17:05,692:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:16:24 GMT Content-Type: application/json Content-Length: 825 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6XHONKisD1-DYDAOYVoAQ67pP0Ter83-odx0JUHA4uld0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:16:23Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613569085/i556TQ", "status": "pending", "token": "voycDLD6WaIuZqIiZii35bQ8xrl32oR994HNkskXaVM" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613569085/67S_cA", "status": "pending", "token": "voycDLD6WaIuZqIiZii35bQ8xrl32oR994HNkskXaVM" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613569085/_lVOeQ", "status": "pending", "token": "voycDLD6WaIuZqIiZii35bQ8xrl32oR994HNkskXaVM" } ] } 2025-01-30 21:17:05,692:DEBUG:acme.client:Storing nonce: TUC11O6XHONKisD1-DYDAOYVoAQ67pP0Ter83-odx0JUHA4uld0 2025-01-30 21:17:05,693:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-30 21:17:05,693:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2025-01-30 21:17:05,694:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-30 21:17:05,694:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-30 21:17:05,694:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-30 21:17:05,695:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-30 21:17:05,695:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-30 21:17:05,695:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-30 21:17:05,696:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-30 21:17:05,748:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-30 21:17:05,939:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-30 21:17:05,941:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-30 21:17:05,941:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-30 21:17:05,945:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:13 UTC. 2025-01-30 21:17:05,947:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-30 21:17:05,947:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-30 21:17:05,952:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-30 21:17:05,952:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-30 21:17:05,952:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-30 21:17:05,957:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-30 21:17:05,957:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-30 21:17:05,959:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-30 21:17:06,431:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-30 21:17:06,432:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:16:25 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "7mVlQ6Fk5_4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-30 21:17:06,433:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-30 21:17:12,625:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8996_key-certbot.pem 2025-01-30 21:17:18,699:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8994_csr-certbot.pem 2025-01-30 21:17:18,699:DEBUG:acme.client:Requesting fresh nonce 2025-01-30 21:17:18,699:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-30 21:17:18,860:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-30 21:17:18,860:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:16:37 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aTttXYyyQ3_NIe-ot0L5q07Vw8d3-5wji60T53zPilEl0MCJM74 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-30 21:17:18,860:DEBUG:acme.client:Storing nonce: aTttXYyyQ3_NIe-ot0L5q07Vw8d3-5wji60T53zPilEl0MCJM74 2025-01-30 21:17:18,861:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2025-01-30 21:17:18,867:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXlRM19OSWUtb3QwTDVxMDdWdzhkMy01d2ppNjBUNTN6UGlsRWwwTUNKTTc0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "bHFQ43BpEfG1Ven8Tn-DhkittpQP6x10rtqOcc1mj3nIkEWBbVtEblDQ7Cnt5Icw4-2QLgFEfw6X9161VoBL3I_zierF2TlQV3d-zR16G4lvzUXkdNzvyd8rPEDE6RxrQFT6gq_t74HLB_F66f4c39dp0BppIDf3w2JcvbLsZ5HMXwBEyfse5WEsbvKOfz5uY1iEdBm802h0fC5w3H2J-xbfhGHj48Go7WxrffHH_XaiXMAGIXHWWvgfG_SeNF7PzvUItEk3rUZnLqDr4MmkCpKsc6uJOIPfi9g5lD3kgSLxkn93wPROrDBPGN4CHJ7U34tXjRPmCikX03RsYdtTUQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-01-30 21:17:19,063:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 352 2025-01-30 21:17:19,064:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 30 Jan 2025 20:16:37 GMT Content-Type: application/json Content-Length: 352 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603792325 Replay-Nonce: aTttXYyy1iAC60B0rtfthu51hlcV5CvKOErGSFnWbWoXgLPApXQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:16:37Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613637565" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603792325" } 2025-01-30 21:17:19,064:DEBUG:acme.client:Storing nonce: aTttXYyy1iAC60B0rtfthu51hlcV5CvKOErGSFnWbWoXgLPApXQ 2025-01-30 21:17:19,064:DEBUG:acme.client:JWS payload: b'' 2025-01-30 21:17:19,070:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613637565: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXkxaUFDNjBCMHJ0ZnRodTUxaGxjVjVDdktPRXJHU0ZuV2JXb1hnTFBBcFhRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM2Mzc1NjUifQ", "signature": "EAi6gc28QIpIzyfyNxqy_Alwkxuh7ckqH1URjuD8g8i9oL-tZcvs7YP-oBgSFOgkLXpx4PCZTviD_hmJj5c99AQtqnPLuUIWF_u-CW1YlyYQBjAwRe8E7UFMl3ac6GGAraztQzql9orbbDZZET0KRpx4WSdMT3PjSEIcCd6itBm4ADE5GtOcF52DIMQXuDuYUx80QitmpfOqeJPLDVfumANZI3WUVvWr-OXNkaRBLjRVmUxy8Zv_Yosbob8L6clTJfax1BdiKrXYa3tjNXGdKfag2sDMk5WRometnifIMKNcVzbICVmw0rAowfRbZwGICMe2NtsMqMO7tHDXCsDTSw", "payload": "" } 2025-01-30 21:17:19,234:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613637565 HTTP/1.1" 200 824 2025-01-30 21:17:19,235:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:16:37 GMT Content-Type: application/json Content-Length: 824 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: aTttXYyy-iNS2Rhr0UUJna_mat_-XXVvnbeNv1n9sQZ1A6ZTz-I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:16:37Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613637565/5bZpJA", "status": "pending", "token": "koSUgsC_SD5VGbDQ3X2SLH_w9qYfJ8H3V8YT4kweWIk" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613637565/HkAMUw", "status": "pending", "token": "koSUgsC_SD5VGbDQ3X2SLH_w9qYfJ8H3V8YT4kweWIk" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613637565/_4E6Mg", "status": "pending", "token": "koSUgsC_SD5VGbDQ3X2SLH_w9qYfJ8H3V8YT4kweWIk" } ] } 2025-01-30 21:17:19,235:DEBUG:acme.client:Storing nonce: aTttXYyy-iNS2Rhr0UUJna_mat_-XXVvnbeNv1n9sQZ1A6ZTz-I 2025-01-30 21:17:19,235:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-30 21:17:19,235:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2025-01-30 21:17:19,237:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-30 21:17:19,237:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-30 21:17:19,238:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-30 21:17:19,238:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-30 21:17:19,238:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-30 21:17:19,238:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-30 21:17:19,239:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-30 21:17:19,284:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2025-01-30 21:17:19,284:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-30 21:17:19,284:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2025-01-30 21:17:19,292:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2025-01-30 21:17:19,298:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2025-01-30 21:17:19,298:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2025-01-30 21:17:19,299:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2025-01-30 21:17:19,299:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2025-01-30 21:17:19,303:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2025-01-30 21:17:19,340:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-30 21:17:19,550:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-30 21:17:19,551:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-30 21:17:19,552:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-30 21:17:19,556:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:35 UTC. 2025-01-30 21:17:19,556:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-30 21:17:19,557:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-30 21:17:19,562:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-30 21:17:19,562:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-30 21:17:19,562:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-30 21:17:19,567:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-30 21:17:19,568:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-30 21:17:19,571:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-30 21:17:20,020:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-30 21:17:20,020:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:16:38 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "U9BccCZWa3M": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-30 21:17:20,021:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-30 21:17:26,443:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8997_key-certbot.pem 2025-01-30 21:17:32,518:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8995_csr-certbot.pem 2025-01-30 21:17:32,518:DEBUG:acme.client:Requesting fresh nonce 2025-01-30 21:17:32,518:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-30 21:17:32,665:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-30 21:17:32,666:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:16:51 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UvlUZ57PNO8mCoqjo4OtXsRP_uysgnrtgY1zTZAlEtMEY_wKJAY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-30 21:17:32,666:DEBUG:acme.client:Storing nonce: UvlUZ57PNO8mCoqjo4OtXsRP_uysgnrtgY1zTZAlEtMEY_wKJAY 2025-01-30 21:17:32,666:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2025-01-30 21:17:32,672:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVXZsVVo1N1BOTzhtQ29xam80T3RYc1JQX3V5c2ducnRnWTF6VFpBbEV0TUVZX3dLSkFZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "HuPL1pJJVFVIye9kKnvq8pjZYPUu4aIWRTGr106iv_LnkPRf6HCZY7xjo8pCTOi087lnAqFW9BmeffgraP8Zx9scHB0XIFdBdcH7ZxVdRbS7IOVH_H4Pr58GQK1gdDgXRLxB84-jkK2JhaO_9R8TCrs6FAiFtcKDh_lUsW42wJqbkL5CRJTiKZ_-mZSjM3LQ4YLTTWZdMq8D5d_TNcu2aDErisv2vGGbs0MaBQsGDv5pAMBQVRt15DV4A0a3ZmUcOCWRLmcC1cKuk4cpPK2awPgyT_dbZxEu91UcZ_XSCGFFV09fiKXtk_SCkkaMKymRRFTFHOa60Ac9Bvf3d0kRqA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-30 21:17:32,965:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 357 2025-01-30 21:17:32,966:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 30 Jan 2025 20:16:51 GMT Content-Type: application/json Content-Length: 357 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603833745 Replay-Nonce: TUC11O6XrzB0HLM3fi--Gs4C8lfEhz508wzTnvsg27rYcx_Y88U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:16:51Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613700475" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603833745" } 2025-01-30 21:17:32,966:DEBUG:acme.client:Storing nonce: TUC11O6XrzB0HLM3fi--Gs4C8lfEhz508wzTnvsg27rYcx_Y88U 2025-01-30 21:17:32,966:DEBUG:acme.client:JWS payload: b'' 2025-01-30 21:17:32,972:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613700475: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhyekIwSExNM2ZpLS1HczRDOGxmRWh6NTA4d3pUbnZzZzI3clljeF9ZODhVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM3MDA0NzUifQ", "signature": "wPYE8Lg5C9Wb6tqY7BjFiXrry53bpxFZjY9C6Z-t7-PNJ5R754WG05E_hC2Q2kvpfG6eSnh309WP_nLwmu-xw7dHE473j_kdK9XX5wk4kpCPC9knsSlImcGl7xWNjsPcoQ3fgQ_mGf_bj9GM29brQkIiDtycMvBLBu9hWjglZtGYFEWjezKFQROeJsiu17iV2SsNxjuZ5kVUUTXPsDFcJ8rG9agpr2YEEWfs0_bJPoObgcQIefvvhheWsv2uu444rmDOabD9-x-6nFybKCBYCnGnKmrut9-a5C9zMR1PJModB-21q6bklCFEnZU8gMP7h9GhwWYln_nS8y4Swi51fw", "payload": "" } 2025-01-30 21:17:33,126:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613700475 HTTP/1.1" 200 829 2025-01-30 21:17:33,127:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:16:51 GMT Content-Type: application/json Content-Length: 829 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6Xxl8NCdFqwp-ayNuSAhqHaBQEP3LLhAADaz8ttUlbQx4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:16:51Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613700475/4GWkdQ", "status": "pending", "token": "_3T_C3yuCWV4XSeLeRXCPycDIQnwxDGf-AyaPY9XlxE" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613700475/jElvnA", "status": "pending", "token": "_3T_C3yuCWV4XSeLeRXCPycDIQnwxDGf-AyaPY9XlxE" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613700475/B2drkw", "status": "pending", "token": "_3T_C3yuCWV4XSeLeRXCPycDIQnwxDGf-AyaPY9XlxE" } ] } 2025-01-30 21:17:33,127:DEBUG:acme.client:Storing nonce: TUC11O6Xxl8NCdFqwp-ayNuSAhqHaBQEP3LLhAADaz8ttUlbQx4 2025-01-30 21:17:33,128:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-30 21:17:33,128:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2025-01-30 21:17:33,128:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-30 21:17:33,129:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-30 21:17:33,129:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-30 21:17:33,130:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-30 21:17:33,130:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-30 21:17:33,130:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-30 21:17:33,131:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-30 21:17:33,179:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-30 21:17:33,355:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-30 21:17:33,357:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-30 21:17:33,357:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-30 21:17:33,362:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:05 UTC. 2025-01-30 21:17:33,362:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-30 21:17:33,362:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-30 21:17:33,367:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-30 21:17:33,367:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-30 21:17:33,367:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-30 21:17:33,372:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-30 21:17:33,372:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-30 21:17:33,374:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-30 21:17:33,808:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-30 21:17:33,808:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:16:52 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "4rAo6kHSXZc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-30 21:17:33,809:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-30 21:17:39,853:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8998_key-certbot.pem 2025-01-30 21:17:45,862:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8996_csr-certbot.pem 2025-01-30 21:17:45,863:DEBUG:acme.client:Requesting fresh nonce 2025-01-30 21:17:45,863:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-30 21:17:46,011:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-30 21:17:46,011:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:17:04 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6XHYj8BH97uKrtoKRPQu-qz74PpDwHkA23R7skrBmExTA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-30 21:17:46,011:DEBUG:acme.client:Storing nonce: TUC11O6XHYj8BH97uKrtoKRPQu-qz74PpDwHkA23R7skrBmExTA 2025-01-30 21:17:46,012:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2025-01-30 21:17:46,018:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhIWWo4Qkg5N3VLcnRvS1JQUXUtcXo3NFBwRHdIa0EyM1I3c2tyQm1FeFRBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Grhd2WBXjdWCOyqn2_0TW86Nh7UMjvlFoIzdB7CB0GOmT8NR_KcXU_fcwvYH6m2UkhU3B7HlNV2VH6-WQbijJwXsBRbx_zLbC7Dz2ZWegMDFOu3RIMJqf27X_r9RdjU2kdRfMOCbV9c9UX0_w78hoVamxz7VWml6L-yCXUwUFyi-trDKtY0usJ_B9sqUwiQRZqEWgEhvNNg2mmiJsCRjqDTp4FWh8dk6PCbUPWE_uyb1L6De6U6qO3JLx4qgIUZThRARBMWTU5P4j7-2qy9zxWGbI3O5LAbUY15_2106d5XtyWGZP4QDuFSCme2-9qcsb9pEQS8O436yK0u-FIfwuA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2025-01-30 21:17:46,284:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356 2025-01-30 21:17:46,284:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 30 Jan 2025 20:17:04 GMT Content-Type: application/json Content-Length: 356 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603881465 Replay-Nonce: TUC11O6X5a_8JnGghTcpdIfyoNHAdRc6MKS9oA7jVSAVTGkaadA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:17:04Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613770605" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603881465" } 2025-01-30 21:17:46,285:DEBUG:acme.client:Storing nonce: TUC11O6X5a_8JnGghTcpdIfyoNHAdRc6MKS9oA7jVSAVTGkaadA 2025-01-30 21:17:46,285:DEBUG:acme.client:JWS payload: b'' 2025-01-30 21:17:46,291:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613770605: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlg1YV84Sm5HZ2hUY3BkSWZ5b05IQWRSYzZNS1M5b0E3alZTQVZUR2thYWRBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM3NzA2MDUifQ", "signature": "aMNWbHKuoDmf-tWAByVEXVKz8vd3-jl2Xt59a32OxPtt3vkxj83jE2rH-qNy9WL0_Nf4viGzPy6k3Wl0FGKeOYIyMpS-eOVgzCBju-9bXy6QR7skd3QRrdmx5yICxBk9RTweBH__saeGtJOlnPLLMVj1HN2zmmctAahU0zcYMrgbYNZOvOtNm8TwSzeKp0HNNV_edtkuxfRjIbgPFkLLF5J6rQKInK_Wv0D4v3SZi67Oow0NGg8j8Uh9So343k0yPucvjQl85WhYm9uabEeq--puMiSrOAk-ZsSo9vrUU337xJZg15GjwefIDtR9MhdIsdlyz9j_O61YYjjqNwDgHQ", "payload": "" } 2025-01-30 21:17:46,438:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613770605 HTTP/1.1" 200 828 2025-01-30 21:17:46,439:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:17:05 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6XuqaT_EJRTrQfqVQDeze0EXFzuq1XGlJLuBwcguQHrGQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:17:04Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613770605/9nrvYA", "status": "pending", "token": "a_L9ZYSN7UCXXgi8qZoJiOQo70GFjG_W81I9wg8pLws" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613770605/F9o6HQ", "status": "pending", "token": "a_L9ZYSN7UCXXgi8qZoJiOQo70GFjG_W81I9wg8pLws" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613770605/QBtWUw", "status": "pending", "token": "a_L9ZYSN7UCXXgi8qZoJiOQo70GFjG_W81I9wg8pLws" } ] } 2025-01-30 21:17:46,439:DEBUG:acme.client:Storing nonce: TUC11O6XuqaT_EJRTrQfqVQDeze0EXFzuq1XGlJLuBwcguQHrGQ 2025-01-30 21:17:46,439:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-30 21:17:46,440:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2025-01-30 21:17:46,440:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-30 21:17:46,441:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-30 21:17:46,441:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-30 21:17:46,441:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-30 21:17:46,442:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-30 21:17:46,442:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-30 21:17:46,443:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-30 21:17:46,494:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-30 21:17:46,688:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-30 21:17:46,689:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2025-01-30 21:17:46,690:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2025-01-30 21:17:46,694:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:33 UTC. 2025-01-30 21:17:46,695:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-30 21:17:46,695:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-30 21:17:46,701:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-30 21:17:46,701:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-30 21:17:46,701:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-30 21:17:46,706:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-30 21:17:46,707:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-30 21:17:46,709:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-30 21:17:47,150:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-30 21:17:47,150:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:17:05 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "8aOl7zzDDqc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-30 21:17:47,151:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-30 21:17:53,521:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8999_key-certbot.pem 2025-01-30 21:17:59,668:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8997_csr-certbot.pem 2025-01-30 21:17:59,669:DEBUG:acme.client:Requesting fresh nonce 2025-01-30 21:17:59,669:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-30 21:17:59,817:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-30 21:17:59,818:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:17:18 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: UvlUZ57P4OGoXJGhuqeUUv6-KO_jyHriVjRb1YdWO__QOhxeRgE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-30 21:17:59,818:DEBUG:acme.client:Storing nonce: UvlUZ57P4OGoXJGhuqeUUv6-KO_jyHriVjRb1YdWO__QOhxeRgE 2025-01-30 21:17:59,818:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2025-01-30 21:17:59,824:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVXZsVVo1N1A0T0dvWEpHaHVxZVVVdjYtS09fanlIcmlWalJiMVlkV09fX1FPaHhlUmdFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Z0hjZKqo68IDY_0q0v67YTWeqqOH44B0FSeo2drRD2RzFhO4U-ZjKnsJ6EY2gBc3uKl0eaPuswnvmx2ZGTot0es7Dlzf2G_NEaYkmKkQpOtyWXthLk_y28Tuv-Pv6kyvx6B1Si_x2WniSq8T6VgFViC1WJxaJ_IgEdUErNg8hMCLTynMLOYMbCrgUsQ3-V31UEx-jfzPreaRKdWocIiYaw6x7K_HIdLxzsRO9f-F_P1pM0mQyR--jRVhJ6MYA_i_hvPTeMPsTVljdpTpVUd5MGJL1R_R7qI2pZCsrKPfLlC-TcHtVXgYckXEMZICBhnuFT-qJYlcak8C4sw_BcwEsQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-01-30 21:18:00,098:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2025-01-30 21:18:00,099:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 30 Jan 2025 20:17:18 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603934575 Replay-Nonce: UvlUZ57PXqrUleUsa2Bw1QEJVy-P0E3CWB0w4LuaptZcTYByi-A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:17:18Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613854905" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603934575" } 2025-01-30 21:18:00,099:DEBUG:acme.client:Storing nonce: UvlUZ57PXqrUleUsa2Bw1QEJVy-P0E3CWB0w4LuaptZcTYByi-A 2025-01-30 21:18:00,100:DEBUG:acme.client:JWS payload: b'' 2025-01-30 21:18:00,105:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613854905: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVXZsVVo1N1BYcXJVbGVVc2EyQncxUUVKVnktUDBFM0NXQjB3NEx1YXB0WmNUWUJ5aS1BIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM4NTQ5MDUifQ", "signature": "mH7LVzlz5HWU3BCmR2QhECHX1IvCVzd1gU0L4JMMCDIDMkaiMa-ElV2GKWkWxaXQE6H4RgKi68vMC2HimampkXSb_nYJlUrhtPGt_coxvvcy64gZQ341ZC4XCAQlegfQ7BCzJuxcPFG4R6Z4dm0R8VlHM4SXd4wF_haM2Qn0LOWE7d9FFkeBgW8kb-7v8oDzN6_nl7tFctfKJvbC4pn6fnTqV7PNDbkRe1_XSu0WmcAHYKfXnvLYdtkw2bmBmT4Mj3TqbGvsgeaxuUVHWrl1OI--t3bhUBk6IbMLWAo18TivL3Rduy14_RpS86EX6BlpBsIgSgPkgSHFdn9Tb5x7Pw", "payload": "" } 2025-01-30 21:18:00,264:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613854905 HTTP/1.1" 200 827 2025-01-30 21:18:00,265:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:17:18 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6X3f8yDmPKhOK0CKvM8bKMUywzsVwlyHEOmW_8wInN_q4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:17:18Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613854905/bMnPCg", "status": "pending", "token": "IK7vYZaRda0VTDtKKQsecohpYPhsEngjBQ1X3SBv7HQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613854905/7RtzaQ", "status": "pending", "token": "IK7vYZaRda0VTDtKKQsecohpYPhsEngjBQ1X3SBv7HQ" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613854905/ke1eMQ", "status": "pending", "token": "IK7vYZaRda0VTDtKKQsecohpYPhsEngjBQ1X3SBv7HQ" } ] } 2025-01-30 21:18:00,265:DEBUG:acme.client:Storing nonce: TUC11O6X3f8yDmPKhOK0CKvM8bKMUywzsVwlyHEOmW_8wInN_q4 2025-01-30 21:18:00,265:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-30 21:18:00,267:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2025-01-30 21:18:00,267:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-30 21:18:00,267:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-30 21:18:00,268:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-30 21:18:00,268:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-30 21:18:00,268:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-30 21:18:00,268:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-30 21:18:00,269:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-30 21:18:00,316:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-30 21:18:00,519:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-30 21:18:00,520:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2025-01-30 21:18:00,520:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2025-01-30 21:18:00,524:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:54 UTC. 2025-01-30 21:18:00,525:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-30 21:18:00,525:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-30 21:18:00,530:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-30 21:18:00,530:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-30 21:18:00,530:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-30 21:18:00,535:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-30 21:18:00,536:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-30 21:18:00,538:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-30 21:18:01,000:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-30 21:18:01,001:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:17:19 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "0ZMDZcAd0Pc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-30 21:18:01,001:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-30 21:18:07,312:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9000_key-certbot.pem 2025-01-30 21:18:13,352:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8998_csr-certbot.pem 2025-01-30 21:18:13,353:DEBUG:acme.client:Requesting fresh nonce 2025-01-30 21:18:13,353:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-30 21:18:13,508:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-30 21:18:13,509:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:17:32 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8iyB6APLJYiZ5yZWkGK1YIhbFsgD6TMZ32_dFKY9yrom0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-30 21:18:13,509:DEBUG:acme.client:Storing nonce: hXNDuA8iyB6APLJYiZ5yZWkGK1YIhbFsgD6TMZ32_dFKY9yrom0 2025-01-30 21:18:13,509:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2025-01-30 21:18:13,517:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGl5QjZBUExKWWlaNXlaV2tHSzFZSWhiRnNnRDZUTVozMl9kRktZOXlyb20wIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Pmy6FHNw6Gzo8HYl8oliRlvvnKjqrF0sz8QCyJUrXEqI9H2gXV2PZ-D4t5iBH0zi0Q2SLUOmVkfqLuiLlDeBYmgVu8GsTOTikZwXthb15dw5PkLKHB3G03oN4caW_EJhBFjY3K40Mj8-zKlv4t7RoeiJKcf0Bd6JOf54vTLkSgVdhOkEVYwfn9vwLjkNOR1XW6pHt9VzhUaRaLeaA3YcoPW4PvGyO20M9A3MGeV85uZLyKxSZFYJvsYQpxk--nF06SUwIv6KmdO2oxJvFDct-4tIHpKDFE7Fagk8HdSpdyStjuzP0z0lu_eeHB3QF9Mq39-sh3aXvm_vji7ZGd-MCA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-30 21:18:13,701:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-30 21:18:13,702:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 30 Jan 2025 20:17:32 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349603978585 Replay-Nonce: hXNDuA8iU0H1r9cUKg1Iug3Se0MG1haDGJkpCSQAaBkeYDEdDaQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:17:32Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613923815" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349603978585" } 2025-01-30 21:18:13,702:DEBUG:acme.client:Storing nonce: hXNDuA8iU0H1r9cUKg1Iug3Se0MG1haDGJkpCSQAaBkeYDEdDaQ 2025-01-30 21:18:13,702:DEBUG:acme.client:JWS payload: b'' 2025-01-30 21:18:13,708:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613923815: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGlVMEgxcjljVUtnMUl1ZzNTZTBNRzFoYURHSmtwQ1NRQWFCa2VZREVkRGFRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM5MjM4MTUifQ", "signature": "U4zpki7sbvVVMYMffT24c5hT6kZ3M_QPbA4nYOWYIwuTyT4ACx_oPmdahb2eCx6UAK8q68NaRfleLK1U0YR6npakSKyTCudP64GQx4Sws36P6YancQmB1muCuVPA133KEzQ_gHwdlalgWdniX8bkqmH2XuoNe5XeRW0A-w9YhjW0KX-YnDWczfbo9VRJPhCApeVuKoetjnAH0GAd6QyryBSrEDWUVrqK9PjpTIzi95Thelrz7QiLrj7Qb7-6qZRxMvMUUXF1QmRx3Jb5uQPg0CBj4GO7DwY8p4dXVStht9EFbUBZlCSym-V1Nxerr2CdvKpgkrqEYjPMAHM13QxYoA", "payload": "" } 2025-01-30 21:18:13,879:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613923815 HTTP/1.1" 200 823 2025-01-30 21:18:13,879:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:17:32 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8i0kI0ntiQq5h709oYIQ7T1mA3Dk3Hxb4odcatcVUYbA0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:17:32Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613923815/wvLngQ", "status": "pending", "token": "m7yyxIJSFIemVfF7rkix7A6ntmc25SA7QMkT0Knl1qI" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613923815/wNRiHQ", "status": "pending", "token": "m7yyxIJSFIemVfF7rkix7A6ntmc25SA7QMkT0Knl1qI" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613923815/t9VvUw", "status": "pending", "token": "m7yyxIJSFIemVfF7rkix7A6ntmc25SA7QMkT0Knl1qI" } ] } 2025-01-30 21:18:13,880:DEBUG:acme.client:Storing nonce: hXNDuA8i0kI0ntiQq5h709oYIQ7T1mA3Dk3Hxb4odcatcVUYbA0 2025-01-30 21:18:13,880:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-30 21:18:13,881:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2025-01-30 21:18:13,881:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-30 21:18:13,881:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-30 21:18:13,882:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-30 21:18:13,882:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-30 21:18:13,882:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-30 21:18:13,883:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-30 21:18:13,884:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-30 21:18:13,932:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-30 21:18:14,141:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-30 21:18:14,142:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-30 21:18:14,143:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-30 21:18:14,147:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:15 UTC. 2025-01-30 21:18:14,147:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-30 21:18:14,148:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-30 21:18:14,153:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-30 21:18:14,153:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-30 21:18:14,153:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-30 21:18:14,158:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-30 21:18:14,159:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-30 21:18:14,161:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-30 21:18:14,588:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-30 21:18:14,589:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:17:33 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "2kFRMvk94b4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-30 21:18:14,589:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-30 21:18:21,262:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9001_key-certbot.pem 2025-01-30 21:18:27,288:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8999_csr-certbot.pem 2025-01-30 21:18:27,289:DEBUG:acme.client:Requesting fresh nonce 2025-01-30 21:18:27,289:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-30 21:18:27,433:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-30 21:18:27,434:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:17:46 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6XQcaFni0U1DQQTF7KJje39xpFt8H-ukYRvY01HgFL3Zk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-30 21:18:27,434:DEBUG:acme.client:Storing nonce: TUC11O6XQcaFni0U1DQQTF7KJje39xpFt8H-ukYRvY01HgFL3Zk 2025-01-30 21:18:27,434:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2025-01-30 21:18:27,440:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVFVDMTFPNlhRY2FGbmkwVTFEUVFURjdLSmplMzl4cEZ0OEgtdWtZUnZZMDFIZ0ZMM1prIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "E6XXwxYvUU15kRKgFB9bS71LFSRo8NYaKQVhuypU_p6g2ZeB2fsOh0Ix_e8FrdnVwW2Z4aFHwAwAOj1Mo1GUL8FviRtExdsvqPR5O-X8sBwZzSNrj8JAxvXzdCH8i8eWfktA98qH8YckREEML3TuVB1Fmzh_Hp6GLb8JlJ72PCnamO-uJf6dvqYMqtvJ73cm0jD0MMKn7Ffd-ymtIJwluZI6DSqST0f_iub_EK80rdkEBy0J3sXAzPdeX9HPOudkjtxcvYVV_FODE_6dYRk1E68pNEfnUJm5yShGtwP95pLx5_UQQ6xG-gDrwYnJT0mgyn0jrSmvDNAY_NoL1WZWtQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-30 21:18:27,836:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-30 21:18:27,837:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 30 Jan 2025 20:17:46 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349604024205 Replay-Nonce: UvlUZ57Pj9L4Lk9zWOhcVj9_N7JlLjtsJKGEv_xMjfEW2gH-97g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:17:46Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613992955" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349604024205" } 2025-01-30 21:18:27,837:DEBUG:acme.client:Storing nonce: UvlUZ57Pj9L4Lk9zWOhcVj9_N7JlLjtsJKGEv_xMjfEW2gH-97g 2025-01-30 21:18:27,838:DEBUG:acme.client:JWS payload: b'' 2025-01-30 21:18:27,844:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468613992955: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiVXZsVVo1N1BqOUw0TGs5eldPaGNWajlfTjdKbExqdHNKS0dFdl94TWpmRVcyZ0gtOTdnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTM5OTI5NTUifQ", "signature": "b_tOVgHGjqwL65B75BcRA7qNJ7RCHuFvkPh9hzTKC_JF90sctRm4VEU5WjLW78KZt_tY1tBDztPUuE8xJ9o6WroNSSkgjJiMBa3XGd8dk6TX5uGzBa-mnU5TVh3y5q2gjVj1NHGZDdyI3NHaGi2vtm_QK0pI6bzU6f1246caMyzW26si8rl8jzI_lAfXgC_ROA1tRNdfwEz5f_gyTDHRho-AlgNaS2ZwTaXlnJsVczzol9NfqRMOJ9lJjaYEdkGrx67QGkT6pgSKU84ZG6oS-OC_FxwVgo-MGNRYVh9OaBFf3eCPwFwTZSAhofKJrkC61JyWurjBtXd0Kwy-9pHcZw", "payload": "" } 2025-01-30 21:18:28,006:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468613992955 HTTP/1.1" 200 823 2025-01-30 21:18:28,007:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:17:46 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: TUC11O6Xx7lrUJfmlyv9HFxD-AzpE-Y08m5bolozQPMTkG4zn8c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:17:46Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613992955/G_4bSw", "status": "pending", "token": "6MJOC_tlqp2eo7XHm1FAxeHMF3eocZ9KkmW5bas3nAw" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613992955/xSdP2A", "status": "pending", "token": "6MJOC_tlqp2eo7XHm1FAxeHMF3eocZ9KkmW5bas3nAw" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468613992955/Sy2Pkg", "status": "pending", "token": "6MJOC_tlqp2eo7XHm1FAxeHMF3eocZ9KkmW5bas3nAw" } ] } 2025-01-30 21:18:28,007:DEBUG:acme.client:Storing nonce: TUC11O6Xx7lrUJfmlyv9HFxD-AzpE-Y08m5bolozQPMTkG4zn8c 2025-01-30 21:18:28,007:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-30 21:18:28,009:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2025-01-30 21:18:28,009:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-30 21:18:28,010:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-30 21:18:28,010:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-30 21:18:28,011:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-30 21:18:28,011:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-30 21:18:28,011:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-30 21:18:28,011:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-30 21:18:28,053:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-30 21:18:28,271:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-30 21:18:28,272:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2025-01-30 21:18:28,273:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2025-01-30 21:18:28,278:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:38 UTC. 2025-01-30 21:18:28,278:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-30 21:18:28,278:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-30 21:18:28,284:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-30 21:18:28,284:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-30 21:18:28,284:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-30 21:18:28,288:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-30 21:18:28,289:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-30 21:18:28,291:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-30 21:18:28,762:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-30 21:18:28,762:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:17:47 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "DbLnVwn_ZDA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-30 21:18:28,763:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-30 21:18:35,273:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\9002_key-certbot.pem 2025-01-30 21:18:41,610:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\9000_csr-certbot.pem 2025-01-30 21:18:41,611:DEBUG:acme.client:Requesting fresh nonce 2025-01-30 21:18:41,611:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-30 21:18:41,765:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-30 21:18:41,766:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:18:00 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8i7TIgecUPH6CAZnjShLKqZzuUJ_0a8JJ8xteYLu37urI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-30 21:18:41,766:DEBUG:acme.client:Storing nonce: hXNDuA8i7TIgecUPH6CAZnjShLKqZzuUJ_0a8JJ8xteYLu37urI 2025-01-30 21:18:41,766:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2025-01-30 21:18:41,772:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiaFhORHVBOGk3VElnZWNVUEg2Q0FabmpTaExLcVp6dVVKXzBhOEpKOHh0ZVlMdTM3dXJJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "jHLstyvxOVXfiLrMiHONFa9iNGLIhU22cmJWAoftwjIvMsbwZv47rQ4Sb19ec-5r-TtgzJ8BxlOHoXsmni3lI-k9buVlRJd1ioYJ1Zkl9R520quzivpPtrTrGA7IwZJWU0ODWIIotnd-uaf3TremxBI62IGPI8_Q9ZgBynAbXYt_nojLiwtHyCBvTH8O6LolTm5FtPKvYuZrbikcVqahey_UHYy1x0S7I9Q628Eu_6WnLMhFSX0l0TtTqJLXmirOPP3Hp0yWfEkT379jJ6GuMwnDLozdnoGwNEl-9NC48sltUux2fzD_2CdzD8NaE9R62WRO0eCFujXY9s0SGEyqHg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-30 21:18:41,961:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-30 21:18:41,962:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 30 Jan 2025 20:18:00 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/349604068465 Replay-Nonce: aTttXYyyBTvyemmAqA_Ug__HVACkazsMocHcDRQ5sDePtDm6w04 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-06T20:18:00Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468614059925" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/349604068465" } 2025-01-30 21:18:41,962:DEBUG:acme.client:Storing nonce: aTttXYyyBTvyemmAqA_Ug__HVACkazsMocHcDRQ5sDePtDm6w04 2025-01-30 21:18:41,962:DEBUG:acme.client:JWS payload: b'' 2025-01-30 21:18:41,968:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/468614059925: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiYVR0dFhZeXlCVHZ5ZW1tQXFBX1VnX19IVkFDa2F6c01vY0hjRFJRNXNEZVB0RG02dzA0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80Njg2MTQwNTk5MjUifQ", "signature": "ptlgRVogbU15D_gTAzaJ5ST_EDK0EkkshUh_dDRB_g6JNi55VCPmgZavdUGd6EOg1BG9AYa4WRC3-zWD-wJ5QEy7xALAh_pmvJJT_YLpWDuZBmyRrG8Gx2K6abDOKoQ7POpxsjzOeubKs34nAq0H1SlS63izwgI0hoqCi7giBmjM7-JU0iyK1FMq4UQD_cb_ys3wceY8Veq8prjTeLIR9YGtw1TlBHg-HyFJLfEH5YJwCLpZNgSzQLlWFd1YkhDCVCGgFmzsLjl8nYDDRka3KFo2rgKgDfMr33Fg8mz2dMKbZO3-xaEvQrrAwOUwR0NdlGbLrejX6JtWLDS0YdjtqA", "payload": "" } 2025-01-30 21:18:42,128:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/468614059925 HTTP/1.1" 200 823 2025-01-30 21:18:42,129:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 30 Jan 2025 20:18:00 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: hXNDuA8iDXXuqCE_yfKDVJbvPCxTKYaQ66VrVIMz3KPlqdrIww4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2025-02-06T20:18:00Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468614059925/f-K6ug", "status": "pending", "token": "wxzPthxA_2D1WM9MuMnylOPR_2v6PcertENLY_gigks" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468614059925/YrgyBQ", "status": "pending", "token": "wxzPthxA_2D1WM9MuMnylOPR_2v6PcertENLY_gigks" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/468614059925/B9cGNQ", "status": "pending", "token": "wxzPthxA_2D1WM9MuMnylOPR_2v6PcertENLY_gigks" } ] } 2025-01-30 21:18:42,129:DEBUG:acme.client:Storing nonce: hXNDuA8iDXXuqCE_yfKDVJbvPCxTKYaQ66VrVIMz3KPlqdrIww4 2025-01-30 21:18:42,129:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-30 21:18:42,130:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2025-01-30 21:18:42,130:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-30 21:18:42,131:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-30 21:18:42,131:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-30 21:18:42,131:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-30 21:18:42,132:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-30 21:18:42,132:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-30 21:18:42,133:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-30 21:18:42,133:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2025-01-30 21:18:42,133:ERROR:certbot._internal.renewal: C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2025-01-30 21:18:42,134:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 11 renew failure(s), 0 parse failure(s) 2025-01-30 21:18:42,137:ERROR:certbot._internal.log:11 renew failure(s), 0 parse failure(s)