2025-01-27 22:18:46,065:DEBUG:certbot._internal.main:certbot version: 1.6.0 2025-01-27 22:18:46,066:DEBUG:certbot._internal.main:Arguments: [] 2025-01-27 22:18:46,066:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2025-01-27 22:18:47,008:DEBUG:certbot._internal.log:Root logging level set at 20 2025-01-27 22:18:47,008:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2025-01-27 22:18:47,060:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2025-01-27 22:18:47,116:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-27 22:18:47,331:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-27 22:18:47,333:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2025-01-27 22:18:47,337:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2025-01-27 22:18:47,346:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-27 22:18:47,350:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-27 22:18:47,400:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-27 22:18:47,603:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-27 22:18:47,605:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is signed by the certificate's issuer. 2025-01-27 22:18:47,606:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD 2025-01-27 22:18:47,612:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-27 22:18:47,617:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-27 22:18:47,671:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-27 22:18:47,844:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-27 22:18:47,845:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2025-01-27 22:18:47,846:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2025-01-27 22:18:47,851:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-27 22:18:47,856:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-27 22:18:47,899:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-27 22:18:48,095:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-27 22:18:48,096:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is signed by the certificate's issuer. 2025-01-27 22:18:48,097:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is: OCSPCertStatus.GOOD 2025-01-27 22:18:48,101:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-27 22:18:48,105:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-27 22:18:48,160:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-27 22:18:48,345:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-27 22:18:48,346:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert22.pem is signed by the certificate's issuer. 2025-01-27 22:18:48,347:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD 2025-01-27 22:18:48,352:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-27 22:18:48,357:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-27 22:18:48,405:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-27 22:18:48,566:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-27 22:18:48,567:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-27 22:18:48,568:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-27 22:18:48,573:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:13:49 UTC. 2025-01-27 22:18:48,573:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-27 22:18:48,573:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-27 22:18:48,579:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-27 22:18:48,580:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-27 22:18:48,580:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-27 22:18:48,588:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-27 22:18:48,590:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-27 22:18:48,592:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-27 22:18:49,064:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-27 22:18:49,065:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:18:51 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "aN9dGP4eK3I": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-27 22:18:49,066:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-27 22:18:59,193:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8943_key-certbot.pem 2025-01-27 22:19:09,193:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8941_csr-certbot.pem 2025-01-27 22:19:09,198:DEBUG:acme.client:Requesting fresh nonce 2025-01-27 22:19:09,199:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-27 22:19:09,352:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-27 22:19:09,353:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:19:11 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Z6auUXuuRkLIIQZOrnirn9nGTfyeKoy1r59x9QG8iRapkbffdaE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-27 22:19:09,353:DEBUG:acme.client:Storing nonce: Z6auUXuuRkLIIQZOrnirn9nGTfyeKoy1r59x9QG8iRapkbffdaE 2025-01-27 22:19:09,353:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2025-01-27 22:19:09,360:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVSa0xJSVFaT3JuaXJuOW5HVGZ5ZUtveTFyNTl4OVFHOGlSYXBrYmZmZGFFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "EBjqZ4Carkoe7wDzn7dEaLILAm2McR-a36bTSuoG3Ce0Nj1Qdloay0priwFHgRo2wdhgeOuOn2BtHbX6eEmoUkKPOFmxu8OFnfO2gsW2KG_4KEE2zqBr2PgHvr0hu00AM4x3xPnYtibhEDYrBwt-m32eJiVnBHeb356ocQhRX47I4b63VViF4ajz78zsID0dTuKU42D3Bs8k0jpfI_kxRQXTHp5YreRFeafouVD56-BYpueGfzN3bgS4SWK_9khaZPPYQtHtfMhQeDBcTIphd0UuvaPuNvvum8lFjOAF8I75yyB3sDESki4zG5iFR3w_Crt2Xw8gecWPMOarWeW2EA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-27 22:19:09,655:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-27 22:19:09,656:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 27 Jan 2025 21:19:11 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140171795 Replay-Nonce: KY2mD_AjSBIznBVJce9BxvSt6d0Giw_Lh0OMb0jbQl_JYGEhyEY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:50:04Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464853999535" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140171795" } 2025-01-27 22:19:09,656:DEBUG:acme.client:Storing nonce: KY2mD_AjSBIznBVJce9BxvSt6d0Giw_Lh0OMb0jbQl_JYGEhyEY 2025-01-27 22:19:09,656:DEBUG:acme.client:JWS payload: b'' 2025-01-27 22:19:09,663:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464853999535: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWpTQkl6bkJWSmNlOUJ4dlN0NmQwR2l3X0xoME9NYjBqYlFsX0pZR0VoeUVZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTM5OTk1MzUifQ", "signature": "l0NOWGHhq1XhYSjf0_iAryF8F0i8g6PcIBzjcbFzPE-4c0CzTvd9MU17HCZBrycrcOw98Jnv9Xn0-qHPycoLeQjvU9nwc8JDtj8hp6ow2wgoXEZT5r2oUW2ESZSBnkI5QloACJO6-b4suWkbVsE-cPG4PnASI1lUpxbDF4l8v0gx6rc1PjobSeM7g7z3ulmwSOXySLTybQhN7auEkqBTwRcCblJljL2xm-vEY9cA30PhHgidi55-XYS_X_rOiBzSmqznRNY1HfcRBOVL5xudaj6mWOO78SEMlZM9yemS01ayfZLGCAMbFm50qn24-zUgc0MiwmQOfFxqlkVTwemKsg", "payload": "" } 2025-01-27 22:19:09,823:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464853999535 HTTP/1.1" 200 823 2025-01-27 22:19:09,824:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:19:11 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: KY2mD_AjEN_HxPAEVRyMNcQurgrYHQHRK88ThZmhfo8jT1Vdr0s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:50:04Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464853999535/_gvNVQ", "status": "pending", "token": "LhsM0YxGT1dL4stq2Tmlq4O2ZKuaujacf5ySryXsyhQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464853999535/PVUjPA", "status": "pending", "token": "LhsM0YxGT1dL4stq2Tmlq4O2ZKuaujacf5ySryXsyhQ" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464853999535/Gzz9fw", "status": "pending", "token": "LhsM0YxGT1dL4stq2Tmlq4O2ZKuaujacf5ySryXsyhQ" } ] } 2025-01-27 22:19:09,824:DEBUG:acme.client:Storing nonce: KY2mD_AjEN_HxPAEVRyMNcQurgrYHQHRK88ThZmhfo8jT1Vdr0s 2025-01-27 22:19:09,825:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-27 22:19:09,825:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2025-01-27 22:19:09,836:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-27 22:19:09,837:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-27 22:19:09,847:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-27 22:19:09,848:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-27 22:19:09,848:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-27 22:19:09,849:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-27 22:19:09,863:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-27 22:19:09,908:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-27 22:19:10,091:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-27 22:19:10,093:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2025-01-27 22:19:10,094:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2025-01-27 22:19:10,099:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:20 UTC. 2025-01-27 22:19:10,099:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-27 22:19:10,100:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-27 22:19:10,109:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-27 22:19:10,110:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-27 22:19:10,110:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-27 22:19:10,125:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-27 22:19:10,126:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-27 22:19:10,128:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-27 22:19:10,606:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-27 22:19:10,606:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:19:12 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "4DBBCTWHmxQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-27 22:19:10,607:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-27 22:19:19,856:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8944_key-certbot.pem 2025-01-27 22:19:28,807:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8942_csr-certbot.pem 2025-01-27 22:19:28,808:DEBUG:acme.client:Requesting fresh nonce 2025-01-27 22:19:28,808:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-27 22:19:28,966:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-27 22:19:28,967:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:19:31 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNfY8Wd_RfWcPTHin8DxPYKGB_28khARz6_XmPux3i6Kq8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-27 22:19:28,967:DEBUG:acme.client:Storing nonce: qx2pCBNfY8Wd_RfWcPTHin8DxPYKGB_28khARz6_XmPux3i6Kq8 2025-01-27 22:19:28,967:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2025-01-27 22:19:28,974:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZZOFdkX1JmV2NQVEhpbjhEeFBZS0dCXzI4a2hBUno2X1htUHV4M2k2S3E4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "O5Yx3ZqckIcEcQMblds40hFURzGMUT9CzDX3DHdynXrX639UDSgQ0OKDcDsvrf0U0eHGhl34DMDSaRYVC1T0hAzpu0kmMtkKws9n2x6IA3WV9jdPnlS7w0uU9GaaGBHqwTDF1UNoTdBRTbYqWBGq9_yXnJE8nwbBadpeSq2SeayiGEelfJJYKrVhDChdGw-UXWxrzGrAkqFOJgRjURER5XSGCTU29mIUzIrp1BSxZc2WTbZSW28W4uJJRb-Ipm55aV7nMiDJc-m4B7DJ7J8-YZAX2C6wHHtfIOF09p5gy81C11ndxIOqbklHeWMEmRPGOpX9FHKFlYJ8rVD54XhnSw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-01-27 22:19:29,161:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2025-01-27 22:19:29,162:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 27 Jan 2025 21:19:31 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140234075 Replay-Nonce: 5m-m03bOCOl42YExIg0htrKVy_62xl520b1MdLyhp76MwvOGvMY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:50:18Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854097235" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140234075" } 2025-01-27 22:19:29,162:DEBUG:acme.client:Storing nonce: 5m-m03bOCOl42YExIg0htrKVy_62xl520b1MdLyhp76MwvOGvMY 2025-01-27 22:19:29,163:DEBUG:acme.client:JWS payload: b'' 2025-01-27 22:19:29,169:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854097235: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk9DT2w0MllFeElnMGh0cktWeV82MnhsNTIwYjFNZEx5aHA3Nk13dk9Hdk1ZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQwOTcyMzUifQ", "signature": "tVMqtnsg1GINupcAw--ZvLeXf9UCUoXuElU3BL8V_DogB80URqSTiiiuE0HmhMxntAk14y9UPg4AOrhxUX1Pm2OD5OlFsFRTYT8A-VjWPFxlxGgnb_lo5wLipW6IUPUmKFpYcpxNXFxcn2cfk9Re8poWA4HWjCwGedjDP953jkxRAUGvCt4EreJFrbuTSUyGf--CZNM1MZOMcqdfpELyWcjacQBADXxWROsFZupxe4AdBZlH7dv2XkLoraciavjeqmIXiY7ZiEtFhcn6rKoft6-AMjZmXs2ZwFYW6aypfdTUP-djW0WbT9nNTl28nITslZTh_ghzW4nBYZUgKgvdDw", "payload": "" } 2025-01-27 22:19:29,329:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854097235 HTTP/1.1" 200 827 2025-01-27 22:19:29,330:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:19:31 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5m-m03bO_u4gRjCOZKUykyh5X8pVj4xC0_PUCyoLfDV2zEJpGeE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:50:18Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854097235/V5AJ-w", "status": "pending", "token": "KjkQOpKsGE0kd7AjKRO2O9xwhV7ModKF2YJR0KYB0eQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854097235/UT_D8g", "status": "pending", "token": "KjkQOpKsGE0kd7AjKRO2O9xwhV7ModKF2YJR0KYB0eQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854097235/UjHR1g", "status": "pending", "token": "KjkQOpKsGE0kd7AjKRO2O9xwhV7ModKF2YJR0KYB0eQ" } ] } 2025-01-27 22:19:29,331:DEBUG:acme.client:Storing nonce: 5m-m03bO_u4gRjCOZKUykyh5X8pVj4xC0_PUCyoLfDV2zEJpGeE 2025-01-27 22:19:29,332:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-27 22:19:29,332:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2025-01-27 22:19:29,333:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-27 22:19:29,333:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-27 22:19:29,334:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-27 22:19:29,334:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-27 22:19:29,334:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-27 22:19:29,335:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-27 22:19:29,336:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-27 22:19:29,375:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-27 22:19:29,558:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-27 22:19:29,560:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is signed by the certificate's issuer. 2025-01-27 22:19:29,560:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is: OCSPCertStatus.GOOD 2025-01-27 22:19:29,564:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:51 UTC. 2025-01-27 22:19:29,565:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-27 22:19:29,565:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-27 22:19:29,571:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-27 22:19:29,571:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-27 22:19:29,571:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-27 22:19:29,577:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-27 22:19:29,578:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-27 22:19:29,581:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-27 22:19:30,059:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-27 22:19:30,060:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:19:32 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "BygrtavIr9Y": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-27 22:19:30,060:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-27 22:19:39,313:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8945_key-certbot.pem 2025-01-27 22:19:48,281:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8943_csr-certbot.pem 2025-01-27 22:19:48,281:DEBUG:acme.client:Requesting fresh nonce 2025-01-27 22:19:48,282:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-27 22:19:48,441:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-27 22:19:48,442:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:19:50 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5m-m03bODHjrbJVmKUOBaCBwFa1O85pEP4Lsiv9cB5MnpWjpy_c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-27 22:19:48,442:DEBUG:acme.client:Storing nonce: 5m-m03bODHjrbJVmKUOBaCBwFa1O85pEP4Lsiv9cB5MnpWjpy_c 2025-01-27 22:19:48,442:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2025-01-27 22:19:48,451:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk9ESGpyYkpWbUtVT0JhQ0J3RmExTzg1cEVQNExzaXY5Y0I1TW5wV2pweV9jIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "uzfrZ-3NiFKo5evoQG30aEsvLXx8N_11ATubNO5rzqLJIc6i-_FWBZzQnkHEZOfk8OIBFANrG8yZlT9t3aCujPkoAq2ZIadeWsf9uEP6HN880ONO8N7ejh5UCmaUOHHyJon5kryXZNSaZjmN9PXy7cmcE5aIM7Mo9gCxFf4reYmlSTo3y92VjBUY1a72qLDQv5kGEwoW8Y9GAGoRGVPIjuoZRYz-nM_mVk9jgZL4xUOc6g5uRjcZjqzVgE6TEQgQJmb41zbljAXVXZhYHtqGu1fy8ubvwxDFQMpovvXPYUDGYH_7pvXRHLeIrTdVeAYmoS8bFeThRW7JnpW9x_BSiQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2025-01-27 22:19:48,642:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 353 2025-01-27 22:19:48,643:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 27 Jan 2025 21:19:50 GMT Content-Type: application/json Content-Length: 353 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140287525 Replay-Nonce: 5m-m03bORGKD5uaCLJyhTzOeHda-XZjgZKb6jp0ovq5HdWPq5FA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:50:33Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854177205" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140287525" } 2025-01-27 22:19:48,643:DEBUG:acme.client:Storing nonce: 5m-m03bORGKD5uaCLJyhTzOeHda-XZjgZKb6jp0ovq5HdWPq5FA 2025-01-27 22:19:48,643:DEBUG:acme.client:JWS payload: b'' 2025-01-27 22:19:48,650:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854177205: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk9SR0tENXVhQ0xKeWhUek9lSGRhLVhaamdaS2I2anAwb3ZxNUhkV1BxNUZBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQxNzcyMDUifQ", "signature": "RLgGgA4TINXGQvTCL_0rYxOd8LopgRC3aNp1-AAZloLaNejp5hXlsELTGD5EbmToGjmvebsZSJ0M-uWrkht7__ej0mGGqvkVV8ReCjvBAznLAyL7NLfuojFKPSDxR91s7fAodbw98Wotxh4gy6wtBo3TjuwjYOcRCt3a_6G4KaSzJ0Z6rf-HpM8ywxRaF3rCnEqKkUqcTOwLpWh8Kc__7NioDfWxPzxejdwOXkYSPpDhATBOSNZSB_1gi6M8LWYiCMjGGEqKK1zsmw45mrUl_zPQKPErPWsmpa5NSLWQ4fIXy_6rAOyIlTLJZxOV0MlB8lL2AMyo510OxxTGouPfuA", "payload": "" } 2025-01-27 22:19:48,814:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854177205 HTTP/1.1" 200 825 2025-01-27 22:19:48,815:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:19:50 GMT Content-Type: application/json Content-Length: 825 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNf3KUpImt_yT7HL9p3SptFQ2j__kGvu3cbLyxRpA6yRt0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:50:33Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854177205/kg1xTg", "status": "pending", "token": "H8dHt8qoQ8VNCmFdaH8TCH_B1Jp6zw16C-lKKxCESW0" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854177205/kFR0rA", "status": "pending", "token": "H8dHt8qoQ8VNCmFdaH8TCH_B1Jp6zw16C-lKKxCESW0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854177205/rxXYJw", "status": "pending", "token": "H8dHt8qoQ8VNCmFdaH8TCH_B1Jp6zw16C-lKKxCESW0" } ] } 2025-01-27 22:19:48,816:DEBUG:acme.client:Storing nonce: qx2pCBNf3KUpImt_yT7HL9p3SptFQ2j__kGvu3cbLyxRpA6yRt0 2025-01-27 22:19:48,816:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-27 22:19:48,817:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2025-01-27 22:19:48,818:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-27 22:19:48,818:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-27 22:19:48,820:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-27 22:19:48,820:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-27 22:19:48,820:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-27 22:19:48,821:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-27 22:19:48,822:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-27 22:19:48,884:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-27 22:19:49,089:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-27 22:19:49,090:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-27 22:19:49,091:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-27 22:19:49,096:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:13 UTC. 2025-01-27 22:19:49,096:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-27 22:19:49,097:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-27 22:19:49,104:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-27 22:19:49,104:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-27 22:19:49,104:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-27 22:19:49,120:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-27 22:19:49,121:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-27 22:19:49,123:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-27 22:19:49,611:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-27 22:19:49,611:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:19:51 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "V3-2Cd4Rk70": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-27 22:19:49,612:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-27 22:19:59,073:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8946_key-certbot.pem 2025-01-27 22:20:08,086:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8944_csr-certbot.pem 2025-01-27 22:20:08,087:DEBUG:acme.client:Requesting fresh nonce 2025-01-27 22:20:08,087:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-27 22:20:08,251:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-27 22:20:08,251:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:20:10 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNfEjS9Z6qYEJX2-ctW0tPm2gtuxvPmz57SrpCQbcZwsiU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-27 22:20:08,252:DEBUG:acme.client:Storing nonce: qx2pCBNfEjS9Z6qYEJX2-ctW0tPm2gtuxvPmz57SrpCQbcZwsiU 2025-01-27 22:20:08,252:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2025-01-27 22:20:08,259:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZFalM5WjZxWUVKWDItY3RXMHRQbTJndHV4dlBtejU3U3JwQ1FiY1p3c2lVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Td3EybQxdiSutvLbM8o98-eFDm-WmUWsK6hzNf0F70e5allcJPEkWVbSUIXQNHydpmv4kvXjLKfXdA_6b8ZoXIkVmJaYgTUYIr7zvPzMGm0OS13UWGKfNt_G665jUaN7kNO3mv4jqfl9M9guBDuUe2bWTvNOd66RIi3FPsUvdzNl1d-z5GZEHIVsp4V0rnPSL92Tw9CkpGN6172DbD1smp1RDP0obqXQZCODDxMnmlk8F3j1vYExag7oSopHZROeZ3SepF7aQOeAl3FdTU1NPc-EpDW4kmQAa64I5PSnYrer1TniJ3A__v23AVzXTRpI9gqg0kY41cw_7XZYSHGMxQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-01-27 22:20:08,457:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 352 2025-01-27 22:20:08,457:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 27 Jan 2025 21:20:10 GMT Content-Type: application/json Content-Length: 352 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140337675 Replay-Nonce: qx2pCBNf3Qd8TtjeBu-NL6I6RH-_1rT4ls_S7OE76E21zxj07LQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:50:47Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854251985" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140337675" } 2025-01-27 22:20:08,457:DEBUG:acme.client:Storing nonce: qx2pCBNf3Qd8TtjeBu-NL6I6RH-_1rT4ls_S7OE76E21zxj07LQ 2025-01-27 22:20:08,458:DEBUG:acme.client:JWS payload: b'' 2025-01-27 22:20:08,464:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854251985: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmYzUWQ4VHRqZUJ1LU5MNkk2UkgtXzFyVDRsc19TN09FNzZFMjF6eGowN0xRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQyNTE5ODUifQ", "signature": "H0Mwgq0_lx9eA9OiQNl5vhrTnnedCAJPAVr646ZN1DZIfRNqASTNcUxuu-yYkfExYoWpkDjOA9m1czJKk9qajlf23jG1I6fTZWllDUmNnTkQHifzkc9JDGq3pkf0aiMZbam4odEHsbF4Nt8NnjU3mvyW19RZ5Dkc5xwasnAVrgzhjawSTKGoDUvcb9QEMy7rHxNhPo-Tqrf4H11TWEju2f2lwlYYWLKh9kvK67aIk1aH1lu18k_Bq5QEg45YXEbzQwBwARI12S74HMZ3yhd-LUze7g5vfIP1-amfLakupT-9S_JNB4xbwWyFVf4d1GF3E3sd0-NMD7PG646o_DDeig", "payload": "" } 2025-01-27 22:20:08,634:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854251985 HTTP/1.1" 200 824 2025-01-27 22:20:08,635:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:20:10 GMT Content-Type: application/json Content-Length: 824 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNfzAjtAJNuKYsZReLGjBlhkxjL3wwkd4fnURqRLcY70NA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:50:47Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854251985/0MCU7A", "status": "pending", "token": "6G2w1CurrpHij2hITHkq2tRG08iPbRRnVO6r0-K3hiU" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854251985/5c2Euw", "status": "pending", "token": "6G2w1CurrpHij2hITHkq2tRG08iPbRRnVO6r0-K3hiU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854251985/BXlLPQ", "status": "pending", "token": "6G2w1CurrpHij2hITHkq2tRG08iPbRRnVO6r0-K3hiU" } ] } 2025-01-27 22:20:08,635:DEBUG:acme.client:Storing nonce: qx2pCBNfzAjtAJNuKYsZReLGjBlhkxjL3wwkd4fnURqRLcY70NA 2025-01-27 22:20:08,636:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-27 22:20:08,636:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2025-01-27 22:20:08,636:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-27 22:20:08,638:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-27 22:20:08,639:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-27 22:20:08,639:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-27 22:20:08,639:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-27 22:20:08,640:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-27 22:20:08,641:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-27 22:20:08,691:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2025-01-27 22:20:08,691:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-27 22:20:08,691:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2025-01-27 22:20:08,704:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2025-01-27 22:20:08,713:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2025-01-27 22:20:08,713:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2025-01-27 22:20:08,713:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2025-01-27 22:20:08,714:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2025-01-27 22:20:08,719:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2025-01-27 22:20:08,769:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-27 22:20:08,953:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-27 22:20:08,955:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-27 22:20:08,956:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-27 22:20:08,962:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:35 UTC. 2025-01-27 22:20:08,962:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-27 22:20:08,962:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-27 22:20:08,970:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-27 22:20:08,970:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-27 22:20:08,970:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-27 22:20:08,975:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-27 22:20:08,976:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-27 22:20:08,978:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-27 22:20:09,457:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-27 22:20:09,458:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:20:11 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "9qe7pIo_Sv0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-27 22:20:09,458:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-27 22:20:18,821:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8947_key-certbot.pem 2025-01-27 22:20:27,638:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8945_csr-certbot.pem 2025-01-27 22:20:27,639:DEBUG:acme.client:Requesting fresh nonce 2025-01-27 22:20:27,639:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-27 22:20:27,799:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-27 22:20:27,800:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:20:29 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5m-m03bOijbEQjFy3Hbog16QVPNhmG2Amvn9VkcljJpxjA7kklU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-27 22:20:27,800:DEBUG:acme.client:Storing nonce: 5m-m03bOijbEQjFy3Hbog16QVPNhmG2Amvn9VkcljJpxjA7kklU 2025-01-27 22:20:27,800:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2025-01-27 22:20:27,809:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk9pamJFUWpGeTNIYm9nMTZRVlBOaG1HMkFtdm45VmtjbGpKcHhqQTdra2xVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "VyFux_R7E1lmJ9mh0a2k-hityHUOydx1rqNNCoNkFVRPAF4IXOjPfI3XE049U2vmGGIzetlDZyRlfGxHotVn1HKTblj4vLB9qtgRRPMOsgm4pYyfu7g0tKvLQ8Cy1C9uQHrnbaqWArJXpWFJToTDMIfKHxQtB-g130PEGzZhgp4EJez1qmnsRng7ZxoLUPEyMhwvJ2-x6EifQAybQSuw03o0-y7tr7fgiwJVwOulsDvieHEjuFykIGknZF1fvXM1dw59zDb95XmwoksOojq7zR4aZYYmglgEOKiVmcYPfvlHIDS8jt5k8jeFZ1QsgL69yqL3hZM6LgC4w5sY7c_Psw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-27 22:20:28,005:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 357 2025-01-27 22:20:28,005:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 27 Jan 2025 21:20:30 GMT Content-Type: application/json Content-Length: 357 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140387985 Replay-Nonce: qx2pCBNfiIjk6_Rp2UkGJAUKplrkIKl5-iVKUWgLaqAbxUA7YgY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:51:01Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854328725" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140387985" } 2025-01-27 22:20:28,006:DEBUG:acme.client:Storing nonce: qx2pCBNfiIjk6_Rp2UkGJAUKplrkIKl5-iVKUWgLaqAbxUA7YgY 2025-01-27 22:20:28,006:DEBUG:acme.client:JWS payload: b'' 2025-01-27 22:20:28,011:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854328725: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZpSWprNl9ScDJVa0dKQVVLcGxya0lLbDUtaVZLVVdnTGFxQWJ4VUE3WWdZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQzMjg3MjUifQ", "signature": "uCRQZdVfpq_W5Ub7cZB4U0JP3A_fBqsjzBeQE331-9WnpgsuyTWJugtkXrSd9-5izaKO_gr8IOZofQTli2llu1lcdohvmZ_IHuaeX7laBjMiVOyaMpNDev6hv6qjbIqUc4UCjiSrrWiDcjMPisyioKWWryfDgha9peL3jQdC3yhBPcc_kkXts9mGqF8PLN5ZogoLjTH6Jh4HxzGEpPUWpuvAEXbrOx-1jS5dYRYPvZ7WHvf-f9oMNIzKXG4kmhywNyUTBNg9JkXYqlIO_R_JKQ9smtGatLIRkMrcmghchqp1gH2i9tpwM3ZMN1krcl4ZzOnZU5oLVY5mCfKvZY1pRg", "payload": "" } 2025-01-27 22:20:28,176:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854328725 HTTP/1.1" 200 829 2025-01-27 22:20:28,177:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:20:30 GMT Content-Type: application/json Content-Length: 829 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5m-m03bO0nR-vGZnqWURQqhnwp6tepNNqurLHXQ3zN_vErpMI8A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:51:01Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854328725/VqO_UQ", "status": "pending", "token": "YkklgBeK2o9V4mrDoqb54xIn-8JMHXfG6sfufSWxePI" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854328725/F1PGXg", "status": "pending", "token": "YkklgBeK2o9V4mrDoqb54xIn-8JMHXfG6sfufSWxePI" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854328725/HpD31A", "status": "pending", "token": "YkklgBeK2o9V4mrDoqb54xIn-8JMHXfG6sfufSWxePI" } ] } 2025-01-27 22:20:28,177:DEBUG:acme.client:Storing nonce: 5m-m03bO0nR-vGZnqWURQqhnwp6tepNNqurLHXQ3zN_vErpMI8A 2025-01-27 22:20:28,178:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-27 22:20:28,178:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2025-01-27 22:20:28,178:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-27 22:20:28,178:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-27 22:20:28,179:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-27 22:20:28,179:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-27 22:20:28,179:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-27 22:20:28,179:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-27 22:20:28,180:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-27 22:20:28,233:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-27 22:20:28,400:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-27 22:20:28,401:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-27 22:20:28,402:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-27 22:20:28,406:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:05 UTC. 2025-01-27 22:20:28,407:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-27 22:20:28,407:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-27 22:20:28,414:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-27 22:20:28,414:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-27 22:20:28,415:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-27 22:20:28,421:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-27 22:20:28,422:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-27 22:20:28,423:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-27 22:20:28,866:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-27 22:20:28,866:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:20:31 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Nk0ZyPkepG4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-27 22:20:28,868:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-27 22:20:38,258:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8948_key-certbot.pem 2025-01-27 22:20:46,926:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8946_csr-certbot.pem 2025-01-27 22:20:46,926:DEBUG:acme.client:Requesting fresh nonce 2025-01-27 22:20:46,926:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-27 22:20:47,076:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-27 22:20:47,076:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:20:49 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: KY2mD_Ajgpui5_FGza9Im3Bdsg3YP3B3U1Yt6Zk6yk6DMeU_XgY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-27 22:20:47,077:DEBUG:acme.client:Storing nonce: KY2mD_Ajgpui5_FGza9Im3Bdsg3YP3B3U1Yt6Zk6yk6DMeU_XgY 2025-01-27 22:20:47,077:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2025-01-27 22:20:47,084:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWpncHVpNV9GR3phOUltM0Jkc2czWVAzQjNVMVl0NlprNnlrNkRNZVVfWGdZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "AYOSr58jbn5O5shbRPzfD-X9z3dPKVfSOXn7TTXzeesgGW_orzIISVlvZDVRDR8cUAPdOfUdf0RLb4GGDhWJ86wLFUYayLqCVnuTYqtzP6o1Pa3nkKqfwUM8XbRcvPt5w6x2cq6a_xOdvBkb6aB6yfj-OxVhkh5BcDJalJ5RymfxHzf1DRSFiHcnfSL1uqd30g64Kja2leeN8sXjl8Her48xfR2W-9ThOegkm_GodepWXj0hKGbVMKuC9OdcY-I_Q8vbAA_kXJFFelRw58_MzQC-pL3K9nTeynZLSaZm07reJyQWcJerQ2fB8FcPHrFccofQU_U-gs_5Lx9C3D6LbA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2025-01-27 22:20:47,284:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356 2025-01-27 22:20:47,285:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 27 Jan 2025 21:20:49 GMT Content-Type: application/json Content-Length: 356 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140450885 Replay-Nonce: KY2mD_AjGMQP7lse4-vbiP4G3gxCrZkQFwZhxnvB_JXUoHsQT9Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:51:16Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854428445" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140450885" } 2025-01-27 22:20:47,285:DEBUG:acme.client:Storing nonce: KY2mD_AjGMQP7lse4-vbiP4G3gxCrZkQFwZhxnvB_JXUoHsQT9Y 2025-01-27 22:20:47,286:DEBUG:acme.client:JWS payload: b'' 2025-01-27 22:20:47,291:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854428445: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWpHTVFQN2xzZTQtdmJpUDRHM2d4Q3Jaa1FGd1poeG52Ql9KWFVvSHNRVDlZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ0Mjg0NDUifQ", "signature": "fTRNB8EofUmh32wNNetMtRu1Mb_yavIkuHIYusBy9JuXDjWy3V-rsxjtsXYV4m2JcXfY7rWoXfZvi8uIpZ7vP55hvqiiUwtr_IWc91dtlRumE3zQFrqGg433SdDRHW2Wg74FX6hY1dcVuSFdDGjOrVvPCSYyMyoyutQQXFSHaL-F4TziKbByvxJSkk5DOAOXhkrJ3DaAHqcO7tzPgfuWb0oMY3MlBGCxuy1s4gd2sy0DPth8vO9cpDCLNHXfP4j-5eu6rMuQVVQRkFyQ5z0GPMPAJBsGxwDOo5OXdSYrGF0L6gCck4S9F8KSiu8gZoKJYOApHpugAAAILHecSfuFTg", "payload": "" } 2025-01-27 22:20:47,450:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854428445 HTTP/1.1" 200 828 2025-01-27 22:20:47,450:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:20:49 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Z6auUXuucOP-Wdsf5U3c-uNzMqDNNcuDj6y-w-6xjHNXN1GcKUQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:51:16Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854428445/tA2UdQ", "status": "pending", "token": "kR-nkArfvAb4RqjGdmf_0sc2lDYeXub72wgxP10lapo" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854428445/HO9jNQ", "status": "pending", "token": "kR-nkArfvAb4RqjGdmf_0sc2lDYeXub72wgxP10lapo" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854428445/Ra9g4Q", "status": "pending", "token": "kR-nkArfvAb4RqjGdmf_0sc2lDYeXub72wgxP10lapo" } ] } 2025-01-27 22:20:47,451:DEBUG:acme.client:Storing nonce: Z6auUXuucOP-Wdsf5U3c-uNzMqDNNcuDj6y-w-6xjHNXN1GcKUQ 2025-01-27 22:20:47,451:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-27 22:20:47,452:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2025-01-27 22:20:47,452:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-27 22:20:47,453:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-27 22:20:47,453:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-27 22:20:47,453:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-27 22:20:47,454:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-27 22:20:47,454:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-27 22:20:47,455:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-27 22:20:47,512:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-27 22:20:47,694:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-27 22:20:47,697:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2025-01-27 22:20:47,698:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2025-01-27 22:20:47,703:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:33 UTC. 2025-01-27 22:20:47,703:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-27 22:20:47,703:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-27 22:20:47,709:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-27 22:20:47,710:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-27 22:20:47,710:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-27 22:20:47,716:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-27 22:20:47,717:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-27 22:20:47,719:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-27 22:20:48,162:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-27 22:20:48,163:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:20:50 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "yAYZUmytFtw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2025-01-27 22:20:48,164:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-27 22:20:57,301:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8949_key-certbot.pem 2025-01-27 22:21:06,228:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8947_csr-certbot.pem 2025-01-27 22:21:06,228:DEBUG:acme.client:Requesting fresh nonce 2025-01-27 22:21:06,229:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-27 22:21:06,378:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-27 22:21:06,378:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:21:08 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: KY2mD_AjndAdoneH1Co0xnO28w3AMMB2ctHF3-BZBLZYjRTItPQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-27 22:21:06,379:DEBUG:acme.client:Storing nonce: KY2mD_AjndAdoneH1Co0xnO28w3AMMB2ctHF3-BZBLZYjRTItPQ 2025-01-27 22:21:06,379:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2025-01-27 22:21:06,387:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWpuZEFkb25lSDFDbzB4bk8yOHczQU1NQjJjdEhGMy1CWkJMWllqUlRJdFBRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "M8fzBPCRr1ffEsAmGXV_w9znnb_efgZLTteyW8IlkoBgDg_f_Y47hSRmHx6MUPuZLbVA9I74Q7WoqcoVGIm3ccOTnwcg5z1N7q3xAtzLUEdzpglNR7pHuprtPbdLXAjI92-scJF7QtK0SphzBBGGvPkjvtlZ-jtmex8ViXYQyC-7y6iybD5EiC6Xeyn_u4EzDEVA4lLFSZEnkg-SNJW_X3_rLUboGF7XQ3aLzN1Fpn6cobC7n-GKIW33CQAiiEPTM9D0pvuwPZsKVH7c1h8767BnjTs1BTnwdQ6YMWwTwGy-VPJ6BNX5VggFtK7nIb0OsgNwYHp2sS7ZbeIOt6MNEg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-01-27 22:21:06,628:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2025-01-27 22:21:06,629:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 27 Jan 2025 21:21:08 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140503565 Replay-Nonce: KY2mD_Aj13Fvs6kRhkTAAeAkOPwUNq7CZYvVPzeFyAq8DzSBC98 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:51:31Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854513645" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140503565" } 2025-01-27 22:21:06,629:DEBUG:acme.client:Storing nonce: KY2mD_Aj13Fvs6kRhkTAAeAkOPwUNq7CZYvVPzeFyAq8DzSBC98 2025-01-27 22:21:06,630:DEBUG:acme.client:JWS payload: b'' 2025-01-27 22:21:06,638:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854513645: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWoxM0Z2czZrUmhrVEFBZUFrT1B3VU5xN0NaWXZWUHplRnlBcThEelNCQzk4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ1MTM2NDUifQ", "signature": "aPPdx6BVJSD9lw3L3WuQHx6qwX69fU5FNJCUMzUx8xs-3UIbw328qMWuY3hw5eu9_p6WYmbozX0F1lBFaOvkEkXwDhxBW05f4JLQfmqjJ3Oc2rnOQAGFE6zWRpgEFgNQhMs2j3MjU6UF2Y2GG4KVoTOiIwwoJ-U7XlsSgl_Oomi4mbVhTz0yskZNhf1xwP7RB7H96AHr-HNXC75OR6HKP7BGuG_gTBb_aoNekxnWsiJF74eU_8jWXfXXsLMIBhx4PjzCrPcOVd8Mv8N0BbyoPI2FYBNuhSfAAO0UBb_AiZk7SsF-qmb-lnolCQofTLkCTsl1pjiIMGAWqsKppIeYTw", "payload": "" } 2025-01-27 22:21:06,808:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854513645 HTTP/1.1" 200 827 2025-01-27 22:21:06,808:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:21:08 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: KY2mD_AjVG1G6Hr2_9Sd0Kg4EpLyt55AhkMnZ3e54UCDn7DA33M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:51:31Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854513645/IJYfNQ", "status": "pending", "token": "s0IZH-lt4CcoWX89FYesqwmuLxn1XQ-WV9fmxwfzdJ0" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854513645/2DTePg", "status": "pending", "token": "s0IZH-lt4CcoWX89FYesqwmuLxn1XQ-WV9fmxwfzdJ0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854513645/YCt_0g", "status": "pending", "token": "s0IZH-lt4CcoWX89FYesqwmuLxn1XQ-WV9fmxwfzdJ0" } ] } 2025-01-27 22:21:06,809:DEBUG:acme.client:Storing nonce: KY2mD_AjVG1G6Hr2_9Sd0Kg4EpLyt55AhkMnZ3e54UCDn7DA33M 2025-01-27 22:21:06,809:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-27 22:21:06,810:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2025-01-27 22:21:06,810:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-27 22:21:06,811:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-27 22:21:06,811:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-27 22:21:06,812:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-27 22:21:06,812:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-27 22:21:06,812:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-27 22:21:06,813:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-27 22:21:06,857:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-27 22:21:07,045:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-27 22:21:07,046:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2025-01-27 22:21:07,047:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2025-01-27 22:21:07,051:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:54 UTC. 2025-01-27 22:21:07,051:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-27 22:21:07,052:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-27 22:21:07,057:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-27 22:21:07,058:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-27 22:21:07,058:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-27 22:21:07,064:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-27 22:21:07,065:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-27 22:21:07,067:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-27 22:21:07,559:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-27 22:21:07,560:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:21:09 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "cTLeGO45gfg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-27 22:21:07,560:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-27 22:21:16,576:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8950_key-certbot.pem 2025-01-27 22:21:25,537:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8948_csr-certbot.pem 2025-01-27 22:21:25,539:DEBUG:acme.client:Requesting fresh nonce 2025-01-27 22:21:25,539:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-27 22:21:25,704:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-27 22:21:25,705:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:21:27 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNfqJI7xtfLVTULbl7JeyoU0bqImPvO48dAasgp7eAGBoA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-27 22:21:25,705:DEBUG:acme.client:Storing nonce: qx2pCBNfqJI7xtfLVTULbl7JeyoU0bqImPvO48dAasgp7eAGBoA 2025-01-27 22:21:25,705:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2025-01-27 22:21:25,713:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZxSkk3eHRmTFZUVUxibDdKZXlvVTBicUltUHZPNDhkQWFzZ3A3ZUFHQm9BIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Oyri5CvWU51CKLOIKR60zXHSeAB3VajL15kQP1NMV5TEQfG5CGwIPJpOzKpQaFYAmohUqRlTftgQDzqkJidBrLDuKRIAR9on0bM56WpwFAh9vjuyGe8TJ9uYizORcOCAcKXtKtUCiKlhCDTx6xuasFdBbbxSllDlXK97CsENEZHdux3yD3NVPLj16Si5FzoFtIrocoPeDva1L5AN8fpCciqtE9gL5-3c9Zj9GmsiJbrh8l0EFEnG-0MalUK5tM8uG2MZh0UZ_VY84as6TFPHBsWa9x8vVxjVkGkTTVb5cNqqmZypPWlRuAFcYUooyhNuylhgHHGl46YUU_YRWA-SdQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-27 22:21:25,909:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-27 22:21:25,910:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 27 Jan 2025 21:21:28 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140552425 Replay-Nonce: 5m-m03bO14uBAdG2xwcElNfbAU6aF5GuKC6_YJiYgAq4kiZpgP4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:51:46Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854589515" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140552425" } 2025-01-27 22:21:25,910:DEBUG:acme.client:Storing nonce: 5m-m03bO14uBAdG2xwcElNfbAU6aF5GuKC6_YJiYgAq4kiZpgP4 2025-01-27 22:21:25,910:DEBUG:acme.client:JWS payload: b'' 2025-01-27 22:21:25,919:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854589515: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk8xNHVCQWRHMnh3Y0VsTmZiQVU2YUY1R3VLQzZfWUppWWdBcTRraVpwZ1A0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ1ODk1MTUifQ", "signature": "n8KkiRROR5sNyAM6b2pvsJyHTWd04c_-NzFzIO_iIbjTql0noWYwtfuV3h1gM_3BNmEMbemiY2O5091693tr51o805zsL4M5l6dFVJh4qnkUW_PCSvKHugF5ixavY2hA-3nzWfz-EwyhjtUz881ZWzGfpG_BVxEuaCeK63LVjxVWcvVh5nVtWP88hSxGuXw1iYr2AIiBaIK2MGEBd3CZiFGkam9ullSwW2F9axqMYmQ30ABJbOkGXfDRySFI8Nuf3TdKcIB7xFQRCrP516gNUwd1cxIAmmOI9AKyjGsoAGphG5fITNCJ27gYsPu3CmcFr38BLplqiSDQUzjfVpDnXQ", "payload": "" } 2025-01-27 22:21:26,084:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854589515 HTTP/1.1" 200 823 2025-01-27 22:21:26,085:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:21:28 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5m-m03bODTdZ1GQT-rR1fc6TKBh3MniWOcaF2C59wMhfu7tFUAI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:51:46Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854589515/qQ_GAQ", "status": "pending", "token": "vgzC_qBhQwpwOiNo_CvLkC_XDVMlXhOW2G1auAvN-v8" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854589515/MXV7zQ", "status": "pending", "token": "vgzC_qBhQwpwOiNo_CvLkC_XDVMlXhOW2G1auAvN-v8" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854589515/0ytQ9g", "status": "pending", "token": "vgzC_qBhQwpwOiNo_CvLkC_XDVMlXhOW2G1auAvN-v8" } ] } 2025-01-27 22:21:26,085:DEBUG:acme.client:Storing nonce: 5m-m03bODTdZ1GQT-rR1fc6TKBh3MniWOcaF2C59wMhfu7tFUAI 2025-01-27 22:21:26,086:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-27 22:21:26,086:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2025-01-27 22:21:26,087:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-27 22:21:26,087:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-27 22:21:26,088:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-27 22:21:26,088:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-27 22:21:26,088:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-27 22:21:26,089:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-27 22:21:26,090:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-27 22:21:26,146:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-27 22:21:26,323:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-27 22:21:26,324:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-27 22:21:26,325:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-27 22:21:26,330:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:15 UTC. 2025-01-27 22:21:26,330:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-27 22:21:26,331:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-27 22:21:26,336:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-27 22:21:26,336:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-27 22:21:26,337:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-27 22:21:26,343:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-27 22:21:26,344:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-27 22:21:26,346:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-27 22:21:26,814:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-27 22:21:26,814:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:21:28 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "ntwGfUVgDMM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-27 22:21:26,815:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-27 22:21:36,085:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8951_key-certbot.pem 2025-01-27 22:21:44,810:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8949_csr-certbot.pem 2025-01-27 22:21:44,810:DEBUG:acme.client:Requesting fresh nonce 2025-01-27 22:21:44,810:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-27 22:21:44,965:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-27 22:21:44,966:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:21:47 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Z6auUXuuI6NmdH0rkfPNMKUohDbhI1Sf_e7Fkmcv3Hfpv7xiA8E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-27 22:21:44,966:DEBUG:acme.client:Storing nonce: Z6auUXuuI6NmdH0rkfPNMKUohDbhI1Sf_e7Fkmcv3Hfpv7xiA8E 2025-01-27 22:21:44,966:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2025-01-27 22:21:44,973:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVJNk5tZEgwcmtmUE5NS1VvaERiaEkxU2ZfZTdGa21jdjNIZnB2N3hpQThFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "YhN33_eOkYQ422gqcEtonMZVYHnPjMKzkwkkBQpsZICQh6ee81rxv2PLDhJ7ZbRIXdzU5J5HD8porN_b15YZhRx3J2f-KTWLnjZGge1oecIwigWGN8sg_OA0VV1q0oDpwpJvp52JVgyGDRgQvzE70sxfWpoq5Zyz2gGNTUWH99CMPhkUvadywYI8xtRPuSPk_oQI4sYR-_Q7Uh9mSQthnrRKwKzWTLDvU1IiXDXKo3UcZoLMf9t_NXh105g0VQhto3zo2t2GdFusuqiQ4ncImsJ7mEirhm440ICYTfombTcciA9ERFqC1Fntu1PFx1UFxBRyTtayN-BOOOrjwr534A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-27 22:21:45,165:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-27 22:21:45,166:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 27 Jan 2025 21:21:47 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140602055 Replay-Nonce: Z6auUXuuzOYIuddD6dY1xKuBSgePE6e6fEmoSG5uQKsiEjIWJjw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:52:00Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854665835" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140602055" } 2025-01-27 22:21:45,167:DEBUG:acme.client:Storing nonce: Z6auUXuuzOYIuddD6dY1xKuBSgePE6e6fEmoSG5uQKsiEjIWJjw 2025-01-27 22:21:45,167:DEBUG:acme.client:JWS payload: b'' 2025-01-27 22:21:45,175:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854665835: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXV6T1lJdWRkRDZkWTF4S3VCU2dlUEU2ZTZmRW1vU0c1dVFLc2lFaklXSmp3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ2NjU4MzUifQ", "signature": "t0aqpXe7BbJPfSCWwUmAmkm86V-owgQ6PCOpEI_Yc3HLP5iN7p10O6nItK1qy1o-GC_BTHyJa3sTsoe7wuOSEe5zV16Y4lTohPUEN_eT2jvJXQ22NaizusPOK3K6ZG7C7-_4oo_tY-es-dpH90l0n6W3LM6V27voh6qRh6ZkcUCzm61XEtn7iiMe84MYNIiOtPmG3KPHb2-Z42pDz6JQPMjeNh3lGTduo8caBeehN2AVk1olcnl0k4wFmh0SUVbEA9xrsm3rWWeE8t26FR5PVLkPAR64kLgiZ-UdHA3JgkgRlVwZ-Lx9o47c6PUY47ytM_fGB9-XoN40LFef2k-Oyg", "payload": "" } 2025-01-27 22:21:45,341:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854665835 HTTP/1.1" 200 823 2025-01-27 22:21:45,342:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:21:47 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Z6auUXuuDTGyn9c4RZXgIRWL72QgET60g0aOGnR3KcolH_Ujwzw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:52:00Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854665835/hkfxMA", "status": "pending", "token": "IQq7H-CrjRngbvlfBYyq4TC9BGO3mQb9XFlUCm-xOp8" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854665835/A7xmXA", "status": "pending", "token": "IQq7H-CrjRngbvlfBYyq4TC9BGO3mQb9XFlUCm-xOp8" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854665835/VSa2Qg", "status": "pending", "token": "IQq7H-CrjRngbvlfBYyq4TC9BGO3mQb9XFlUCm-xOp8" } ] } 2025-01-27 22:21:45,343:DEBUG:acme.client:Storing nonce: Z6auUXuuDTGyn9c4RZXgIRWL72QgET60g0aOGnR3KcolH_Ujwzw 2025-01-27 22:21:45,343:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-27 22:21:45,344:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2025-01-27 22:21:45,344:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-27 22:21:45,345:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-27 22:21:45,345:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-27 22:21:45,346:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-27 22:21:45,346:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-27 22:21:45,346:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-27 22:21:45,348:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-27 22:21:45,410:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-27 22:21:45,594:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-27 22:21:45,596:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2025-01-27 22:21:45,597:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2025-01-27 22:21:45,601:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:38 UTC. 2025-01-27 22:21:45,602:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-27 22:21:45,602:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-27 22:21:45,610:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-27 22:21:45,611:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-27 22:21:45,611:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-27 22:21:45,616:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-27 22:21:45,617:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-27 22:21:45,619:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-27 22:21:46,095:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-27 22:21:46,095:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:21:48 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "XJcCaXB0mWE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-27 22:21:46,096:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-27 22:21:55,370:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8952_key-certbot.pem 2025-01-27 22:22:04,347:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8950_csr-certbot.pem 2025-01-27 22:22:04,348:DEBUG:acme.client:Requesting fresh nonce 2025-01-27 22:22:04,348:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-27 22:22:04,501:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-27 22:22:04,502:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:22:06 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Z6auUXuujC7blD3og0Dy1U2gJBngS5cjsDACTZE4uF6779fW7Wo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-27 22:22:04,502:DEBUG:acme.client:Storing nonce: Z6auUXuujC7blD3og0Dy1U2gJBngS5cjsDACTZE4uF6779fW7Wo 2025-01-27 22:22:04,502:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2025-01-27 22:22:04,510:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVqQzdibEQzb2cwRHkxVTJnSkJuZ1M1Y2pzREFDVFpFNHVGNjc3OWZXN1dvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "sYkH-L67__CNVQFGClXU4OMjEwTXQicNlr4oLaI7kvjgh3NxEAoP2_AGZKqtD1gpj7QpM12NJ78_jNdqYuTRHo17NbJxZrMI7wJAsOa4mvm6ObZVJf7P_l8r-3wmRvFhc4e6l3-yxc5tIocPWLIJSaQOWa54lP_wmWRAtdicfqbtt_vLRRyyGcMynBb9UXcKS77C69JeIStdP749skuBvwoIpGD34e72YIHIzjqVQJ5puJaHZ-JfkwVroOdHFCxQVjJ8cv6gwmaXlfKwwN__SVFe51IwEn7sfAwAfGdlvbWfexE28c3fzTiZkU9MGqItlbuu9IbUeIgaxZ9v4uEm1Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-27 22:22:04,693:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-27 22:22:04,693:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 27 Jan 2025 21:22:06 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140669395 Replay-Nonce: Z6auUXuu9nHF3BlX1OCfBVbHQ3rASYWUkb3Y7k75hMl-lN-Cmpw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:52:15Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854767445" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140669395" } 2025-01-27 22:22:04,694:DEBUG:acme.client:Storing nonce: Z6auUXuu9nHF3BlX1OCfBVbHQ3rASYWUkb3Y7k75hMl-lN-Cmpw 2025-01-27 22:22:04,694:DEBUG:acme.client:JWS payload: b'' 2025-01-27 22:22:04,700:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854767445: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXU5bkhGM0JsWDFPQ2ZCVmJIUTNyQVNZV1VrYjNZN2s3NWhNbC1sTi1DbXB3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ3Njc0NDUifQ", "signature": "lVPnPJYnGES_vT0wHyST4YoKZ6uHkOinrwja2j1tzskgl1DAfOhhd7Gm7AzFL7TWQp7vqhRI1N-Fn_3MUX92lHEbK5bJ6qHx3wQXWWdZOL6gNUPsAiWyu1wt93eRElokR6tqOt6QzW0B19MInZm6kGdL8NyJH-FIUMtpk9LAIpaUitb-_uE-Dt8p3WBEO4dfnD7UKDwCabklu2S8_XG7Y5SYx4-GBtMVBAdkNYUH2m0ImYaBbR85SslYeyh_3OXJYYjo2rXDAfD7L4b3UgZ2mnT-yRtLofWyZgTpjITBHF0WfUJiGnym37G3hZyI-0X2mE-gmPPTcqCfBSmsrSC4UQ", "payload": "" } 2025-01-27 22:22:04,874:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854767445 HTTP/1.1" 200 823 2025-01-27 22:22:04,874:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 27 Jan 2025 21:22:07 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Z6auUXuuo2_2pzWJj_KaJ-cWsMsIeOEa_51JdgGkqe2203N5HS0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:52:15Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854767445/I_YfaQ", "status": "pending", "token": "Z2FjGy5YI24p9E9ApXNQZTvas2Cq6xGIBczpA5STm0k" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854767445/KFIdlQ", "status": "pending", "token": "Z2FjGy5YI24p9E9ApXNQZTvas2Cq6xGIBczpA5STm0k" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854767445/9iBbmQ", "status": "pending", "token": "Z2FjGy5YI24p9E9ApXNQZTvas2Cq6xGIBczpA5STm0k" } ] } 2025-01-27 22:22:04,875:DEBUG:acme.client:Storing nonce: Z6auUXuuo2_2pzWJj_KaJ-cWsMsIeOEa_51JdgGkqe2203N5HS0 2025-01-27 22:22:04,875:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-27 22:22:04,876:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2025-01-27 22:22:04,876:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-27 22:22:04,877:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-27 22:22:04,877:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-27 22:22:04,878:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-27 22:22:04,878:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-27 22:22:04,878:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-27 22:22:04,879:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-27 22:22:04,880:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2025-01-27 22:22:04,880:ERROR:certbot._internal.renewal: C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2025-01-27 22:22:04,881:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 11 renew failure(s), 0 parse failure(s) 2025-01-27 22:22:04,885:ERROR:certbot._internal.log:11 renew failure(s), 0 parse failure(s)