2025-01-29 11:41:38,246:DEBUG:certbot._internal.main:certbot version: 1.6.0 2025-01-29 11:41:38,246:DEBUG:certbot._internal.main:Arguments: [] 2025-01-29 11:41:38,246:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2025-01-29 11:41:38,972:DEBUG:certbot._internal.log:Root logging level set at 20 2025-01-29 11:41:38,972:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2025-01-29 11:41:39,012:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2025-01-29 11:41:39,052:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-29 11:41:39,360:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-29 11:41:39,361:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2025-01-29 11:41:39,365:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2025-01-29 11:41:39,374:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-29 11:41:39,377:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-29 11:41:39,416:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-29 11:41:39,599:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-29 11:41:39,600:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is signed by the certificate's issuer. 2025-01-29 11:41:39,600:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD 2025-01-29 11:41:39,604:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-29 11:41:39,608:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-29 11:41:39,646:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-29 11:41:39,811:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-29 11:41:39,812:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2025-01-29 11:41:39,813:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2025-01-29 11:41:39,817:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-29 11:41:39,822:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-29 11:41:39,858:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-29 11:41:40,027:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-29 11:41:40,029:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is signed by the certificate's issuer. 2025-01-29 11:41:40,029:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is: OCSPCertStatus.GOOD 2025-01-29 11:41:40,033:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-29 11:41:40,036:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-29 11:41:40,074:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-29 11:41:40,242:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-29 11:41:40,243:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert22.pem is signed by the certificate's issuer. 2025-01-29 11:41:40,244:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD 2025-01-29 11:41:40,249:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-29 11:41:40,253:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-29 11:41:40,291:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-29 11:41:40,474:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-29 11:41:40,476:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-29 11:41:40,476:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-29 11:41:40,481:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:13:49 UTC. 2025-01-29 11:41:40,481:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-29 11:41:40,481:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-29 11:41:40,486:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-29 11:41:40,487:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-29 11:41:40,487:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-29 11:41:40,493:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-29 11:41:40,494:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-29 11:41:40,497:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-29 11:41:40,949:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-29 11:41:40,949:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:40:59 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "vB7qKuonw0g": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2025-01-29 11:41:40,950:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-29 11:41:48,451:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8973_key-certbot.pem 2025-01-29 11:41:55,743:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8971_csr-certbot.pem 2025-01-29 11:41:55,744:DEBUG:acme.client:Requesting fresh nonce 2025-01-29 11:41:55,744:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-29 11:41:55,895:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-29 11:41:55,895:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:41:14 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: KY2mD_AjNK5YsaA7dyKhhEUe0F3Qy1okwQzGXVr8urLR5tVlGiA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-29 11:41:55,895:DEBUG:acme.client:Storing nonce: KY2mD_AjNK5YsaA7dyKhhEUe0F3Qy1okwQzGXVr8urLR5tVlGiA 2025-01-29 11:41:55,896:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2025-01-29 11:41:55,901:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWpOSzVZc2FBN2R5S2hoRVVlMEYzUXkxb2t3UXpHWFZyOHVyTFI1dFZsR2lBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "XENBWAnG9WgtGlnGJjnt0kD2avGXEYB-OvFGp-AMneOxQtk_kKZkwgt1ZfsV2XEQlAXPCkTBQoTl47Cah3r7PxCCvHCcirX8bNZ8fBoEg2XtydIJW44CSH5xiGFiQ7VP7FWajQMYuWwqAfDfAZSL7rtZldobnltp0b2W1Dqdh-Gfdk0VUdZtbBMD9PssVgtjUMSC9CI6Bt_V8juP3wD_Yqrjr1Iqz_pzxOlY2NVI3l_TiOtLocW1SFqDqTgnaWg2sI9ubr5wloCWt80u8vJ7hJME_ffoa94eU8fPWRxXsfjehXxzbGzPqQOt8KcEjKooY-LEJjuqIsyXU4i8dqmduw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-29 11:41:56,099:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-29 11:41:56,100:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 29 Jan 2025 10:41:14 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140171795 Replay-Nonce: Z6auUXuuqVpm-XfGiCmoudvENvjQlWLQzg-q4zMwnzmt4NW2IWs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:50:04Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464853999535" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140171795" } 2025-01-29 11:41:56,100:DEBUG:acme.client:Storing nonce: Z6auUXuuqVpm-XfGiCmoudvENvjQlWLQzg-q4zMwnzmt4NW2IWs 2025-01-29 11:41:56,100:DEBUG:acme.client:JWS payload: b'' 2025-01-29 11:41:56,106:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464853999535: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVxVnBtLVhmR2lDbW91ZHZFTnZqUWxXTFF6Zy1xNHpNd256bXQ0TlcySVdzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTM5OTk1MzUifQ", "signature": "moQzaBW3oBJWR3c7O16m-Qnub9EwQxEIez6sGfllrp8CzaTQABrFmKJIIMewc7IeogenSyC1qHYy4_Uqkm35AZkRHQztAF-J1CUK--igE4j0BtfGfEkGUNp3nymNcF6e_hHXDfAhc1IUg-rxxf2Uc1ZTCv6oUl2aNdGN-TBgoQLr2BdK64nQegfhZReFgYYzKY5ohzLyT0KVewQrfRhZN5RcLI2VSULr11mlocfPhX3hqShIUL0joBdJMCHd-qYg4Sc6XOwhxQMIfKC92n1Wtw46HCRiy-KjCRgVjKepK6IuKy5eEeXqxFiS3yHULVh2MSYIubfwYq2yNi75kNsaQg", "payload": "" } 2025-01-29 11:41:56,263:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464853999535 HTTP/1.1" 200 823 2025-01-29 11:41:56,264:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:41:14 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: KY2mD_AjLTJGq7kIzTJkdz9EBWV4HjS9UYhcbasjce8qtL0ERbc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:50:04Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464853999535/_gvNVQ", "status": "pending", "token": "LhsM0YxGT1dL4stq2Tmlq4O2ZKuaujacf5ySryXsyhQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464853999535/PVUjPA", "status": "pending", "token": "LhsM0YxGT1dL4stq2Tmlq4O2ZKuaujacf5ySryXsyhQ" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464853999535/Gzz9fw", "status": "pending", "token": "LhsM0YxGT1dL4stq2Tmlq4O2ZKuaujacf5ySryXsyhQ" } ] } 2025-01-29 11:41:56,264:DEBUG:acme.client:Storing nonce: KY2mD_AjLTJGq7kIzTJkdz9EBWV4HjS9UYhcbasjce8qtL0ERbc 2025-01-29 11:41:56,264:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-29 11:41:56,265:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2025-01-29 11:41:56,266:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-29 11:41:56,266:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-29 11:41:56,274:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-29 11:41:56,274:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-29 11:41:56,274:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-29 11:41:56,275:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-29 11:41:56,286:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-29 11:41:56,327:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-29 11:41:56,500:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-29 11:41:56,502:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2025-01-29 11:41:56,502:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2025-01-29 11:41:56,506:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:20 UTC. 2025-01-29 11:41:56,506:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-29 11:41:56,508:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-29 11:41:56,513:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-29 11:41:56,513:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-29 11:41:56,513:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-29 11:41:56,518:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-29 11:41:56,519:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-29 11:41:56,520:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-29 11:41:56,969:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-29 11:41:56,969:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:41:15 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "fDZvBKK5PzA": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-29 11:41:56,969:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-29 11:42:04,018:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8974_key-certbot.pem 2025-01-29 11:42:10,837:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8972_csr-certbot.pem 2025-01-29 11:42:10,838:DEBUG:acme.client:Requesting fresh nonce 2025-01-29 11:42:10,838:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-29 11:42:10,988:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-29 11:42:10,989:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:41:29 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Z6auUXuu_ANn88qk6EcdkGABTox0VQrURw_1ez9ePLDPiwYvOtw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-29 11:42:10,989:DEBUG:acme.client:Storing nonce: Z6auUXuu_ANn88qk6EcdkGABTox0VQrURw_1ez9ePLDPiwYvOtw 2025-01-29 11:42:10,989:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2025-01-29 11:42:10,996:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVfQU5uODhxazZFY2RrR0FCVG94MFZRclVSd18xZXo5ZVBMRFBpd1l2T3R3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Znn2A6kjfwA55oLFDRwtSA9GU2va1H_ENtgpGwm94zQT4jy--eRIw1W3u7mkUKKB3L_-e61QCTrhYG8zjFBcKXWQv64hyp0I3Oru95ZVmmwFIYwCe1DNX5iuv1FWu5ajFA3MMS4LJt5MWXszUnI4RMugzLYizVLrdJZDg-tWAUmoJL0raJyClzNQKNSjLb8ldsnFssLE9QWqsK_5o2oxHOd7difKJTBDWFrzegBTezCznNHqWmiOC9OeQCj3Vmt8qdZDQ7gUjhoj8PUqzTXPs6EH8yYCX31Q3JK_gGb2zCBYDuG4v4Fmg7GwwpZyac2stU8ybebEVAEti7rhDhabXw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-01-29 11:42:11,195:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2025-01-29 11:42:11,197:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 29 Jan 2025 10:41:29 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140234075 Replay-Nonce: Z6auUXuugqQeZeBsusljIFW2fySovGRsw3qAwWOxs-LErBloxpc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:50:18Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854097235" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140234075" } 2025-01-29 11:42:11,197:DEBUG:acme.client:Storing nonce: Z6auUXuugqQeZeBsusljIFW2fySovGRsw3qAwWOxs-LErBloxpc 2025-01-29 11:42:11,198:DEBUG:acme.client:JWS payload: b'' 2025-01-29 11:42:11,204:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854097235: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVncVFlWmVCc3VzbGpJRlcyZnlTb3ZHUnN3M3FBd1dPeHMtTEVyQmxveHBjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQwOTcyMzUifQ", "signature": "OUepTBSVBoxYgVSqPpmesEZqZ9Q0N7Vi6nczzDPAgIuDzLt64_-eLZyfkPkqfz3XJLGddbZsfo1Vkj6dpB2ZhKa2E890krRaFKlkLAfgOfrPE3yKjheWoOovQNxsLLIyRHXC1_sMNT0wjCZZMw8x96iS88JG7n648DucC-fzz8PPSozNroJaOHWOe__yzpJebVoWmAJxHY8ZisvNJkqmYy1bNPxz44PuXL7Evqjx6nYyFgw9whKIA_TJGJdmSwwTbloL5d-GsftF_ekmeKzCXgo7sMs8g9MeJ98UJj88ww2KbilkYYLxTwbWmWMMY1dqJWlt3ry1ddBUDLL4SGPaYg", "payload": "" } 2025-01-29 11:42:11,374:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854097235 HTTP/1.1" 200 827 2025-01-29 11:42:11,375:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:41:29 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: KY2mD_AjZYK0LmdPhDyCtID1YdbdBB3UHSwW7WJG4PAAFAv1E-Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:50:18Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854097235/V5AJ-w", "status": "pending", "token": "KjkQOpKsGE0kd7AjKRO2O9xwhV7ModKF2YJR0KYB0eQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854097235/UT_D8g", "status": "pending", "token": "KjkQOpKsGE0kd7AjKRO2O9xwhV7ModKF2YJR0KYB0eQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854097235/UjHR1g", "status": "pending", "token": "KjkQOpKsGE0kd7AjKRO2O9xwhV7ModKF2YJR0KYB0eQ" } ] } 2025-01-29 11:42:11,375:DEBUG:acme.client:Storing nonce: KY2mD_AjZYK0LmdPhDyCtID1YdbdBB3UHSwW7WJG4PAAFAv1E-Y 2025-01-29 11:42:11,376:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-29 11:42:11,376:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2025-01-29 11:42:11,376:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-29 11:42:11,378:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-29 11:42:11,378:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-29 11:42:11,378:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-29 11:42:11,379:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-29 11:42:11,379:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-29 11:42:11,380:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-29 11:42:11,420:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-29 11:42:11,589:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-29 11:42:11,590:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is signed by the certificate's issuer. 2025-01-29 11:42:11,591:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is: OCSPCertStatus.GOOD 2025-01-29 11:42:11,594:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:51 UTC. 2025-01-29 11:42:11,596:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-29 11:42:11,596:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-29 11:42:11,601:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-29 11:42:11,601:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-29 11:42:11,601:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-29 11:42:11,606:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-29 11:42:11,606:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-29 11:42:11,608:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-29 11:42:12,054:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-29 11:42:12,054:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:41:30 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "pFkVzX0V-ts": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-29 11:42:12,054:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-29 11:42:19,014:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8975_key-certbot.pem 2025-01-29 11:42:25,872:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8973_csr-certbot.pem 2025-01-29 11:42:25,873:DEBUG:acme.client:Requesting fresh nonce 2025-01-29 11:42:25,873:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-29 11:42:26,021:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-29 11:42:26,022:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:41:44 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: KY2mD_AjVCGRgsK3avn5NP0AZ9Z4Ri7NyQ8yE8HwTwe8Cn3_Bo4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-29 11:42:26,022:DEBUG:acme.client:Storing nonce: KY2mD_AjVCGRgsK3avn5NP0AZ9Z4Ri7NyQ8yE8HwTwe8Cn3_Bo4 2025-01-29 11:42:26,023:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2025-01-29 11:42:26,028:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWpWQ0dSZ3NLM2F2bjVOUDBBWjlaNFJpN055UTh5RThId1R3ZThDbjNfQm80IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "wyCKMzoJjbQCfXLKJoM5mkY8n-96j3nS3N6UWXVO8sY-UeToQCUi5lxZPbhuYjjmyNjv5XsdGHslnM6ANto1mbTK2MG2V7PyjStHjiVha8HRj0I9wBXhW4JmbQ0MolrJiOW-YwsovRFn8JmhLYWDw2YwyM9jMG2VyEBDlOf0Nnt2fOxP1Z5_O8CG__hAj1dbRkfjthwDFwK6XO8z46bOMPjFT33Enlqr9KB3Ld_nZovPwB58oWfRRJSj4LSbElsuewLoN4G8P3uwgnGGaXJbtxTfWGllvTyAIYqFMpGp1y5xw3ncD3GBe2s6jDdsVJx3zZ6q6laM4sErRR6oUMGBPQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2025-01-29 11:42:26,232:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 353 2025-01-29 11:42:26,233:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 29 Jan 2025 10:41:44 GMT Content-Type: application/json Content-Length: 353 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140287525 Replay-Nonce: Z6auUXuuvKlkTdmqSf7oZKv9KYtAEvw_x1y_gOZSZtWN5svO-Xk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:50:33Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854177205" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140287525" } 2025-01-29 11:42:26,233:DEBUG:acme.client:Storing nonce: Z6auUXuuvKlkTdmqSf7oZKv9KYtAEvw_x1y_gOZSZtWN5svO-Xk 2025-01-29 11:42:26,233:DEBUG:acme.client:JWS payload: b'' 2025-01-29 11:42:26,239:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854177205: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXV2S2xrVGRtcVNmN29aS3Y5S1l0QUV2d194MXlfZ09aU1p0V041c3ZPLVhrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQxNzcyMDUifQ", "signature": "fFb5zvw2RsJ-1PpSG_Se2dgDPkBTm2kj_BGenJwg7kXgzo1OxDYDPBx-EEH4mKgn6v80LlM1FKRzMenCQ-UMiobUq6SlRewbPFRtBTeJW6WBv8lwCib5WG9kgAgT_6c8LFT1dC_-l8Kg3vrw_xuEapYUF-Z9S1G17Y9zkKgmh_OQ6dcchLwDB9BkX3i91CG9ECcq9ChUrk_D-ET6bWR0Oek-MCkN2AajxBLkqk5Q2qUyTv_b5NFdh5y36xfCaxndILiPzpVtxaVxNL4ifC7yUlrpOJDHIdTjispQEFp0GqxhIBx_Mr-LdxD7fUnhrxZmobknnWjWcxuFXuFYUnNLsw", "payload": "" } 2025-01-29 11:42:26,407:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854177205 HTTP/1.1" 200 825 2025-01-29 11:42:26,408:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:41:44 GMT Content-Type: application/json Content-Length: 825 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Z6auUXuuAv3OQAKb6HdoJl_wi8YVAALpS7aRzoCunAMMgUdzK48 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:50:33Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854177205/rxXYJw", "status": "pending", "token": "H8dHt8qoQ8VNCmFdaH8TCH_B1Jp6zw16C-lKKxCESW0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854177205/kg1xTg", "status": "pending", "token": "H8dHt8qoQ8VNCmFdaH8TCH_B1Jp6zw16C-lKKxCESW0" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854177205/kFR0rA", "status": "pending", "token": "H8dHt8qoQ8VNCmFdaH8TCH_B1Jp6zw16C-lKKxCESW0" } ] } 2025-01-29 11:42:26,408:DEBUG:acme.client:Storing nonce: Z6auUXuuAv3OQAKb6HdoJl_wi8YVAALpS7aRzoCunAMMgUdzK48 2025-01-29 11:42:26,409:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-29 11:42:26,409:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2025-01-29 11:42:26,409:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-29 11:42:26,409:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-29 11:42:26,410:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-29 11:42:26,410:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-29 11:42:26,410:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-29 11:42:26,410:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-29 11:42:26,411:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-29 11:42:26,462:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-29 11:42:26,654:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-29 11:42:26,656:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-29 11:42:26,656:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-29 11:42:26,661:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:13 UTC. 2025-01-29 11:42:26,661:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-29 11:42:26,661:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-29 11:42:26,667:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-29 11:42:26,667:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-29 11:42:26,667:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-29 11:42:26,678:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-29 11:42:26,679:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-29 11:42:26,681:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-29 11:42:27,166:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-29 11:42:27,166:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:41:45 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "zP7ih-tD0KE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2025-01-29 11:42:27,166:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-29 11:42:34,150:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8976_key-certbot.pem 2025-01-29 11:42:40,792:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8974_csr-certbot.pem 2025-01-29 11:42:40,792:DEBUG:acme.client:Requesting fresh nonce 2025-01-29 11:42:40,792:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-29 11:42:40,955:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-29 11:42:40,956:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:41:59 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNf5vt_GQ_uL71R47H4gtKaiTXzCIhgdMzCHaODfJSRjXk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-29 11:42:40,956:DEBUG:acme.client:Storing nonce: qx2pCBNf5vt_GQ_uL71R47H4gtKaiTXzCIhgdMzCHaODfJSRjXk 2025-01-29 11:42:40,956:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2025-01-29 11:42:40,963:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmY1dnRfR1FfdUw3MVI0N0g0Z3RLYWlUWHpDSWhnZE16Q0hhT0RmSlNSalhrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "pzm5gENeQQZGpqRA86L7gEPXj0rNp446qDhhgso_LJVEc8dIdvyAcwG237SVHqNQ9iqJ9E9v7CKgoLmVl32HLarOHI64bzrqLIABuIoL1MmqNvJuQ6ViOlXr--HeYFGuIhqKijjeERpoInhPVOmC3bW_wIhTw6KwkHwAWQH7i6OnHateR7bmvxQY08ptjoAELwb_MFk534bvBfdkApVKjCbYUMDHPLKkfw_AyWLHx5LnH05ipUM6nYZgl66aq8pW1txTISoJTU2sdxGPdA8rAjeuE1grM0kRtxFtbXv7CO1hVJuCmKCHSGV_qHXnuaBVVzFpIeDII5zpAXqHGcJGOA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-01-29 11:42:41,140:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 352 2025-01-29 11:42:41,141:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 29 Jan 2025 10:41:59 GMT Content-Type: application/json Content-Length: 352 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140337675 Replay-Nonce: qx2pCBNfJzJ0-FatRx8sDAQb42B9F7HpxEtVAOgpOtfBousU6Xw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:50:47Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854251985" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140337675" } 2025-01-29 11:42:41,141:DEBUG:acme.client:Storing nonce: qx2pCBNfJzJ0-FatRx8sDAQb42B9F7HpxEtVAOgpOtfBousU6Xw 2025-01-29 11:42:41,142:DEBUG:acme.client:JWS payload: b'' 2025-01-29 11:42:41,148:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854251985: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZKekowLUZhdFJ4OHNEQVFiNDJCOUY3SHB4RXRWQU9ncE90ZkJvdXNVNlh3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQyNTE5ODUifQ", "signature": "gguEKVk1-lQvW9Fj_TNzvPxlJ_b4Gs116Rkar-ifqlu6id9_5Cf4PMFbQBlbKh0dGEukNk7pP1dWp5Iz8TOPmoV-46RIDPjli8R2mSBA6tAPW38mqMVdiK8ZqvNVH6VhLmPuegq0cybt4smkTQqW_pCZwpzd_39oFQMIdbopM2xnhK6fFlrWKv-xOHTpwDsKmUzMbXjh0ttqOjpmSuuYTIVVjFzsOp6j-mdJFIn7W171Ga3amAPDS7B2-17zFhYyWVKJZHfRhxa_UllxOHo1aWOkr0FQn_utIed0Nkcr5tWHZuW6dwdOZ-GqzL1QdTTR1WUeMgpXuRziQlGwAxJIxg", "payload": "" } 2025-01-29 11:42:41,312:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854251985 HTTP/1.1" 200 824 2025-01-29 11:42:41,313:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:41:59 GMT Content-Type: application/json Content-Length: 824 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNf3bQtYTPI10nmyF7k8oPNmZhNjDX5AwEHvElm_kWqh_g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:50:47Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854251985/5c2Euw", "status": "pending", "token": "6G2w1CurrpHij2hITHkq2tRG08iPbRRnVO6r0-K3hiU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854251985/BXlLPQ", "status": "pending", "token": "6G2w1CurrpHij2hITHkq2tRG08iPbRRnVO6r0-K3hiU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854251985/0MCU7A", "status": "pending", "token": "6G2w1CurrpHij2hITHkq2tRG08iPbRRnVO6r0-K3hiU" } ] } 2025-01-29 11:42:41,313:DEBUG:acme.client:Storing nonce: qx2pCBNf3bQtYTPI10nmyF7k8oPNmZhNjDX5AwEHvElm_kWqh_g 2025-01-29 11:42:41,314:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-29 11:42:41,314:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2025-01-29 11:42:41,314:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-29 11:42:41,316:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-29 11:42:41,316:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-29 11:42:41,316:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-29 11:42:41,317:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-29 11:42:41,317:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-29 11:42:41,318:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-29 11:42:41,365:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2025-01-29 11:42:41,365:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-29 11:42:41,365:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2025-01-29 11:42:41,374:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2025-01-29 11:42:41,381:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2025-01-29 11:42:41,381:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2025-01-29 11:42:41,381:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2025-01-29 11:42:41,382:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2025-01-29 11:42:41,386:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2025-01-29 11:42:41,426:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-29 11:42:41,614:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-29 11:42:41,616:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-29 11:42:41,616:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-29 11:42:41,622:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:35 UTC. 2025-01-29 11:42:41,622:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-29 11:42:41,622:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-29 11:42:41,627:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-29 11:42:41,627:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-29 11:42:41,628:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-29 11:42:41,643:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-29 11:42:41,644:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-29 11:42:41,646:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-29 11:42:42,131:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-29 11:42:42,131:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:42:00 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "yPly1rwF9io": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2025-01-29 11:42:42,132:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-29 11:42:48,945:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8977_key-certbot.pem 2025-01-29 11:42:55,526:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8975_csr-certbot.pem 2025-01-29 11:42:55,526:DEBUG:acme.client:Requesting fresh nonce 2025-01-29 11:42:55,526:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-29 11:42:55,689:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-29 11:42:55,690:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:42:14 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNfwl7F-6eVpEg-T0KaVb-CgRq2PVICetU09z-9s4wCCXY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-29 11:42:55,690:DEBUG:acme.client:Storing nonce: qx2pCBNfwl7F-6eVpEg-T0KaVb-CgRq2PVICetU09z-9s4wCCXY 2025-01-29 11:42:55,690:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2025-01-29 11:42:55,696:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZ3bDdGLTZlVnBFZy1UMEthVmItQ2dScTJQVklDZXRVMDl6LTlzNHdDQ1hZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "iFOc1bgOaCqpKP3-xclIE9H1FIImrveP_2J7Vug3hqJnvbn2O1CSvGKDsGWgcVx8QuXK-f5uSAV4uD4Jg5uLbjH5z7rgyTziO1iDHNYKVkMIn225TOc1AWFQu2019_zQH3vCjrRKghIt1XWKoAsZ2n9paaLLXiECR8jgfxRy_QwwfGDehKYuxEKyFMsko4BNGpJ0Pmz6p_Dk8vi0zXMbJaeUAZoCUYJ5sEP5Xbi8rjONo2bsvBVC-GC8Qhc4F1gsNzKasEi_nih0If5jGDdsHqvXDwB453-pMpd0j74_UOXMX1SwESwu7bQmU5UJCNV9G_QLuwIdbcqgGj-YzWyw2g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-29 11:42:55,904:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 357 2025-01-29 11:42:55,904:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 29 Jan 2025 10:42:14 GMT Content-Type: application/json Content-Length: 357 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140387985 Replay-Nonce: qx2pCBNfV20jhq0u8Bn0heNgps5GX8Z9B-k9__c60xKFnBHPE-g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:51:01Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854328725" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140387985" } 2025-01-29 11:42:55,905:DEBUG:acme.client:Storing nonce: qx2pCBNfV20jhq0u8Bn0heNgps5GX8Z9B-k9__c60xKFnBHPE-g 2025-01-29 11:42:55,905:DEBUG:acme.client:JWS payload: b'' 2025-01-29 11:42:55,911:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854328725: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZWMjBqaHEwdThCbjBoZU5ncHM1R1g4WjlCLWs5X19jNjB4S0ZuQkhQRS1nIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQzMjg3MjUifQ", "signature": "mgmrS1aFYlTEGz7jb_IMk0wItJ0rqQ3FFgFMuO7xnq2i8FdpehGlc8d1p8re1IJefUm5lPcTfzCl7H8vsX-ID4y-3B-asTtrziDttwHkTPAxoV9vG61HnchhK37t13WVLNp7Hca8Dh4oMhO2hTky7AtJr01vlUakvcTjpql-kFjRGP1drPRUH_FjC6gJr5kQQckgHBB_J3iit5Whu0IbixvWQczpyE-vDVRFZsWOdjEpr4M8u3cAqZyjOz-15ed79mRjqYiH5nL2ucB5dzJhE7xkcVhyg26R9Ml4b8jfRusSvhR5KpXcZxYys6JJ3C35STnqJzeXDOSfu7rPeTyuAQ", "payload": "" } 2025-01-29 11:42:56,088:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854328725 HTTP/1.1" 200 829 2025-01-29 11:42:56,089:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:42:14 GMT Content-Type: application/json Content-Length: 829 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5m-m03bOTK4pLw_BQzWtabj2IBrzEzOhSYErWuzlvhTEKcqTPeQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:51:01Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854328725/HpD31A", "status": "pending", "token": "YkklgBeK2o9V4mrDoqb54xIn-8JMHXfG6sfufSWxePI" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854328725/VqO_UQ", "status": "pending", "token": "YkklgBeK2o9V4mrDoqb54xIn-8JMHXfG6sfufSWxePI" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854328725/F1PGXg", "status": "pending", "token": "YkklgBeK2o9V4mrDoqb54xIn-8JMHXfG6sfufSWxePI" } ] } 2025-01-29 11:42:56,089:DEBUG:acme.client:Storing nonce: 5m-m03bOTK4pLw_BQzWtabj2IBrzEzOhSYErWuzlvhTEKcqTPeQ 2025-01-29 11:42:56,090:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-29 11:42:56,090:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2025-01-29 11:42:56,091:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-29 11:42:56,091:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-29 11:42:56,092:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-29 11:42:56,092:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-29 11:42:56,092:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-29 11:42:56,092:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-29 11:42:56,093:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-29 11:42:56,133:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-29 11:42:56,320:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-29 11:42:56,322:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-29 11:42:56,322:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-29 11:42:56,327:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:05 UTC. 2025-01-29 11:42:56,327:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-29 11:42:56,327:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-29 11:42:56,333:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-29 11:42:56,333:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-29 11:42:56,333:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-29 11:42:56,339:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-29 11:42:56,339:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-29 11:42:56,341:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-29 11:42:56,828:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-29 11:42:56,828:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:42:15 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "jX8cdLZ0Vlo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-29 11:42:56,829:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-29 11:43:03,591:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8978_key-certbot.pem 2025-01-29 11:43:10,186:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8976_csr-certbot.pem 2025-01-29 11:43:10,187:DEBUG:acme.client:Requesting fresh nonce 2025-01-29 11:43:10,187:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-29 11:43:10,349:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-29 11:43:10,350:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:42:28 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNfU_6iHaXlsTSBCJmv0Ukc8OC6azCoj3z3sknR-LR90tg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-29 11:43:10,350:DEBUG:acme.client:Storing nonce: qx2pCBNfU_6iHaXlsTSBCJmv0Ukc8OC6azCoj3z3sknR-LR90tg 2025-01-29 11:43:10,350:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2025-01-29 11:43:10,356:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZVXzZpSGFYbHNUU0JDSm12MFVrYzhPQzZhekNvajN6M3NrblItTFI5MHRnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "XV_-ZdJ8U9ozJRApEGfmR_ofs0fKxjlBbBvS9hkqH60tSgJE27wAmPVuOPxEKQVZQZfEaDGEElntm8K5ooK_qGwIMT-fbQdej5Cbfn141U7MafRAFceInXRJ_WFutGfJCkjmQRFIsDPU_GBzUpPmyF6Z0L7tS5Efw6EZXZ0UTOHBCn_eLLbMyDRbg1RZ085Us16RXCWJiKSFc_w7AiRBNANJyjQTtA-zzU2BXtaUnvrx-ZywEj3BjrzRKTsqHb5GqRKrq2KEF0RQBOn23Qw2DY5RZ01pWGEtRa-tgTgKdy5s5ZksNlEAEncH9NNggSNPwaU0GaR0OUgAIoH1rlGWow", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2025-01-29 11:43:10,546:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356 2025-01-29 11:43:10,547:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 29 Jan 2025 10:42:28 GMT Content-Type: application/json Content-Length: 356 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140450885 Replay-Nonce: 5m-m03bOY0YonyUY6Z_mtHADI90XdIfZ3eQgLWxpEpre86pxkFs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:51:16Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854428445" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140450885" } 2025-01-29 11:43:10,547:DEBUG:acme.client:Storing nonce: 5m-m03bOY0YonyUY6Z_mtHADI90XdIfZ3eQgLWxpEpre86pxkFs 2025-01-29 11:43:10,547:DEBUG:acme.client:JWS payload: b'' 2025-01-29 11:43:10,552:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854428445: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk9ZMFlvbnlVWTZaX210SEFESTkwWGRJZlozZVFnTFd4cEVwcmU4NnB4a0ZzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ0Mjg0NDUifQ", "signature": "f3Z598047x0uaqa4EX92PBpbD48A8ywWYOmmPuRkzNjWi6pfMh8sUGpPdkvsmLV35wsz74QqgpUxKFDz576EP8j62cRYpfbcV2PxRax8zOwv9i2xZa16EJJR9WyKeatg4JRppZhF-qzm2fEdgWJ12qyqhC2Ks9KGsOcRAA0YOSgoLJBEScpcvWW_7-s6U5dw7-Fm27R5TMDNsux9FI3M3iLHTcdzJIm17Ob7eiz5-jEUDBEl6j3HY-DRCZyJaL4WtaetKxUOw8BbTM9kMxo0ezLPZ5xXKG40QQQqJmI-4tfHky7mR68EJCqWb6x3P3ZvSDvHMVj27GmBNr2BCccvkA", "payload": "" } 2025-01-29 11:43:10,723:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854428445 HTTP/1.1" 200 828 2025-01-29 11:43:10,724:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:42:29 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNfSwd6-V2mg0XOFh3VUGwtmrNRFrYLbeb-NMyB03KwhBE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:51:16Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854428445/tA2UdQ", "status": "pending", "token": "kR-nkArfvAb4RqjGdmf_0sc2lDYeXub72wgxP10lapo" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854428445/Ra9g4Q", "status": "pending", "token": "kR-nkArfvAb4RqjGdmf_0sc2lDYeXub72wgxP10lapo" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854428445/HO9jNQ", "status": "pending", "token": "kR-nkArfvAb4RqjGdmf_0sc2lDYeXub72wgxP10lapo" } ] } 2025-01-29 11:43:10,724:DEBUG:acme.client:Storing nonce: qx2pCBNfSwd6-V2mg0XOFh3VUGwtmrNRFrYLbeb-NMyB03KwhBE 2025-01-29 11:43:10,724:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-29 11:43:10,726:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2025-01-29 11:43:10,726:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-29 11:43:10,727:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-29 11:43:10,727:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-29 11:43:10,727:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-29 11:43:10,728:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-29 11:43:10,728:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-29 11:43:10,729:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-29 11:43:10,781:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-29 11:43:10,964:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-29 11:43:10,967:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2025-01-29 11:43:10,968:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2025-01-29 11:43:10,971:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:33 UTC. 2025-01-29 11:43:10,972:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-29 11:43:10,972:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-29 11:43:10,978:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-29 11:43:10,978:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-29 11:43:10,978:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-29 11:43:10,987:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-29 11:43:10,988:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-29 11:43:10,990:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-29 11:43:11,479:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-29 11:43:11,480:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:42:29 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Cc8fucjyLLY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-29 11:43:11,480:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-29 11:43:18,745:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8979_key-certbot.pem 2025-01-29 11:43:25,523:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8977_csr-certbot.pem 2025-01-29 11:43:25,524:DEBUG:acme.client:Requesting fresh nonce 2025-01-29 11:43:25,524:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-29 11:43:25,688:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-29 11:43:25,688:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:42:44 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNfEVMvGHV90QqZteJZQyFWgH5tcPtVl0yIuwVvFW7zL1E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-29 11:43:25,689:DEBUG:acme.client:Storing nonce: qx2pCBNfEVMvGHV90QqZteJZQyFWgH5tcPtVl0yIuwVvFW7zL1E 2025-01-29 11:43:25,689:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2025-01-29 11:43:25,694:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZFVk12R0hWOTBRcVp0ZUpaUXlGV2dINXRjUHRWbDB5SXV3VnZGVzd6TDFFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "gDeGL2iaE9J3Au4vGqFr600ZeeWRa9gUcRd47WOuHLl5ZFAOXWyG9LoVMrhAV2WnTAvHWv-FfDn6pIGyb5HpfPgFY6C9uH36QzVvuTO_9QVMmnppmc9OgwyLTGOtSq_QLEVLfrRsUWRP6VS2aLkYVWiBfTbAYgybH0esSXtdtUkpYw9NuY-InE30DBiU16hLQUgJTXvTScGLk7M1sSXlqW_uh_TV_Glu__mWIIkcSHSF0FcH1lzCTSXHhXTOcrptigpqqb6IA9y4bSAK9yz7wxGf4sM541wGqxiwQbo8Wsi16o192ZU5oxDpcLn1LSREFaySwOE8T_6kRf_9o53p1Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-01-29 11:43:25,874:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2025-01-29 11:43:25,874:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 29 Jan 2025 10:42:44 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140503565 Replay-Nonce: qx2pCBNf0Ek1d0h6QdgQJEMCv11cgFvRhfpnkx_x6RGIfZpSfVk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:51:31Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854513645" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140503565" } 2025-01-29 11:43:25,875:DEBUG:acme.client:Storing nonce: qx2pCBNf0Ek1d0h6QdgQJEMCv11cgFvRhfpnkx_x6RGIfZpSfVk 2025-01-29 11:43:25,875:DEBUG:acme.client:JWS payload: b'' 2025-01-29 11:43:25,881:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854513645: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmYwRWsxZDBoNlFkZ1FKRU1DdjExY2dGdlJoZnBua3hfeDZSR0lmWnBTZlZrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ1MTM2NDUifQ", "signature": "RTJE9rlgTlVpjWn8m_8J11fF0kcnjNwTQrnaqujvf-zV8xHSZl8pkcLYNmL9H57kLjCZlb7mSKeAh-uMGlndL_SxhwINQYmZo-Y_OvI-IQLdRzci96KQysFH-KpsVPHCg3fFPT48TC9x2jVobzYjfLE_hw0Ekf-OIL4BBOrcY6sdJK416a42sPw5WvJBHu3k9XNHJMYkOSL79ql0QeAj-ylQXM8LpILUeZNR1AoLFTiYNCr7FzNAxdZXXxy11hEfl77AsvSxnIWSAmaguRw4WUEARqoQiuf5T0lmkxf46Uxb8kHhC8-07FOK0o3cPutE1JKWpbPyOaboJaVOqpA2bw", "payload": "" } 2025-01-29 11:43:26,048:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854513645 HTTP/1.1" 200 827 2025-01-29 11:43:26,048:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:42:44 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNf8tk6BdIFw9naND8jlZIlpfWydC2nXzPydaANlZCBfQQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:51:31Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854513645/2DTePg", "status": "pending", "token": "s0IZH-lt4CcoWX89FYesqwmuLxn1XQ-WV9fmxwfzdJ0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854513645/YCt_0g", "status": "pending", "token": "s0IZH-lt4CcoWX89FYesqwmuLxn1XQ-WV9fmxwfzdJ0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854513645/IJYfNQ", "status": "pending", "token": "s0IZH-lt4CcoWX89FYesqwmuLxn1XQ-WV9fmxwfzdJ0" } ] } 2025-01-29 11:43:26,049:DEBUG:acme.client:Storing nonce: qx2pCBNf8tk6BdIFw9naND8jlZIlpfWydC2nXzPydaANlZCBfQQ 2025-01-29 11:43:26,049:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-29 11:43:26,049:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2025-01-29 11:43:26,050:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-29 11:43:26,051:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-29 11:43:26,051:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-29 11:43:26,051:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-29 11:43:26,051:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-29 11:43:26,052:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-29 11:43:26,053:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-29 11:43:26,102:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-29 11:43:26,301:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-29 11:43:26,302:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2025-01-29 11:43:26,303:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2025-01-29 11:43:26,306:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:54 UTC. 2025-01-29 11:43:26,307:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-29 11:43:26,307:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-29 11:43:26,312:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-29 11:43:26,312:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-29 11:43:26,312:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-29 11:43:26,329:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-29 11:43:26,330:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-29 11:43:26,332:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-29 11:43:26,773:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-29 11:43:26,774:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:42:45 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "LmUmqI_6zZw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-29 11:43:26,774:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-29 11:43:33,564:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8980_key-certbot.pem 2025-01-29 11:43:39,993:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8978_csr-certbot.pem 2025-01-29 11:43:39,993:DEBUG:acme.client:Requesting fresh nonce 2025-01-29 11:43:39,993:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-29 11:43:40,141:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-29 11:43:40,142:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:42:58 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Z6auUXuuUOFOEbWRUb7thg6-VehLaGmUvbFe9i-VAZQ0oPqD4oE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-29 11:43:40,142:DEBUG:acme.client:Storing nonce: Z6auUXuuUOFOEbWRUb7thg6-VehLaGmUvbFe9i-VAZQ0oPqD4oE 2025-01-29 11:43:40,142:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2025-01-29 11:43:40,150:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVVT0ZPRWJXUlViN3RoZzYtVmVoTGFHbVV2YkZlOWktVkFaUTBvUHFENG9FIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "TpUu6boFLAh-Pn_C5QSXG42ql41wmR0Cb0_zUHebM_tNo_6Odot8mZ-kMwtnfretfiL_A-Vnro0cz_huZnP33SRiXGPacpJ0Ymbr5zlNbU_1ZO9leVGQTJ9Y097yb8vLeKmg6Q6kMUsYVRFa9niiXsafZctSG1EJ_LnRwMaApovyBjIUZQ25iCjkLuSUxGvOQURgusfueaEJs3p53edxBoV6AKp3HB7P7walqimRKN49ad5rmlZmKdWNxoo-mQXcF3xtzK47DqoBFf5CaUiZ0VsfWyFNfLP2F_fujfEfjGnXN6tN38pyXKAQl1DzZ6YYGAWux5onm3LEfb14bJv1Ew", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-29 11:43:40,333:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-29 11:43:40,334:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 29 Jan 2025 10:42:58 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140552425 Replay-Nonce: Z6auUXuub8kq1dMhcxtXiKAw5iPFbdLKGkuYRpr9JqTAhkAMd1U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:51:46Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854589515" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140552425" } 2025-01-29 11:43:40,334:DEBUG:acme.client:Storing nonce: Z6auUXuub8kq1dMhcxtXiKAw5iPFbdLKGkuYRpr9JqTAhkAMd1U 2025-01-29 11:43:40,334:DEBUG:acme.client:JWS payload: b'' 2025-01-29 11:43:40,340:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854589515: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXViOGtxMWRNaGN4dFhpS0F3NWlQRmJkTEtHa3VZUnByOUpxVEFoa0FNZDFVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ1ODk1MTUifQ", "signature": "IXThvDtrAuGho8I7vOPZbmAXbFbeRJX-pjy3dw8__G9y5IFOCJlQjeV0CudvwrDrlVel0ROmhiDeSUDA85s7MgrUKI1MS4n2xMV3ohi_HUkARH7RiS2FAK8b0sP-Kq_eJGm2GpbJssMdyrkDl-klV1fgelDtN37yZ0N63bsYYJd6Vw6xag8KSnR3YgnpUSFrK3FS4ZoPHXKv61fyaY0BAGKAho_9wfr9iOYXTDcHuvsC2lXCp_xijmvsiBo0KdEosO3tuEMeGYfdtwzdyGf0kmPPFRYCWPH0woF-1SBcK9Z6cDvC9FCtsMZ4m-SgHf_9Gt9F_MU_mSH_5qqsBikY5w", "payload": "" } 2025-01-29 11:43:40,505:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854589515 HTTP/1.1" 200 823 2025-01-29 11:43:40,505:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:42:58 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: KY2mD_Ajr2Fh2nqWD3vXCSu_QWaOUHnSUkIQfrzpjWVHYOLriec X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:51:46Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854589515/MXV7zQ", "status": "pending", "token": "vgzC_qBhQwpwOiNo_CvLkC_XDVMlXhOW2G1auAvN-v8" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854589515/qQ_GAQ", "status": "pending", "token": "vgzC_qBhQwpwOiNo_CvLkC_XDVMlXhOW2G1auAvN-v8" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854589515/0ytQ9g", "status": "pending", "token": "vgzC_qBhQwpwOiNo_CvLkC_XDVMlXhOW2G1auAvN-v8" } ] } 2025-01-29 11:43:40,506:DEBUG:acme.client:Storing nonce: KY2mD_Ajr2Fh2nqWD3vXCSu_QWaOUHnSUkIQfrzpjWVHYOLriec 2025-01-29 11:43:40,506:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-29 11:43:40,506:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2025-01-29 11:43:40,507:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-29 11:43:40,507:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-29 11:43:40,508:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-29 11:43:40,508:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-29 11:43:40,508:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-29 11:43:40,508:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-29 11:43:40,509:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-29 11:43:40,561:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-29 11:43:40,758:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-29 11:43:40,760:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-29 11:43:40,761:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-29 11:43:40,765:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:15 UTC. 2025-01-29 11:43:40,765:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-29 11:43:40,765:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-29 11:43:40,770:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-29 11:43:40,771:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-29 11:43:40,771:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-29 11:43:40,788:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-29 11:43:40,788:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-29 11:43:40,791:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-29 11:43:41,254:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-29 11:43:41,256:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:42:59 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "kejwVVT3mhc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-29 11:43:41,256:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-29 11:43:48,167:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8981_key-certbot.pem 2025-01-29 11:43:54,754:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8979_csr-certbot.pem 2025-01-29 11:43:54,754:DEBUG:acme.client:Requesting fresh nonce 2025-01-29 11:43:54,756:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-29 11:43:54,911:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-29 11:43:54,912:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:43:13 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNfAtSQWyzA1qLDDHP8X_pIYwUK3gn5mNYq9j56L0jY2p8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-29 11:43:54,912:DEBUG:acme.client:Storing nonce: qx2pCBNfAtSQWyzA1qLDDHP8X_pIYwUK3gn5mNYq9j56L0jY2p8 2025-01-29 11:43:54,912:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2025-01-29 11:43:54,918:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZBdFNRV3l6QTFxTERESFA4WF9wSVl3VUszZ241bU5ZcTlqNTZMMGpZMnA4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "qwyi5Eri11OxkUxhpRO2OUdh41mNnVjBhwqde03JuLHoNXEF91IbtyVLsuvpcCmX2-yJaX9lXrMSPsfQUldWNLSpsx9mpYaflIpClahS9rO7isb_WuceoNNtx2u49sGVH3fjnerVqGKBwQE2CTbP4po8R8lJjiJsJG8kADA_uYhm-VDgfepWYa7k-GTbLlssbko8976CG-S3n5dk8EsdPB7fXycPSwx9xtqbTBTcaDPcCUuZSHO14leFSUC3bNJics6SlHiJz-raWlq8D3KfzrvbS4x9xhuxLAGfsSq4Fm_PInyEf5bvCTd41mWRLyexkPFWp207biYJT1BGpo_0wQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-29 11:43:55,101:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-29 11:43:55,101:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 29 Jan 2025 10:43:13 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140602055 Replay-Nonce: qx2pCBNf8Wn_kjU0wJIA-iXDbcO1tfAAIsL2GHw52ZIwDJr2Z3k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:52:00Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854665835" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140602055" } 2025-01-29 11:43:55,102:DEBUG:acme.client:Storing nonce: qx2pCBNf8Wn_kjU0wJIA-iXDbcO1tfAAIsL2GHw52ZIwDJr2Z3k 2025-01-29 11:43:55,102:DEBUG:acme.client:JWS payload: b'' 2025-01-29 11:43:55,108:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854665835: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmY4V25fa2pVMHdKSUEtaVhEYmNPMXRmQUFJc0wyR0h3NTJaSXdESnIyWjNrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ2NjU4MzUifQ", "signature": "Vqlo0nIWlGvzugWgpDyJOimR1uDK4kqJI6tIYQX3PifNrpKveCXHb2OCoA1CQbOOfZiOvraCqYppZNTdjsCrHrG0zjp9SIyHIrOqc3V-vt12ohBRS8WqfX-4b9YL2hAygYQhiwXArqnFyRkMUiR9hvqWxxVgKWqPGOcEkXYfh3nEblfolJMgxfIrsoN7vVuFc42Ou-SEhMio9ClbnI8ri9y8MCWvRPHIjILvk02DF22b3aeFrcWllcsf_G9g1Ou314NbxpgCMGr4hLNohU5f3Lg1HzcCKyJBg2lh2ISuanaOQRusiF8hEL71_5F-zt6IXkzSqGOMMkhOQ0Lqfr9N0A", "payload": "" } 2025-01-29 11:43:55,268:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854665835 HTTP/1.1" 200 823 2025-01-29 11:43:55,269:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:43:13 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNfkk_AyT-r9RAqaBB-xdSU_-AjSfgmjnp_QGoXRsAWUDY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:52:00Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854665835/hkfxMA", "status": "pending", "token": "IQq7H-CrjRngbvlfBYyq4TC9BGO3mQb9XFlUCm-xOp8" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854665835/A7xmXA", "status": "pending", "token": "IQq7H-CrjRngbvlfBYyq4TC9BGO3mQb9XFlUCm-xOp8" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854665835/VSa2Qg", "status": "pending", "token": "IQq7H-CrjRngbvlfBYyq4TC9BGO3mQb9XFlUCm-xOp8" } ] } 2025-01-29 11:43:55,269:DEBUG:acme.client:Storing nonce: qx2pCBNfkk_AyT-r9RAqaBB-xdSU_-AjSfgmjnp_QGoXRsAWUDY 2025-01-29 11:43:55,270:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-29 11:43:55,270:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2025-01-29 11:43:55,271:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-29 11:43:55,271:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-29 11:43:55,272:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-29 11:43:55,272:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-29 11:43:55,272:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-29 11:43:55,273:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-29 11:43:55,274:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-29 11:43:55,326:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-29 11:43:55,538:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-29 11:43:55,539:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2025-01-29 11:43:55,540:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2025-01-29 11:43:55,544:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:38 UTC. 2025-01-29 11:43:55,544:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-29 11:43:55,545:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-29 11:43:55,549:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-29 11:43:55,549:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-29 11:43:55,549:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-29 11:43:55,565:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-29 11:43:55,565:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-29 11:43:55,567:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-29 11:43:56,052:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-29 11:43:56,053:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:43:14 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "E_a71wW7NrU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-29 11:43:56,053:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-29 11:44:03,212:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8982_key-certbot.pem 2025-01-29 11:44:09,771:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8980_csr-certbot.pem 2025-01-29 11:44:09,772:DEBUG:acme.client:Requesting fresh nonce 2025-01-29 11:44:09,772:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-29 11:44:09,934:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-29 11:44:09,934:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:43:28 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNfL0gijEmTSff2ZkNsiGYT8g48tKE_a-H05f1U0UeuPsI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-29 11:44:09,934:DEBUG:acme.client:Storing nonce: qx2pCBNfL0gijEmTSff2ZkNsiGYT8g48tKE_a-H05f1U0UeuPsI 2025-01-29 11:44:09,935:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2025-01-29 11:44:09,941:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZMMGdpakVtVFNmZjJaa05zaUdZVDhnNDh0S0VfYS1IMDVmMVUwVWV1UHNJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "cPOhm_OaawmKXVkYpLUawShBCN9uz8H650Iazbh6Gr1YqCNKiBKmRCn73OrAnK8e1zSYSoJfX9Vt2knFvMPftapJJS9ySYDhY361-FQqei1CY87O-7k7P0FPaSYAKSRYbxFWU14dgzv4oezv_jyhTNJtfCV4J4tKzPeBjFkEk6morK3055TS1-NOhAXj3cRD4g93Ftlsh3SohdpIO9-BWS1qyhl4q3OSelM8BMGTFOhPMiZVZRkQQwJkFEl3QGw78TKHCrUnG0hMrZqArgVtN1hCkDGALrEwFo1q2C50KfXz0Amzr4PxO9kDpo3rJk89V4GvrRyX2gyT4ZuMSe6Naw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-29 11:44:10,143:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-29 11:44:10,143:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 29 Jan 2025 10:43:28 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140669395 Replay-Nonce: qx2pCBNfGslsAgq3jd_dbqZZgOq_7u7A5N3oJ5voBOaJKb0IioY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:52:15Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854767445" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140669395" } 2025-01-29 11:44:10,144:DEBUG:acme.client:Storing nonce: qx2pCBNfGslsAgq3jd_dbqZZgOq_7u7A5N3oJ5voBOaJKb0IioY 2025-01-29 11:44:10,144:DEBUG:acme.client:JWS payload: b'' 2025-01-29 11:44:10,150:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854767445: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZHc2xzQWdxM2pkX2RicVpaZ09xXzd1N0E1TjNvSjV2b0JPYUpLYjBJaW9ZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ3Njc0NDUifQ", "signature": "lGV45CVqhwu4tE97frYGR8BliTgyHB26I7V2dvfeWdyHNDUOWKg3mIeuQ9fjuIU80KUauBIV15sdnEC5q2onZ05KJ-y6jvpTlvHNI6ZG0XTdH0FH4PguAh5WkgNNAl9q9JOM1rUie3pAzoWS552ttSiCAQp12ftJmjafTr-GPpiGY3OH15xLIWm-Nue3FOVBMqNNtBezHuBpa4Al9OIbIEC2KLtT2Qnu42ppXKEzKTwTKqXyW3KOfm3fCWrV27TZ0L5Ebu_eeON0xntuPGjxS9E2jz2Rtqlq7cO8Y1x-n6rrSME60ZWPJ2pMmNU-XlIGGyDQFMejIBTT4sK7CG_uAA", "payload": "" } 2025-01-29 11:44:10,320:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854767445 HTTP/1.1" 200 823 2025-01-29 11:44:10,320:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 10:43:28 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNfOjlHEmlfWCEs2uE5Ey8ttEIodSzAtpXSMAoBmftiLWE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:52:15Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854767445/KFIdlQ", "status": "pending", "token": "Z2FjGy5YI24p9E9ApXNQZTvas2Cq6xGIBczpA5STm0k" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854767445/I_YfaQ", "status": "pending", "token": "Z2FjGy5YI24p9E9ApXNQZTvas2Cq6xGIBczpA5STm0k" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854767445/9iBbmQ", "status": "pending", "token": "Z2FjGy5YI24p9E9ApXNQZTvas2Cq6xGIBczpA5STm0k" } ] } 2025-01-29 11:44:10,321:DEBUG:acme.client:Storing nonce: qx2pCBNfOjlHEmlfWCEs2uE5Ey8ttEIodSzAtpXSMAoBmftiLWE 2025-01-29 11:44:10,321:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-29 11:44:10,322:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2025-01-29 11:44:10,322:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-29 11:44:10,322:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-29 11:44:10,323:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-29 11:44:10,323:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-29 11:44:10,323:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-29 11:44:10,324:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-29 11:44:10,325:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-29 11:44:10,325:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2025-01-29 11:44:10,325:ERROR:certbot._internal.renewal: C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2025-01-29 11:44:10,326:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 11 renew failure(s), 0 parse failure(s) 2025-01-29 11:44:10,330:ERROR:certbot._internal.log:11 renew failure(s), 0 parse failure(s)