2025-01-26 15:05:54,094:DEBUG:certbot._internal.main:certbot version: 1.6.0 2025-01-26 15:05:54,095:DEBUG:certbot._internal.main:Arguments: [] 2025-01-26 15:05:54,095:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2025-01-26 15:05:55,041:DEBUG:certbot._internal.log:Root logging level set at 20 2025-01-26 15:05:55,042:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2025-01-26 15:05:55,092:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2025-01-26 15:05:55,138:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-26 15:05:55,358:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-26 15:05:55,359:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2025-01-26 15:05:55,364:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2025-01-26 15:05:55,373:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-26 15:05:55,377:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-26 15:05:55,424:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-26 15:05:55,606:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-26 15:05:55,608:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is signed by the certificate's issuer. 2025-01-26 15:05:55,609:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD 2025-01-26 15:05:55,614:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-26 15:05:55,620:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-26 15:05:55,677:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-26 15:05:55,855:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-26 15:05:55,857:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2025-01-26 15:05:55,858:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2025-01-26 15:05:55,863:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-26 15:05:55,867:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-26 15:05:55,910:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-26 15:05:56,098:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-26 15:05:56,100:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is signed by the certificate's issuer. 2025-01-26 15:05:56,101:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is: OCSPCertStatus.GOOD 2025-01-26 15:05:56,106:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-26 15:05:56,110:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-26 15:05:56,158:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-26 15:05:56,332:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-26 15:05:56,333:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert22.pem is signed by the certificate's issuer. 2025-01-26 15:05:56,334:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD 2025-01-26 15:05:56,338:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-26 15:05:56,343:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-26 15:05:56,388:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-26 15:05:56,545:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-26 15:05:56,547:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-26 15:05:56,548:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-26 15:05:56,553:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:13:49 UTC. 2025-01-26 15:05:56,553:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-26 15:05:56,553:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-26 15:05:56,559:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-26 15:05:56,559:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-26 15:05:56,559:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-26 15:05:56,565:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-26 15:05:56,566:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-26 15:05:56,568:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-26 15:05:57,101:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-26 15:05:57,102:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:05:58 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "_nD4lR2mVno": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-26 15:05:57,103:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-26 15:06:06,933:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8923_key-certbot.pem 2025-01-26 15:06:16,064:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8921_csr-certbot.pem 2025-01-26 15:06:16,065:DEBUG:acme.client:Requesting fresh nonce 2025-01-26 15:06:16,065:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-26 15:06:16,238:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-26 15:06:16,239:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:06:18 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNfxIZWyLBrGXUzEwoCpi50DT1TmDZ09xF6rvSLCL-AO8g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-26 15:06:16,239:DEBUG:acme.client:Storing nonce: qx2pCBNfxIZWyLBrGXUzEwoCpi50DT1TmDZ09xF6rvSLCL-AO8g 2025-01-26 15:06:16,239:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2025-01-26 15:06:16,246:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZ4SVpXeUxCckdYVXpFd29DcGk1MERUMVRtRFowOXhGNnJ2U0xDTC1BTzhnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "U-py8oqCMB0Htao3gZJ-qUAkc1dw32fHHShG4iBXTk5QBIt9GFSg2foLxfFVVMHdO1KZ8z7sRadEXTzTArVNb76zVPrqNTRc8PPC9OWJLMZB_XlcBmVt95FMyWSe6WeBh2L79TZIWWTHuSq5lMPscdkMEe-dVTEqN1NzJ6cUCT540Rm6zvaBGh-07B4HCKg2zn1rmVBR2dx2sk0u9LqnjRNV-LG2wiKKWLJc6QXAXeo0WXe_iAtrDjdvVKvr5JNI3EGVhEbUFUawo-Wt7NJBDA-l7SHjz8uzAKC8ABoaXu04f8tD_tl-DebRvjbzKH8-hxKeFBLO0NcK8E-BcWgL2A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-26 15:06:16,447:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-26 15:06:16,448:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 26 Jan 2025 14:06:18 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140171795 Replay-Nonce: qx2pCBNfwSee3OHYzS96CmtCAGVOzDccWNp5rYKytgrU5xcGkQc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:50:04Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464853999535" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140171795" } 2025-01-26 15:06:16,448:DEBUG:acme.client:Storing nonce: qx2pCBNfwSee3OHYzS96CmtCAGVOzDccWNp5rYKytgrU5xcGkQc 2025-01-26 15:06:16,449:DEBUG:acme.client:JWS payload: b'' 2025-01-26 15:06:16,455:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464853999535: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZ3U2VlM09IWXpTOTZDbXRDQUdWT3pEY2NXTnA1cllLeXRnclU1eGNHa1FjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTM5OTk1MzUifQ", "signature": "N-22NeTtLJTkF-0Tsi-a1HgqHNe_O6MvOS9bJRRxbk1qfw-vZ7FZltHVlrc8POnXtph4wSnLt9YKkzG2WR8QRPb1kfM6aAMsXdAklqvTcrXFq9Xll7r175_9Ki1J-rZ3eYr932XU5iYCjxyOrfPy7mIhwsFto9uVoyFwCYHGRz2Ntul_Iqhv3AgSlyWBSHlJeITKipjlSRcVnipmCHgwauxub6C2VwiJMGXW0XcHrsKdMEsd_uOm2adhkWRTmC9rceQmm7QxRtre2B3Mv8Ia9F8wpwEwlY_t71hxfO3vKDhWa6HM_zQW1ybZFO0Uah69z1-oMKgMPdFeptPDEpMRlQ", "payload": "" } 2025-01-26 15:06:16,631:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464853999535 HTTP/1.1" 200 823 2025-01-26 15:06:16,632:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:06:18 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5m-m03bOXLjS7h_7G-E2B2kR5LWH11rc35f4BHjMwqg_S7lCWMs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:50:04Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464853999535/PVUjPA", "status": "pending", "token": "LhsM0YxGT1dL4stq2Tmlq4O2ZKuaujacf5ySryXsyhQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464853999535/_gvNVQ", "status": "pending", "token": "LhsM0YxGT1dL4stq2Tmlq4O2ZKuaujacf5ySryXsyhQ" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464853999535/Gzz9fw", "status": "pending", "token": "LhsM0YxGT1dL4stq2Tmlq4O2ZKuaujacf5ySryXsyhQ" } ] } 2025-01-26 15:06:16,632:DEBUG:acme.client:Storing nonce: 5m-m03bOXLjS7h_7G-E2B2kR5LWH11rc35f4BHjMwqg_S7lCWMs 2025-01-26 15:06:16,633:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-26 15:06:16,633:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2025-01-26 15:06:16,634:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-26 15:06:16,635:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-26 15:06:16,647:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-26 15:06:16,647:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-26 15:06:16,647:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-26 15:06:16,648:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-26 15:06:16,662:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-26 15:06:16,710:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-26 15:06:16,910:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-26 15:06:16,912:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2025-01-26 15:06:16,913:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2025-01-26 15:06:16,918:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:20 UTC. 2025-01-26 15:06:16,919:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-26 15:06:16,919:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-26 15:06:16,924:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-26 15:06:16,924:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-26 15:06:16,925:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-26 15:06:16,940:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-26 15:06:16,941:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-26 15:06:16,944:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-26 15:06:17,390:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-26 15:06:17,390:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:06:19 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "TtonSeP9J2E": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-26 15:06:17,391:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-26 15:06:26,173:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8924_key-certbot.pem 2025-01-26 15:06:34,533:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8922_csr-certbot.pem 2025-01-26 15:06:34,534:DEBUG:acme.client:Requesting fresh nonce 2025-01-26 15:06:34,534:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-26 15:06:34,680:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-26 15:06:34,681:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:06:36 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Z6auUXuuRh6uGzFL5wPkgqNofWSutoRmBy95o4uOPhSGclBRTPI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-26 15:06:34,681:DEBUG:acme.client:Storing nonce: Z6auUXuuRh6uGzFL5wPkgqNofWSutoRmBy95o4uOPhSGclBRTPI 2025-01-26 15:06:34,682:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2025-01-26 15:06:34,690:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVSaDZ1R3pGTDV3UGtncU5vZldTdXRvUm1CeTk1bzR1T1BoU0djbEJSVFBJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Ik-aChzmxcoo4LNUcWL1fQKiBq-qU5LgL3bW5pg9-Yw7eTPqxI8m1pXWBPfNRjW4l52SrcLUL1PwmUsd_nQJp1J1shwO8H_3yrGh-MucAskQoJEUJcW0Hwt89bhjmXhPECTm9JzKpcBJrmcb_SlaYnd6CC76XOi5fkSiSQ2T9HYRvf3GRgxaVgLjB5A6ccoKWQ-rQ_fTNoHdTZcLdatPI1OVS6C_a587pe8MWHDZWXd335yKpvpwL67idtnNth7pCPYlmbCNghhKGJgYipyBJhYe9ptvF_QYbNaqkITch1a_CUzslbUKjEKCBSTsiLqS1gxgT7GHobZ68B4D6_expQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-01-26 15:06:34,875:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2025-01-26 15:06:34,876:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 26 Jan 2025 14:06:36 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140234075 Replay-Nonce: KY2mD_AjGW-Bgm9tVTFDAkSo5MNz-p7mM0HFo1poCeCi4r7Dkwc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:50:18Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854097235" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140234075" } 2025-01-26 15:06:34,876:DEBUG:acme.client:Storing nonce: KY2mD_AjGW-Bgm9tVTFDAkSo5MNz-p7mM0HFo1poCeCi4r7Dkwc 2025-01-26 15:06:34,876:DEBUG:acme.client:JWS payload: b'' 2025-01-26 15:06:34,887:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854097235: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWpHVy1CZ205dFZURkRBa1NvNU1Oei1wN21NMEhGbzFwb0NlQ2k0cjdEa3djIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQwOTcyMzUifQ", "signature": "tXZHVnlGYJHlaB-M0W0khKsxRhoiGC7fpi7ZwJ8yrKHhF-jgsZIWwKSg1zpXxeQB2q65lNQ8B1xq05Lrpc1UQRiLSlpaFRgMIeFdLg5OJjQzDfUCke6HH2ydp7lCNRzQG3pRwJ0zYY-SANQUZqAWrLk2tylhz69ultO0Bq1MVL6dIgwYWKWo8qDxRD1jyKupOweOLnbyIcV7LvdSBwvslna2ngGDk-krtCA_xWNMNjEpFBLDAH2zlwpFrbUXlp7YcxJ254demVFfYH-vrJ8qGTeavhvfRcW2kdZCXH8pTnCBi-CATeAYeBFBK70ICjjLFmZUDtrrCtD_r_Y2EPh86A", "payload": "" } 2025-01-26 15:06:35,051:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854097235 HTTP/1.1" 200 827 2025-01-26 15:06:35,052:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:06:36 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Z6auUXuulZANy-vQXX7X6UDM-bHP8LQsyW5U78UVCWZxOrledfs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:50:18Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854097235/UjHR1g", "status": "pending", "token": "KjkQOpKsGE0kd7AjKRO2O9xwhV7ModKF2YJR0KYB0eQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854097235/UT_D8g", "status": "pending", "token": "KjkQOpKsGE0kd7AjKRO2O9xwhV7ModKF2YJR0KYB0eQ" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854097235/V5AJ-w", "status": "pending", "token": "KjkQOpKsGE0kd7AjKRO2O9xwhV7ModKF2YJR0KYB0eQ" } ] } 2025-01-26 15:06:35,053:DEBUG:acme.client:Storing nonce: Z6auUXuulZANy-vQXX7X6UDM-bHP8LQsyW5U78UVCWZxOrledfs 2025-01-26 15:06:35,053:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-26 15:06:35,054:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2025-01-26 15:06:35,054:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-26 15:06:35,055:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-26 15:06:35,055:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-26 15:06:35,056:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-26 15:06:35,056:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-26 15:06:35,057:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-26 15:06:35,058:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-26 15:06:35,121:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-26 15:06:35,309:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-26 15:06:35,310:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is signed by the certificate's issuer. 2025-01-26 15:06:35,311:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is: OCSPCertStatus.GOOD 2025-01-26 15:06:35,317:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:51 UTC. 2025-01-26 15:06:35,317:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-26 15:06:35,318:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-26 15:06:35,325:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-26 15:06:35,326:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-26 15:06:35,326:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-26 15:06:35,342:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-26 15:06:35,343:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-26 15:06:35,345:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-26 15:06:35,846:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-26 15:06:35,846:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:06:37 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "JW_dW531-R8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-26 15:06:35,847:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-26 15:06:44,491:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8925_key-certbot.pem 2025-01-26 15:06:52,897:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8923_csr-certbot.pem 2025-01-26 15:06:52,897:DEBUG:acme.client:Requesting fresh nonce 2025-01-26 15:06:52,898:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-26 15:06:53,065:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-26 15:06:53,065:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:06:54 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5m-m03bOodEaSKfFYSSvGylv-jfjX14LfZ1U48mwnyNnZ22RbHo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-26 15:06:53,066:DEBUG:acme.client:Storing nonce: 5m-m03bOodEaSKfFYSSvGylv-jfjX14LfZ1U48mwnyNnZ22RbHo 2025-01-26 15:06:53,066:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2025-01-26 15:06:53,072:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk9vZEVhU0tmRllTU3ZHeWx2LWpmalgxNExmWjFVNDhtd255Tm5aMjJSYkhvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "MzsbKRdbjzEDDGQLA8V5blfVPXgye6NheSXUbq9fhuh95vgU91SwmfM0wZdQbUEdMNLCsoj62APEaNAeo9GTxbZmrjl85MYC7Yu-mBJd3mMcYxMDCTU0fZUa6HZ7ayaT5-MqAjrOLFruWhl2HQ3PPl6UyNHl5AhRQqWFQL8W6VlLWimGiwBQF9CeuZ7WLg87rJLxPxllqnOj6pQ9ESWO-uMkQo_1Xu0SK1Uf6kQFombNMxQ3s7bFdxQosJCNaJMcyGG6uTQc-YFvvZnQAs_H2wFBNSggoaxSPvxw3mKiTcsHxszsX0UE0FN0EbNPEDBryupBPcoNoMWTaEAfMSKXQA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2025-01-26 15:06:53,268:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 353 2025-01-26 15:06:53,269:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 26 Jan 2025 14:06:55 GMT Content-Type: application/json Content-Length: 353 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140287525 Replay-Nonce: 5m-m03bO7B_RMzYCLkHSHXPMa8t0ZygERue5lcymceoJOz9wl8M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:50:33Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854177205" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140287525" } 2025-01-26 15:06:53,269:DEBUG:acme.client:Storing nonce: 5m-m03bO7B_RMzYCLkHSHXPMa8t0ZygERue5lcymceoJOz9wl8M 2025-01-26 15:06:53,269:DEBUG:acme.client:JWS payload: b'' 2025-01-26 15:06:53,275:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854177205: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk83Ql9STXpZQ0xrSFNIWFBNYTh0MFp5Z0VSdWU1bGN5bWNlb0pPejl3bDhNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQxNzcyMDUifQ", "signature": "lujcZ7ul6dreS0tXJBC9SvqKqtWNHoviZZrME0yvkijbaJ-jml19HLwY8FDJT3rhFvXr6_DM10vkqeSJkazEeLQGdPG7xylY2mfceWURnRnBiOwYvzVuGWiFeH9nrVDDWr0SmfsXnBMl7dClnHyi3zfG_rgFRNLp0Mat7FpTUBchLaKGVMKqoZtiFVKg17R8UDzTubPkUVpATpDdmhFfDlhN1G1vqy40z3EQI6uw2FptiJTrB5UA2BRrxZKIhAPLjBZTv6j3q6pBlpq72aPbx8rwNu7LGZaLhONGgS_NqlS2FSSNNeNWxoi4MwlHVg7WbeW-ctX8dqZ91hd58VLnPg", "payload": "" } 2025-01-26 15:06:53,447:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854177205 HTTP/1.1" 200 825 2025-01-26 15:06:53,448:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:06:55 GMT Content-Type: application/json Content-Length: 825 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5m-m03bOf5EsPdvS6X8yE2vywFGSTGPda5NZY50dTWxNzCOr7As X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:50:33Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854177205/rxXYJw", "status": "pending", "token": "H8dHt8qoQ8VNCmFdaH8TCH_B1Jp6zw16C-lKKxCESW0" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854177205/kFR0rA", "status": "pending", "token": "H8dHt8qoQ8VNCmFdaH8TCH_B1Jp6zw16C-lKKxCESW0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854177205/kg1xTg", "status": "pending", "token": "H8dHt8qoQ8VNCmFdaH8TCH_B1Jp6zw16C-lKKxCESW0" } ] } 2025-01-26 15:06:53,448:DEBUG:acme.client:Storing nonce: 5m-m03bOf5EsPdvS6X8yE2vywFGSTGPda5NZY50dTWxNzCOr7As 2025-01-26 15:06:53,449:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-26 15:06:53,449:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2025-01-26 15:06:53,450:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-26 15:06:53,450:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-26 15:06:53,451:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-26 15:06:53,451:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-26 15:06:53,451:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-26 15:06:53,452:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-26 15:06:53,453:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-26 15:06:53,497:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-26 15:06:53,697:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-26 15:06:53,699:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-26 15:06:53,699:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-26 15:06:53,705:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:13 UTC. 2025-01-26 15:06:53,706:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-26 15:06:53,706:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-26 15:06:53,712:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-26 15:06:53,713:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-26 15:06:53,713:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-26 15:06:53,718:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-26 15:06:53,719:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-26 15:06:53,721:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-26 15:06:54,195:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-26 15:06:54,196:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:06:56 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "nqoXdCyRDMU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-26 15:06:54,196:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-26 15:07:02,825:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8926_key-certbot.pem 2025-01-26 15:07:11,178:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8924_csr-certbot.pem 2025-01-26 15:07:11,179:DEBUG:acme.client:Requesting fresh nonce 2025-01-26 15:07:11,179:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-26 15:07:11,336:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-26 15:07:11,336:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:07:13 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5m-m03bOKsFwX4wWiDl9lxE77x0rmq7ax0F_HiS5czBSbIVfFc4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-26 15:07:11,337:DEBUG:acme.client:Storing nonce: 5m-m03bOKsFwX4wWiDl9lxE77x0rmq7ax0F_HiS5czBSbIVfFc4 2025-01-26 15:07:11,337:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2025-01-26 15:07:11,345:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk9Lc0Z3WDR3V2lEbDlseEU3N3gwcm1xN2F4MEZfSGlTNWN6QlNiSVZmRmM0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "gLxnGEiHXecIuyIjc2cMsFYa9iIzEOdn3zSGwB-sMEgpZ2XGMVh-1mDoFqccVdpR0lAn9Qe_F8gXhsi3gEH5P4NVbExryQUEpJpsWx3lKnappf-p1RbWbuC7_qDZtZMeujHew_YXqgch5lEHvBukRVORbZ3O9gG-bxiId-yrv40PzzCuwb-FihyxwNPOY_TuwCjPfLQWMrmGGp0Da7odlp4E1zYUMn-m_jd0KhqvIqYDsZRc0gOPemDD1xdJJvXf3JBgxNA7G_oh6HWmDc7VyYeFOp0WjtA-qneekNaC8kNNqAvglQHxucrubhzvp6Sb3EhywspmCeigcw5KTv2JHw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-01-26 15:07:11,516:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 352 2025-01-26 15:07:11,517:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 26 Jan 2025 14:07:13 GMT Content-Type: application/json Content-Length: 352 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140337675 Replay-Nonce: qx2pCBNfEtMU884jJLRlIosew0P_u0JgCBnbw0W77cAvNSl8pVY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:50:47Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854251985" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140337675" } 2025-01-26 15:07:11,518:DEBUG:acme.client:Storing nonce: qx2pCBNfEtMU884jJLRlIosew0P_u0JgCBnbw0W77cAvNSl8pVY 2025-01-26 15:07:11,518:DEBUG:acme.client:JWS payload: b'' 2025-01-26 15:07:11,526:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854251985: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZFdE1VODg0akpMUmxJb3NldzBQX3UwSmdDQm5idzBXNzdjQXZOU2w4cFZZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQyNTE5ODUifQ", "signature": "GcWr14KZumO5zqqHSFxHp5-KwhMlbw8-CSU7oNw8Xn36mzmgajmK9tcAqsNDpmksEIRy2E243DMsJgYQDSGiGAHbEV5J7sAZ7N1kDrwT1Ax5zf6RmE06G0obJ55fRXwJKCt-P5KOyKTTQHZ6l0q7mlZAIOH-6lhyAllEZj3mRReVI00g7TNhGXzosGK6d4umuQPuEPD-AT8LSmy1JjPohZtPDorhxYjMo2EoZPiK1ACk-Rr6xum1k3BmjjP74_rVInneEw3OnU_anuLtn3KYjNeKJLV2SThOi_NhEyCY7CmqL8mGnPZACKSd81TAZiRl6pt6p3DngCopdEritVEnCQ", "payload": "" } 2025-01-26 15:07:11,688:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854251985 HTTP/1.1" 200 824 2025-01-26 15:07:11,689:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:07:13 GMT Content-Type: application/json Content-Length: 824 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5m-m03bOHyCjAju-bT5KZ4Ywr-2jLG9eUPE7OXi-K75grKqHOoE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:50:47Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854251985/0MCU7A", "status": "pending", "token": "6G2w1CurrpHij2hITHkq2tRG08iPbRRnVO6r0-K3hiU" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854251985/5c2Euw", "status": "pending", "token": "6G2w1CurrpHij2hITHkq2tRG08iPbRRnVO6r0-K3hiU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854251985/BXlLPQ", "status": "pending", "token": "6G2w1CurrpHij2hITHkq2tRG08iPbRRnVO6r0-K3hiU" } ] } 2025-01-26 15:07:11,689:DEBUG:acme.client:Storing nonce: 5m-m03bOHyCjAju-bT5KZ4Ywr-2jLG9eUPE7OXi-K75grKqHOoE 2025-01-26 15:07:11,690:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-26 15:07:11,690:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2025-01-26 15:07:11,691:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-26 15:07:11,691:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-26 15:07:11,692:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-26 15:07:11,693:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-26 15:07:11,693:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-26 15:07:11,693:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-26 15:07:11,695:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-26 15:07:11,746:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2025-01-26 15:07:11,747:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-26 15:07:11,747:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2025-01-26 15:07:11,758:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2025-01-26 15:07:11,765:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2025-01-26 15:07:11,765:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2025-01-26 15:07:11,766:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2025-01-26 15:07:11,766:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2025-01-26 15:07:11,771:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2025-01-26 15:07:11,815:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-26 15:07:12,006:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-26 15:07:12,008:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-26 15:07:12,009:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-26 15:07:12,015:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:35 UTC. 2025-01-26 15:07:12,015:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-26 15:07:12,015:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-26 15:07:12,021:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-26 15:07:12,021:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-26 15:07:12,022:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-26 15:07:12,037:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-26 15:07:12,038:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-26 15:07:12,041:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-26 15:07:12,544:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-26 15:07:12,545:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:07:14 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "55h-IjAZxGg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-26 15:07:12,546:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-26 15:07:21,016:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8927_key-certbot.pem 2025-01-26 15:07:29,279:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8925_csr-certbot.pem 2025-01-26 15:07:29,280:DEBUG:acme.client:Requesting fresh nonce 2025-01-26 15:07:29,280:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-26 15:07:29,447:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-26 15:07:29,448:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:07:31 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNfBZsu4k2hhFb_qA3JxD6X17bpNa3y4DIYtERIhxcYP28 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-26 15:07:29,448:DEBUG:acme.client:Storing nonce: qx2pCBNfBZsu4k2hhFb_qA3JxD6X17bpNa3y4DIYtERIhxcYP28 2025-01-26 15:07:29,448:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2025-01-26 15:07:29,458:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZCWnN1NGsyaGhGYl9xQTNKeEQ2WDE3YnBOYTN5NERJWXRFUkloeGNZUDI4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "OP7pJcFXUbLkBJQ3p62kT4VEvBQ1kr_7UICYM8E7TMho5Pd6azS9re0KHV9GdQQjsG-Q8jG0xYEZAJG_2P8kL-4dRV87slf77FnFkQQsuixK8TtgVCUWqwt5lXN9iN-51OieYZori7MFD89f8IQEjubGNeHtKdNWhwIJtYABrpj2kQplDBGvcreGDnialW7vDngYY-Iv9uQk4dWkVtDjkMsPm1U4E7C4i2Zd0iFso_jV-2IYULUl4Yj_YXb9bcGyyI0xviZ9exV-DPnLTPXCMbs3Fd_cqfxWheQ0oAtSMKNHZXX0Lk49IWgHJ_BNnu1-2bdcwJP8h-QZ50XLipa9BA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-26 15:07:29,654:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 357 2025-01-26 15:07:29,655:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 26 Jan 2025 14:07:31 GMT Content-Type: application/json Content-Length: 357 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140387985 Replay-Nonce: 5m-m03bOYau09rmLS8zGiKPoMM877ig2BnUIv4yDOvFPmFc2rkA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:51:01Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854328725" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140387985" } 2025-01-26 15:07:29,656:DEBUG:acme.client:Storing nonce: 5m-m03bOYau09rmLS8zGiKPoMM877ig2BnUIv4yDOvFPmFc2rkA 2025-01-26 15:07:29,656:DEBUG:acme.client:JWS payload: b'' 2025-01-26 15:07:29,663:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854328725: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk9ZYXUwOXJtTFM4ekdpS1BvTU04NzdpZzJCblVJdjR5RE92RlBtRmMycmtBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQzMjg3MjUifQ", "signature": "uJATfZQrCrhw_gUHmqkkIFBkaFIn8ZFdh7EApeIn1SMCQ0hY8GXJG2uuiE2onaABgcw_SiAXF1gNUwgzQL3r85Ur9z1FlB7iiSWeV5kscEgzmGE65bNYW6_PB3C6glUz_q6jHiFeDEuafqeUu69k_UHhxsNAO6b7un-zDwqG0HawvsM3m_zf8Ofx7LUTBbzBuyprPn4w1pD9XWGM3kfEaUAS731dpAFi7PRE5jQt0tqJ5AG0SNKyZX2SwX5rCQxwbpNS6RxRxpZkauUdjmFv4uvvuPt2zIFmqcGIV0DdtSX6Pn4FRY90YOPZemnUeOfuc0ZW3PGK_p-ad6iaz543RQ", "payload": "" } 2025-01-26 15:07:29,835:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854328725 HTTP/1.1" 200 829 2025-01-26 15:07:29,835:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:07:31 GMT Content-Type: application/json Content-Length: 829 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5m-m03bOLcgwHEzkrP7ioty0J20h4OcxI__Hc622vydDMthIO7g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:51:01Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854328725/F1PGXg", "status": "pending", "token": "YkklgBeK2o9V4mrDoqb54xIn-8JMHXfG6sfufSWxePI" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854328725/HpD31A", "status": "pending", "token": "YkklgBeK2o9V4mrDoqb54xIn-8JMHXfG6sfufSWxePI" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854328725/VqO_UQ", "status": "pending", "token": "YkklgBeK2o9V4mrDoqb54xIn-8JMHXfG6sfufSWxePI" } ] } 2025-01-26 15:07:29,836:DEBUG:acme.client:Storing nonce: 5m-m03bOLcgwHEzkrP7ioty0J20h4OcxI__Hc622vydDMthIO7g 2025-01-26 15:07:29,836:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-26 15:07:29,836:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2025-01-26 15:07:29,837:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-26 15:07:29,838:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-26 15:07:29,838:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-26 15:07:29,839:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-26 15:07:29,839:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-26 15:07:29,839:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-26 15:07:29,841:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-26 15:07:29,886:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-26 15:07:30,080:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-26 15:07:30,082:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-26 15:07:30,082:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-26 15:07:30,087:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:05 UTC. 2025-01-26 15:07:30,087:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-26 15:07:30,087:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-26 15:07:30,095:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-26 15:07:30,095:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-26 15:07:30,095:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-26 15:07:30,101:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-26 15:07:30,102:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-26 15:07:30,103:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-26 15:07:30,544:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-26 15:07:30,545:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:07:32 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "V4CitNOtw8Q": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-26 15:07:30,545:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-26 15:07:39,062:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8928_key-certbot.pem 2025-01-26 15:07:47,012:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8926_csr-certbot.pem 2025-01-26 15:07:47,014:DEBUG:acme.client:Requesting fresh nonce 2025-01-26 15:07:47,014:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-26 15:07:47,161:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-26 15:07:47,162:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:07:49 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: KY2mD_AjuEpOd5sCA1uqOdID7MWQMg7EVfNNfAqPxfSkBRbgoCY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-26 15:07:47,162:DEBUG:acme.client:Storing nonce: KY2mD_AjuEpOd5sCA1uqOdID7MWQMg7EVfNNfAqPxfSkBRbgoCY 2025-01-26 15:07:47,163:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2025-01-26 15:07:47,170:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWp1RXBPZDVzQ0ExdXFPZElEN01XUU1nN0VWZk5OZkFxUHhmU2tCUmJnb0NZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "W34R7s6Yi9w-wMVuKe2pOJ78vNO52RCMZts9N34ISUek3u2Qmv_3a6eMAJsqdBq7veyGz3WiLoS9eXtnb9ys0jgI1s4G0t-7kAXnzFAiy3nVBScXh8t2gntrNlh7Dxgyuevwr0MpaMILTOHUvOO5nYWzFNcPok2T9miryvMtna3noeqYx3Ebu3tnJoU-ZuHZHDlM5aQKWItm4ns6zFHo9Bbs098RA7dwEQDU_rcFdTUYWQh87QxMHXfHx0k4kNvxZ3r6nU0May-ywI1rtV7pSvCQIW967zFjo889saj-EbPi1mFNu2QODI_0CydnyAPy6Xiu4exdjd3exUPnPfbEJw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2025-01-26 15:07:47,360:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356 2025-01-26 15:07:47,361:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 26 Jan 2025 14:07:49 GMT Content-Type: application/json Content-Length: 356 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140450885 Replay-Nonce: Z6auUXuu870UZUJ1D09ndOSmeO9Qlx5Xa7-t3CwUUg4-P4JaTdM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:51:16Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854428445" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140450885" } 2025-01-26 15:07:47,362:DEBUG:acme.client:Storing nonce: Z6auUXuu870UZUJ1D09ndOSmeO9Qlx5Xa7-t3CwUUg4-P4JaTdM 2025-01-26 15:07:47,362:DEBUG:acme.client:JWS payload: b'' 2025-01-26 15:07:47,371:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854428445: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXU4NzBVWlVKMUQwOW5kT1NtZU85UWx4NVhhNy10M0N3VVVnNC1QNEphVGRNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ0Mjg0NDUifQ", "signature": "RL3fqouLZPsDgUPRXkkdD7v4ZcimjU5X2Jw0sZmL70NE55x5s1qR44_rSFdAQfwVXyLBeeuT4aHgn68WbFnKp7hjtDaX5KDjYg9pbivf821ZYAGDaxLfJCJ6dG6_PfjQG_OItkhMrhP01kq0OUNJR1Br2q6dhGqtybamKmcuvhXj5TXozuFZlJ-mv5e2HehEiPC_L8Rl6jKLxnXlsdsSKSfYoLL-q9TqFs0Kr4ddPBpmtzjoZQDJBYockupiCKIvzu0BlSzzoDfrKxeeFt5cuWQQAIavXgBWoaexLgl4__Fxhpef0Koua8iDoPJfBIbW-Ia4XCyA-GHVdqvZU35qvA", "payload": "" } 2025-01-26 15:07:47,536:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854428445 HTTP/1.1" 200 828 2025-01-26 15:07:47,537:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:07:49 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Z6auUXuuiWjV5LxMNELKm74UiO8rbNSLk9SjOMvML-5tPL-3-BM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:51:16Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854428445/tA2UdQ", "status": "pending", "token": "kR-nkArfvAb4RqjGdmf_0sc2lDYeXub72wgxP10lapo" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854428445/HO9jNQ", "status": "pending", "token": "kR-nkArfvAb4RqjGdmf_0sc2lDYeXub72wgxP10lapo" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854428445/Ra9g4Q", "status": "pending", "token": "kR-nkArfvAb4RqjGdmf_0sc2lDYeXub72wgxP10lapo" } ] } 2025-01-26 15:07:47,537:DEBUG:acme.client:Storing nonce: Z6auUXuuiWjV5LxMNELKm74UiO8rbNSLk9SjOMvML-5tPL-3-BM 2025-01-26 15:07:47,538:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-26 15:07:47,539:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2025-01-26 15:07:47,540:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-26 15:07:47,541:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-26 15:07:47,542:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-26 15:07:47,542:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-26 15:07:47,542:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-26 15:07:47,543:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-26 15:07:47,544:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-26 15:07:47,606:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-26 15:07:47,780:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-26 15:07:47,782:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2025-01-26 15:07:47,783:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2025-01-26 15:07:47,788:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:33 UTC. 2025-01-26 15:07:47,789:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-26 15:07:47,789:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-26 15:07:47,795:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-26 15:07:47,796:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-26 15:07:47,796:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-26 15:07:47,802:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-26 15:07:47,803:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-26 15:07:47,805:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-26 15:07:48,240:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-26 15:07:48,240:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:07:50 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "6E1a6Y4dDZk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-26 15:07:48,241:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-26 15:07:56,921:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8929_key-certbot.pem 2025-01-26 15:08:05,038:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8927_csr-certbot.pem 2025-01-26 15:08:05,040:DEBUG:acme.client:Requesting fresh nonce 2025-01-26 15:08:05,040:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-26 15:08:05,187:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-26 15:08:05,188:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:08:07 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Z6auUXuuFz-5IYhVU__AEMq7lsULLU7z2HPPmKefdMkRh3uvRHg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-26 15:08:05,188:DEBUG:acme.client:Storing nonce: Z6auUXuuFz-5IYhVU__AEMq7lsULLU7z2HPPmKefdMkRh3uvRHg 2025-01-26 15:08:05,188:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2025-01-26 15:08:05,196:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVGei01SVloVlVfX0FFTXE3bHNVTExVN3oySFBQbUtlZmRNa1JoM3V2UkhnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "rFXv_F-lvPKce-JUSEn2vbQIAT77xEhzIDEhtAMHcPtw8Bs9wjPBpYuitroDyhu41OygEmtxjYPb6GBaoov2mSNXGiFspDGI2StX-Y_Ow1aclk15mqu2MPkq4DCD1E7jVxNpM8TmuXdtOLfiM0s12Y2oJdB5z-Dj-_D__reDF0Qs8uIaaS6va_9g7kDDyp9ttsIuGymqyVFG2QhMkh7d_BxkZNtG5_0g-7Z9XirQ6BRZVCJcuQDypHipnOofWdWiOXPUb2X8kyJgBd9K42lv90YUxW73Wz-rXgl58i7Cn2DQzDXFeFo0LzTd0mglCjKeC7VuRsHHCBFFQa1ANXYq_A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-01-26 15:08:05,387:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2025-01-26 15:08:05,388:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 26 Jan 2025 14:08:07 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140503565 Replay-Nonce: Z6auUXuukCojy2Cw3BrOGnLhNFPr-zgR7UeddNUr6wGKx4HXckk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:51:31Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854513645" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140503565" } 2025-01-26 15:08:05,388:DEBUG:acme.client:Storing nonce: Z6auUXuukCojy2Cw3BrOGnLhNFPr-zgR7UeddNUr6wGKx4HXckk 2025-01-26 15:08:05,389:DEBUG:acme.client:JWS payload: b'' 2025-01-26 15:08:05,395:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854513645: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVrQ29qeTJDdzNCck9HbkxoTkZQci16Z1I3VWVkZE5VcjZ3R0t4NEhYY2trIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ1MTM2NDUifQ", "signature": "nnleBlUBfFo1yCzHmVJkPYrk7jpldLrY0hh3lhG0rYdZRdSwaGCeK0qpIJhl0AwLMwIToTIQWMjsoNyN90d-Zo2YGkl2T7GLzJVikwjn6cVaoraMZ_5VMqoPx5WIko9Tjmy7ItLaIbr3OILw92VYISCAYs9WWFqaL3UWW0l1OI4ytKra1V4uH0w25pmxPke1RPoqrkSbVH6AMn0L1jwzt2JhPkM1OGUl2loFHvEokZipRmKF323csRw0KDt7bRNSpytNHbAHminWsgSZaJUUhuv_K0BzSXYRMIqFHNcGNYAXMdVKyBoxOFGKdJZEqmasEBT4b2ZH9iv_3GOeSWplpQ", "payload": "" } 2025-01-26 15:08:05,546:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854513645 HTTP/1.1" 200 827 2025-01-26 15:08:05,547:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:08:07 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Z6auUXuuOPxx0OrFSSevMBzZJNZmz7hr0XhK5sxQyeSvH8cb9t8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:51:31Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854513645/YCt_0g", "status": "pending", "token": "s0IZH-lt4CcoWX89FYesqwmuLxn1XQ-WV9fmxwfzdJ0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854513645/IJYfNQ", "status": "pending", "token": "s0IZH-lt4CcoWX89FYesqwmuLxn1XQ-WV9fmxwfzdJ0" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854513645/2DTePg", "status": "pending", "token": "s0IZH-lt4CcoWX89FYesqwmuLxn1XQ-WV9fmxwfzdJ0" } ] } 2025-01-26 15:08:05,547:DEBUG:acme.client:Storing nonce: Z6auUXuuOPxx0OrFSSevMBzZJNZmz7hr0XhK5sxQyeSvH8cb9t8 2025-01-26 15:08:05,548:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-26 15:08:05,548:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2025-01-26 15:08:05,549:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-26 15:08:05,550:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-26 15:08:05,551:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-26 15:08:05,551:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-26 15:08:05,551:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-26 15:08:05,552:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-26 15:08:05,553:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-26 15:08:05,606:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-26 15:08:05,793:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-26 15:08:05,795:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2025-01-26 15:08:05,796:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2025-01-26 15:08:05,801:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:54 UTC. 2025-01-26 15:08:05,801:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-26 15:08:05,801:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-26 15:08:05,808:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-26 15:08:05,808:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-26 15:08:05,808:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-26 15:08:05,814:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-26 15:08:05,815:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-26 15:08:05,818:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-26 15:08:06,298:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-26 15:08:06,299:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:08:08 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "SquH2m9RtBY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-26 15:08:06,299:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-26 15:08:14,327:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8930_key-certbot.pem 2025-01-26 15:08:22,178:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8928_csr-certbot.pem 2025-01-26 15:08:22,178:DEBUG:acme.client:Requesting fresh nonce 2025-01-26 15:08:22,179:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-26 15:08:22,340:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-26 15:08:22,341:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:08:24 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNfQ96fVxxCH8_3XLQxtNI4OFsi6kEJsvpQuB3uR9rNqQc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-26 15:08:22,341:DEBUG:acme.client:Storing nonce: qx2pCBNfQ96fVxxCH8_3XLQxtNI4OFsi6kEJsvpQuB3uR9rNqQc 2025-01-26 15:08:22,341:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2025-01-26 15:08:22,350:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZROTZmVnh4Q0g4XzNYTFF4dE5JNE9Gc2k2a0VKc3ZwUXVCM3VSOXJOcVFjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "gVFEVeFCspd7bKTNRM2ZIaxfHTBtbAj01R1JJxxtvw8JJCH_ZwCaWKQsOnfW966HCCkp2lUl4sQnqvCkgW-yNgJHY4tmwzMk4-hQX9hQqfVJElGXYe05BHLY7oHDCRm2VPE8TupTeZbpJWzZwUESB6bZOsGjgVB4P3r7Ei8_O4-HtUakG7Ax2yhFwOZdAEv681uK3S_sB5JXb97ckz7GpntjdmhfSJdpOEZGQ0Ec4x8YJhCTXqA7iPYDtKZkWPXv17NU-Z3O-0OyI4zUhGnTQw9-W_XOo6Es-YzYsBLwWa6FMaQK918xofO5SzSecRhlg6ZwYA3uQiNV37YWE0Zs2g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-26 15:08:22,540:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-26 15:08:22,540:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 26 Jan 2025 14:08:24 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140552425 Replay-Nonce: qx2pCBNfQnW2EE4J1ccTfavzmxqoEH4_i05q1eAOX8N5dSvbQqc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:51:46Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854589515" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140552425" } 2025-01-26 15:08:22,541:DEBUG:acme.client:Storing nonce: qx2pCBNfQnW2EE4J1ccTfavzmxqoEH4_i05q1eAOX8N5dSvbQqc 2025-01-26 15:08:22,541:DEBUG:acme.client:JWS payload: b'' 2025-01-26 15:08:22,548:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854589515: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZRblcyRUU0SjFjY1RmYXZ6bXhxb0VINF9pMDVxMWVBT1g4TjVkU3ZiUXFjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ1ODk1MTUifQ", "signature": "yELwH-PvFS7UlcCAfXWKIeb-oTvVJpP6tPKHOfMbvvA0swtcRpCSw3jYCU5UajIqi1kSoqQzsR_Ms2PMwek3YHcHoG_4KYoBvJzCcPLknA2Drn4JNeTbp1EBcJNjz6wSyLeUxDbvNww5nUwN4SYjGAqi7Ihwt5qNo5j2yfWitDlzp2M3df1lpF5joNEL9UWZCXm1d_x0l6RVMLPUOCfT5bj_HG3WePQpQrm9kST9n7cebnD16EGTYbOn1KRqySD8fnQrrZFo2OEwOiEzFE43uC2KPt68tHDC9bbuWzLu7VATC5003maYtj9NmDKDGXcMMQMW6Ihu2jooL-RnnC7_Ow", "payload": "" } 2025-01-26 15:08:22,717:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854589515 HTTP/1.1" 200 823 2025-01-26 15:08:22,718:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:08:24 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNfPWxUhTOu4J_BCuWwRFTYRKNtOK5d6BCo6F-2nu1DVpM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:51:46Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854589515/0ytQ9g", "status": "pending", "token": "vgzC_qBhQwpwOiNo_CvLkC_XDVMlXhOW2G1auAvN-v8" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854589515/MXV7zQ", "status": "pending", "token": "vgzC_qBhQwpwOiNo_CvLkC_XDVMlXhOW2G1auAvN-v8" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854589515/qQ_GAQ", "status": "pending", "token": "vgzC_qBhQwpwOiNo_CvLkC_XDVMlXhOW2G1auAvN-v8" } ] } 2025-01-26 15:08:22,718:DEBUG:acme.client:Storing nonce: qx2pCBNfPWxUhTOu4J_BCuWwRFTYRKNtOK5d6BCo6F-2nu1DVpM 2025-01-26 15:08:22,719:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-26 15:08:22,719:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2025-01-26 15:08:22,720:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-26 15:08:22,721:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-26 15:08:22,721:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-26 15:08:22,722:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-26 15:08:22,722:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-26 15:08:22,722:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-26 15:08:22,723:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-26 15:08:22,770:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-26 15:08:22,967:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-26 15:08:22,969:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-26 15:08:22,970:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-26 15:08:22,975:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:15 UTC. 2025-01-26 15:08:22,975:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-26 15:08:22,976:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-26 15:08:22,983:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-26 15:08:22,983:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-26 15:08:22,984:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-26 15:08:22,989:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-26 15:08:22,990:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-26 15:08:22,993:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-26 15:08:23,507:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-26 15:08:23,508:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:08:25 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "5tYh2W6iSNc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-26 15:08:23,509:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-26 15:08:31,269:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8931_key-certbot.pem 2025-01-26 15:08:39,166:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8929_csr-certbot.pem 2025-01-26 15:08:39,167:DEBUG:acme.client:Requesting fresh nonce 2025-01-26 15:08:39,167:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-26 15:08:39,340:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-26 15:08:39,341:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:08:41 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNfx6Z_FiCU5LAjMGJpR1GTc33vLtT9bMJFawrOoo8GKUE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-26 15:08:39,341:DEBUG:acme.client:Storing nonce: qx2pCBNfx6Z_FiCU5LAjMGJpR1GTc33vLtT9bMJFawrOoo8GKUE 2025-01-26 15:08:39,342:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2025-01-26 15:08:39,350:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZ4NlpfRmlDVTVMQWpNR0pwUjFHVGMzM3ZMdFQ5Yk1KRmF3ck9vbzhHS1VFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "EHthncHalmvA_YpQt3T6DA1Vyb41DQtF1KlGnleaBNuYcTTDZFN2RVxxAKLVqxZ7LV6tG6pXtuRmSHaHll0W9-Tw90CgZybrlvEzIK_eqECNAojJ0T_Po896Syoyj7Le3c6e1FZQucnqkiuO3nobMd2GiyDWkAgftlhi_sZxnETJWTSfyIa99oDxQkmNF0slZ5kFwxoTWv0VlxJo52PIIVdnFJZL0j8V_LuppbpJEi59hjCaaGOiF0Lj5sx0VZ2AQRnlUKdpRr9gqqsyFVMbbL4TDmpC3eOkryrUibN598MqQYaBiaVXmtn-c1qEN5eN2Z0iXkX71CnQUZi0sxSXiA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-26 15:08:39,551:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-26 15:08:39,552:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 26 Jan 2025 14:08:41 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140602055 Replay-Nonce: qx2pCBNf-2jZU_oiM2-T8_EHLz_tPtoAhW_7dY9SMlRNpEY9J24 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:52:00Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854665835" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140602055" } 2025-01-26 15:08:39,552:DEBUG:acme.client:Storing nonce: qx2pCBNf-2jZU_oiM2-T8_EHLz_tPtoAhW_7dY9SMlRNpEY9J24 2025-01-26 15:08:39,553:DEBUG:acme.client:JWS payload: b'' 2025-01-26 15:08:39,560:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854665835: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmYtMmpaVV9vaU0yLVQ4X0VITHpfdFB0b0FoV183ZFk5U01sUk5wRVk5SjI0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ2NjU4MzUifQ", "signature": "s1vFfh2Zy5nRs6HWL5JUMsr0b3szEx_CXY57Hc6JsIyCQsiCTMiZ-1dq_x-TQFPu_Ly_D_oMlyj4H0uVycnC7uLEAicVZ50crnm0VrhxZgoyCUogoTF1p2WCap7joDfMH-VnwwXmCrAZ0fjUCqjp7qcdED2W3o7smie6AQCj_gAQ1olCW0AHLNMMDsfSwlczMJfUweEs2dZCiK83IOoxZEQ255fnOFJSxzM_iAwIglSLkVkt9JZ7m7aPVDunwEyRvblOf5C78yCz2MavIqEksNCtPG-JamvbuB8hmovu0oMiiszDQ8hJNjSb_RKKt9fB40VXe_3Y-o1IA40uAhXVPg", "payload": "" } 2025-01-26 15:08:39,737:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854665835 HTTP/1.1" 200 823 2025-01-26 15:08:39,738:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:08:41 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNfxEBJF3vTwhjMgvtUEN9hvkO-xR1v64Fh1XEOZ9kLw_0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:52:00Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854665835/VSa2Qg", "status": "pending", "token": "IQq7H-CrjRngbvlfBYyq4TC9BGO3mQb9XFlUCm-xOp8" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854665835/A7xmXA", "status": "pending", "token": "IQq7H-CrjRngbvlfBYyq4TC9BGO3mQb9XFlUCm-xOp8" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854665835/hkfxMA", "status": "pending", "token": "IQq7H-CrjRngbvlfBYyq4TC9BGO3mQb9XFlUCm-xOp8" } ] } 2025-01-26 15:08:39,739:DEBUG:acme.client:Storing nonce: qx2pCBNfxEBJF3vTwhjMgvtUEN9hvkO-xR1v64Fh1XEOZ9kLw_0 2025-01-26 15:08:39,739:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-26 15:08:39,740:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2025-01-26 15:08:39,741:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-26 15:08:39,741:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-26 15:08:39,742:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-26 15:08:39,743:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-26 15:08:39,743:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-26 15:08:39,743:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-26 15:08:39,745:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-26 15:08:39,810:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-26 15:08:39,998:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-26 15:08:39,999:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2025-01-26 15:08:40,000:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2025-01-26 15:08:40,005:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:38 UTC. 2025-01-26 15:08:40,005:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-26 15:08:40,006:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-26 15:08:40,011:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-26 15:08:40,012:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-26 15:08:40,012:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-26 15:08:40,018:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-26 15:08:40,019:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-26 15:08:40,021:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-26 15:08:40,461:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-26 15:08:40,462:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:08:42 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "PN9iy4bW0dg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-26 15:08:40,462:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-26 15:08:48,599:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8932_key-certbot.pem 2025-01-26 15:08:56,557:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8930_csr-certbot.pem 2025-01-26 15:08:56,558:DEBUG:acme.client:Requesting fresh nonce 2025-01-26 15:08:56,558:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-26 15:08:56,704:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-26 15:08:56,705:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:08:58 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: KY2mD_AjDcrqYUN9aMUBJX2z1rYsIOlATYgQcWs_FXbXFlwKjWQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-26 15:08:56,705:DEBUG:acme.client:Storing nonce: KY2mD_AjDcrqYUN9aMUBJX2z1rYsIOlATYgQcWs_FXbXFlwKjWQ 2025-01-26 15:08:56,705:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2025-01-26 15:08:56,713:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWpEY3JxWVVOOWFNVUJKWDJ6MXJZc0lPbEFUWWdRY1dzX0ZYYlhGbHdLaldRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "kwjJPKEWwhe6S5TObtIPeXRyCewxMk7JrNm3xLeqqr8JR8nOR4KTLBE3iYw9p9MGm0OVHh0gOvRe3dW1GYaylLGzsFZmKy_9mrIvxaI3eGnc7-eAOWOuMhxP4rJrw1WwbxP6CeX6tKsFliYMXwG4bOecaSrMTR-P9LPlzBOeffNFfs1TtIyop9tzt6dLTJXetJIWazG12LVMhjX2aErgsL6MrhZjvEl4UPfKOPPyBL1oBmCBre_e9D-IrJYcYVIU7rGCEn3sOr-S_1vaPWaBfBlGX9RNia4bDzcJXZQn-DiYIBhpL7vO2ogsxa1XBgX_1kb2gS9DpWzxOVPjUe_l_A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-26 15:08:56,884:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-26 15:08:56,885:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 26 Jan 2025 14:08:58 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140669395 Replay-Nonce: Z6auUXuuGu6aDHo9iElquw0uz5wwR-xS-AHB8cw1rLgiGTRv-W8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:52:15Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854767445" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140669395" } 2025-01-26 15:08:56,885:DEBUG:acme.client:Storing nonce: Z6auUXuuGu6aDHo9iElquw0uz5wwR-xS-AHB8cw1rLgiGTRv-W8 2025-01-26 15:08:56,886:DEBUG:acme.client:JWS payload: b'' 2025-01-26 15:08:56,894:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854767445: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVHdTZhREhvOWlFbHF1dzB1ejV3d1IteFMtQUhCOGN3MXJMZ2lHVFJ2LVc4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ3Njc0NDUifQ", "signature": "ZBvBp3nWW4FORG3odul78HoEF_riZCAYr5jgk3-Vm9dH1x_QLmRrtqYIWqcXdJUIyrabKFU4ksOq7JfLmRnqRzwJkKzsNWwVxHMZTpBQ0B-WlZEYJE6IrOHkP3DwxGypnwVesSkHAknbea657TP83kdlg7AulQxyghuKiCw6ojhPWTuxumrbVcHMO-6Sdy4TDHGP6wWuygFmwYjD5rWMZsSNJSbjzLhVFZa2Xj0AGIIxIsH3O6jNaGPqK4m-A5WV1eWG7qR9SO-S9mX9LFJiQOA4o9sIVac65JKIHWibZENB_xh4PIiQL2YxSfwHEpGzf6RsY3Ul5OkgrG-us8otHw", "payload": "" } 2025-01-26 15:08:57,058:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854767445 HTTP/1.1" 200 823 2025-01-26 15:08:57,058:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Jan 2025 14:08:58 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Z6auUXuuQcBgOm11lLFOHiS9wE-H1X1RsZ2MPBgOeIDBjyARDkQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:52:15Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854767445/9iBbmQ", "status": "pending", "token": "Z2FjGy5YI24p9E9ApXNQZTvas2Cq6xGIBczpA5STm0k" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854767445/I_YfaQ", "status": "pending", "token": "Z2FjGy5YI24p9E9ApXNQZTvas2Cq6xGIBczpA5STm0k" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854767445/KFIdlQ", "status": "pending", "token": "Z2FjGy5YI24p9E9ApXNQZTvas2Cq6xGIBczpA5STm0k" } ] } 2025-01-26 15:08:57,059:DEBUG:acme.client:Storing nonce: Z6auUXuuQcBgOm11lLFOHiS9wE-H1X1RsZ2MPBgOeIDBjyARDkQ 2025-01-26 15:08:57,059:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-26 15:08:57,060:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2025-01-26 15:08:57,061:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-26 15:08:57,061:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-26 15:08:57,062:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-26 15:08:57,062:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-26 15:08:57,062:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-26 15:08:57,063:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-26 15:08:57,064:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-26 15:08:57,064:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2025-01-26 15:08:57,065:ERROR:certbot._internal.renewal: C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2025-01-26 15:08:57,066:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 11 renew failure(s), 0 parse failure(s) 2025-01-26 15:08:57,081:ERROR:certbot._internal.log:11 renew failure(s), 0 parse failure(s)