2025-01-25 17:41:24,127:DEBUG:certbot._internal.main:certbot version: 1.6.0 2025-01-25 17:41:24,128:DEBUG:certbot._internal.main:Arguments: [] 2025-01-25 17:41:24,128:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2025-01-25 17:41:24,996:DEBUG:certbot._internal.log:Root logging level set at 20 2025-01-25 17:41:24,996:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2025-01-25 17:41:25,043:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2025-01-25 17:41:25,089:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-25 17:41:25,306:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 17:41:25,308:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2025-01-25 17:41:25,313:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2025-01-25 17:41:25,322:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-25 17:41:25,327:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 17:41:25,392:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-25 17:41:25,578:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 17:41:25,580:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is signed by the certificate's issuer. 2025-01-25 17:41:25,580:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD 2025-01-25 17:41:25,585:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-25 17:41:25,592:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 17:41:25,641:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-25 17:41:25,824:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 17:41:25,826:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2025-01-25 17:41:25,827:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2025-01-25 17:41:25,832:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-25 17:41:25,836:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 17:41:25,876:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-25 17:41:26,084:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 17:41:26,086:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is signed by the certificate's issuer. 2025-01-25 17:41:26,087:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is: OCSPCertStatus.GOOD 2025-01-25 17:41:26,091:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-25 17:41:26,094:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 17:41:26,165:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-25 17:41:26,370:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 17:41:26,371:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert22.pem is signed by the certificate's issuer. 2025-01-25 17:41:26,372:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD 2025-01-25 17:41:26,377:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-25 17:41:26,383:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 17:41:26,440:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-25 17:41:26,614:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 17:41:26,617:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-25 17:41:26,618:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-25 17:41:26,623:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:13:49 UTC. 2025-01-25 17:41:26,623:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-25 17:41:26,623:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 17:41:26,627:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-25 17:41:26,628:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-25 17:41:26,628:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-25 17:41:26,634:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-25 17:41:26,636:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-25 17:41:26,638:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-25 17:41:27,147:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-25 17:41:27,148:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:41:28 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "5G4AofZlDdE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-25 17:41:27,148:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-25 17:41:38,890:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8903_key-certbot.pem 2025-01-25 17:41:49,078:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8901_csr-certbot.pem 2025-01-25 17:41:49,079:DEBUG:acme.client:Requesting fresh nonce 2025-01-25 17:41:49,079:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-25 17:41:49,246:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-25 17:41:49,247:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:41:50 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5m-m03bO3HnoXdIWso8fSiUYmCrW4iWvsdSXvT0bf4wc2MKzXWQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-25 17:41:49,247:DEBUG:acme.client:Storing nonce: 5m-m03bO3HnoXdIWso8fSiUYmCrW4iWvsdSXvT0bf4wc2MKzXWQ 2025-01-25 17:41:49,247:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2025-01-25 17:41:49,257:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk8zSG5vWGRJV3NvOGZTaVVZbUNyVzRpV3ZzZFNYdlQwYmY0d2MyTUt6WFdRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "eUfGOSN8psLCrDft_IdjUAcwNaKf7QJJbDtejri_NPjklgXA1qmIGFz55jGKfDedAXl-NXg7b1rHcOOE2CEQ2bIKrimUyfd_BgKR6YpYpHN9NwDlrJ4B0NLHe9WPk3eEoWWL5z1_2GVsW5roGUBad_-qziO2NY_z8A28eHgSpfmBZGixPY4pVzLDwC_wZbgYZLlJa_cpR_8wCTLzxLlNX1k_uHOS9osLKeNQreAtUNq8yVUtnpbNQOr3RISrwuR0cIfd2DqlLS0-gfG1Hw4gO9ko_K0_aCA38eF11SG8L1_2FiifnFpZfNmxS2aWQvs8gdF3NNRgkuqJ6P_Ph1JBNw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-25 17:41:49,520:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-25 17:41:49,521:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Jan 2025 16:41:51 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140171795 Replay-Nonce: 5m-m03bOCEtDikwfuOGC3Jo1yMl0I4O_Hr_XfN9YA-2HuI0xMMo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:50:04Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464853999535" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140171795" } 2025-01-25 17:41:49,522:DEBUG:acme.client:Storing nonce: 5m-m03bOCEtDikwfuOGC3Jo1yMl0I4O_Hr_XfN9YA-2HuI0xMMo 2025-01-25 17:41:49,522:DEBUG:acme.client:JWS payload: b'' 2025-01-25 17:41:49,530:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464853999535: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk9DRXREaWt3ZnVPR0MzSm8xeU1sMEk0T19Icl9YZk45WUEtMkh1STB4TU1vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTM5OTk1MzUifQ", "signature": "CyGnvDL4w1C5AjdDEH3rGq0WDMnVdXpAjJCVXDUnATyP3m7MzjThkCRLfdtmxIgkVFZjxVbnE43kIRl4S4dibAIN669H34LDPbF7l2TrbhrzPqj3nfwfe8NhC7DNOlpoZLK1mXt_ninzOsLLgJgjO-zR-i3Ur9qXWmUEq2MlRHCU_rk4gC8inzQCS8TmFQJw_VesyOHgI2ISXBqacKMfixtOA5ZlhADy2tXP9XSfQJhVJxBIQmG3s-I1tW4GZX2fEgTpyaGvcn-QibToTOSG0umcNB2DYtwrSsuxssqdcA8p4d-kLRW2vSqueiuZSblQILPPAW0m5Q7MSXtDgnRHcg", "payload": "" } 2025-01-25 17:41:49,704:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464853999535 HTTP/1.1" 200 823 2025-01-25 17:41:49,705:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:41:51 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5m-m03bOBobhk1n3gxRpb5AItWC_ASUQ9b-9IjauQxUsrxKF1iE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:50:04Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464853999535/PVUjPA", "status": "pending", "token": "LhsM0YxGT1dL4stq2Tmlq4O2ZKuaujacf5ySryXsyhQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464853999535/_gvNVQ", "status": "pending", "token": "LhsM0YxGT1dL4stq2Tmlq4O2ZKuaujacf5ySryXsyhQ" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464853999535/Gzz9fw", "status": "pending", "token": "LhsM0YxGT1dL4stq2Tmlq4O2ZKuaujacf5ySryXsyhQ" } ] } 2025-01-25 17:41:49,705:DEBUG:acme.client:Storing nonce: 5m-m03bOBobhk1n3gxRpb5AItWC_ASUQ9b-9IjauQxUsrxKF1iE 2025-01-25 17:41:49,706:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-25 17:41:49,706:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2025-01-25 17:41:49,707:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-25 17:41:49,708:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-25 17:41:49,719:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 17:41:49,719:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-25 17:41:49,720:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-25 17:41:49,720:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-25 17:41:49,733:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 17:41:49,782:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-25 17:41:49,975:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 17:41:49,976:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2025-01-25 17:41:49,977:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2025-01-25 17:41:49,981:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:20 UTC. 2025-01-25 17:41:49,981:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-25 17:41:49,982:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 17:41:49,988:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-25 17:41:49,988:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-25 17:41:49,988:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-25 17:41:49,994:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-25 17:41:49,995:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-25 17:41:49,997:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-25 17:41:50,523:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-25 17:41:50,525:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:41:52 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "o2LEfefhjvE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-25 17:41:50,525:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-25 17:41:59,901:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8904_key-certbot.pem 2025-01-25 17:42:08,455:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8902_csr-certbot.pem 2025-01-25 17:42:08,456:DEBUG:acme.client:Requesting fresh nonce 2025-01-25 17:42:08,456:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-25 17:42:08,629:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-25 17:42:08,630:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:42:10 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNfwEQHPXVtbu-YE8pU_mdpLGRjly6WSY-0yxCjE1bTy7M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-25 17:42:08,630:DEBUG:acme.client:Storing nonce: qx2pCBNfwEQHPXVtbu-YE8pU_mdpLGRjly6WSY-0yxCjE1bTy7M 2025-01-25 17:42:08,631:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2025-01-25 17:42:08,638:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZ3RVFIUFhWdGJ1LVlFOHBVX21kcExHUmpseTZXU1ktMHl4Q2pFMWJUeTdNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "XmhjE1AMA_J21beXsRYPFSVMhFMBgCeoTs6usVRV-jrzrn1BjIajCUArzuVCmG-CBtgbZJ0DrNYAIjCMiyHA1rPhLuknzV5z__0t_B0mEL-3gzi2YgkSq3VmxWmeOornfAZrxiqUEsg3xc7tziVAu46lkICeyVj_65WJlX0qLrwqpKDkVXSIiU3q9OrRpmWL4aZhnncQoO9R7fTo1zXiw02F7zOxgTdRm9KEgdz1Wj-OGoXyLRCd0BYLMsvEegCTOR4Fk4PlyCIK8hje2rl2PyINfKIzyKWWbEfnN3z74rSe3ItbjFGWNskjrvioZ2IG8-THaXt2SkQJhtF_JNl37g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-01-25 17:42:08,836:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2025-01-25 17:42:08,837:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Jan 2025 16:42:10 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140234075 Replay-Nonce: 5m-m03bOkvD4dgQrSkWwm362F7CwrLIgsNfDZJZWmNNsWxkrYd0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:50:18Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854097235" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140234075" } 2025-01-25 17:42:08,837:DEBUG:acme.client:Storing nonce: 5m-m03bOkvD4dgQrSkWwm362F7CwrLIgsNfDZJZWmNNsWxkrYd0 2025-01-25 17:42:08,837:DEBUG:acme.client:JWS payload: b'' 2025-01-25 17:42:08,843:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854097235: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk9rdkQ0ZGdRclNrV3dtMzYyRjdDd3JMSWdzTmZEWkpaV21OTnNXeGtyWWQwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQwOTcyMzUifQ", "signature": "tl3qIHi8kMHULO-Uqz4YkPI1djImSbblvKjqqILXNvUMNdJu9Whx9ppm8_44X47-Yp-RqklsQ7PNMNYFPO_9UP7UvGfCHxn-kgSv8oOK0MxEmP3tQmwRsys7amk7Mt86avT9gguWoyloyq6YvSYq1CWYChPw_vPbGB6YDt5Alk3zWedS2f3MD3zYGRfeg5wPDu3K1fUAfhL2RCRP1o7kQiWPtC93tivsKV8aC40afA8Z8Qt5UhMsHvCIzFoXMhPUa5I0IXpW4jpy_faVJI0-RqJJWQT7U1eqTyzixJQQkCSSsBB2mqETOc1MvO8153Q6pXvJ7zlNJpNaar2_rRWqGQ", "payload": "" } 2025-01-25 17:42:09,031:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854097235 HTTP/1.1" 200 827 2025-01-25 17:42:09,032:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:42:10 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNfQfVdmMW1cKDdcUcTl1yBvHXO41HzwIbJxXSTOfmbjuA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:50:18Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854097235/UjHR1g", "status": "pending", "token": "KjkQOpKsGE0kd7AjKRO2O9xwhV7ModKF2YJR0KYB0eQ" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854097235/V5AJ-w", "status": "pending", "token": "KjkQOpKsGE0kd7AjKRO2O9xwhV7ModKF2YJR0KYB0eQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854097235/UT_D8g", "status": "pending", "token": "KjkQOpKsGE0kd7AjKRO2O9xwhV7ModKF2YJR0KYB0eQ" } ] } 2025-01-25 17:42:09,032:DEBUG:acme.client:Storing nonce: qx2pCBNfQfVdmMW1cKDdcUcTl1yBvHXO41HzwIbJxXSTOfmbjuA 2025-01-25 17:42:09,032:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-25 17:42:09,033:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2025-01-25 17:42:09,034:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-25 17:42:09,034:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-25 17:42:09,034:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 17:42:09,035:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-25 17:42:09,035:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-25 17:42:09,035:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-25 17:42:09,037:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 17:42:09,080:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-25 17:42:09,270:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 17:42:09,271:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is signed by the certificate's issuer. 2025-01-25 17:42:09,273:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is: OCSPCertStatus.GOOD 2025-01-25 17:42:09,280:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:51 UTC. 2025-01-25 17:42:09,281:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-25 17:42:09,281:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 17:42:09,288:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-25 17:42:09,288:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-25 17:42:09,288:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-25 17:42:09,295:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-25 17:42:09,297:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-25 17:42:09,300:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-25 17:42:09,754:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-25 17:42:09,755:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:42:11 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "WG16uaIpesg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-25 17:42:09,755:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-25 17:42:18,139:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8905_key-certbot.pem 2025-01-25 17:42:26,095:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8903_csr-certbot.pem 2025-01-25 17:42:26,095:DEBUG:acme.client:Requesting fresh nonce 2025-01-25 17:42:26,096:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-25 17:42:26,248:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-25 17:42:26,249:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:42:27 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: KY2mD_Ajm7J1INHdPhjfUlXIoM1Uafmv30AaxhvdmfGhHLzILOo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-25 17:42:26,249:DEBUG:acme.client:Storing nonce: KY2mD_Ajm7J1INHdPhjfUlXIoM1Uafmv30AaxhvdmfGhHLzILOo 2025-01-25 17:42:26,249:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2025-01-25 17:42:26,258:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWptN0oxSU5IZFBoamZVbFhJb00xVWFmbXYzMEFheGh2ZG1mR2hITHpJTE9vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "x2OfSpgERToeLAvc4jeGIo6H-u0j57d0bFiggzqZUC6yI-7SssVMlGa3PonrpaDp1LTvqUd5gkL6jlQOPQ7JbHkBQD90qg1muSjuB1TWN2zcYuMV2yJJBJ4fnGHkLHkV2CVOfBafJtzpjqjy3RFzUjcOJw7BEk_vEyST9555axOcZB5T9kdb-xb7GeR_zsrZds1edzposI-wguZ3N_qjQLg6KC-tUSRSb5wz_nIyCNgh2a1DV2BRPCsA4iyvbhCddSdkhoSZBUFSqFnEqsfdyZrjYK-44AsBgbVXUStwXLTNxTSqlxE4dfqKt-gCuhKUzLMOmPLnAMa5kxOFLupHcg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2025-01-25 17:42:26,470:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 353 2025-01-25 17:42:26,471:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Jan 2025 16:42:28 GMT Content-Type: application/json Content-Length: 353 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140287525 Replay-Nonce: KY2mD_AjzLe8mFNXS2hHLh6eXrjs70be1YCH6B6ZVTMUWANgXl0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:50:33Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854177205" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140287525" } 2025-01-25 17:42:26,471:DEBUG:acme.client:Storing nonce: KY2mD_AjzLe8mFNXS2hHLh6eXrjs70be1YCH6B6ZVTMUWANgXl0 2025-01-25 17:42:26,472:DEBUG:acme.client:JWS payload: b'' 2025-01-25 17:42:26,478:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854177205: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWp6TGU4bUZOWFMyaEhMaDZlWHJqczcwYmUxWUNINkI2WlZUTVVXQU5nWGwwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQxNzcyMDUifQ", "signature": "dZWdb3qR5zauvJltrW8MX9O2_-LlrpMfYIPTt53eNgiGqExSPc11JClYTIB7ySKjrqp11K5GpZvh58A9WkNwmo34LVDjH4iwmPFsb4o6bc3t6hXv4gYNMq5-AL70I9Fksm_bld_5HpdPAI2fDO2sac2C3gfePjJcm8iTatagrzuo6-GV_D5DOb2gf6U-PV9vM6aFvik0ODk6qNwW3IGeKg7HGWlz3FnbXSEodgMs5oI0bJHo2dqzSCdLlmnWySzRsUM9iI1z5ocl8gK8giS-T7SB-XdYGUR95soZd2isoxbFUth-7mGZx4OipHzqpIslawmpMaFMokInI0jDZj3Rbw", "payload": "" } 2025-01-25 17:42:26,665:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854177205 HTTP/1.1" 200 825 2025-01-25 17:42:26,666:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:42:28 GMT Content-Type: application/json Content-Length: 825 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: KY2mD_AjFYgVD1Y-RsC97zYTyJIjNWZk87BOnGUr23Glkcyz4-M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:50:33Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854177205/kg1xTg", "status": "pending", "token": "H8dHt8qoQ8VNCmFdaH8TCH_B1Jp6zw16C-lKKxCESW0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854177205/rxXYJw", "status": "pending", "token": "H8dHt8qoQ8VNCmFdaH8TCH_B1Jp6zw16C-lKKxCESW0" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854177205/kFR0rA", "status": "pending", "token": "H8dHt8qoQ8VNCmFdaH8TCH_B1Jp6zw16C-lKKxCESW0" } ] } 2025-01-25 17:42:26,666:DEBUG:acme.client:Storing nonce: KY2mD_AjFYgVD1Y-RsC97zYTyJIjNWZk87BOnGUr23Glkcyz4-M 2025-01-25 17:42:26,667:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-25 17:42:26,667:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2025-01-25 17:42:26,668:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-25 17:42:26,668:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-25 17:42:26,669:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 17:42:26,669:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-25 17:42:26,669:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-25 17:42:26,670:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-25 17:42:26,671:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 17:42:26,728:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-25 17:42:26,937:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 17:42:26,939:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-25 17:42:26,940:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-25 17:42:26,945:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:13 UTC. 2025-01-25 17:42:26,946:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-25 17:42:26,946:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 17:42:26,953:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-25 17:42:26,953:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-25 17:42:26,954:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-25 17:42:26,959:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-25 17:42:26,960:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-25 17:42:26,962:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-25 17:42:27,460:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-25 17:42:27,461:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:42:29 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "2dLB1h66sMo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-25 17:42:27,461:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-25 17:42:35,868:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8906_key-certbot.pem 2025-01-25 17:42:43,815:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8904_csr-certbot.pem 2025-01-25 17:42:43,816:DEBUG:acme.client:Requesting fresh nonce 2025-01-25 17:42:43,816:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-25 17:42:43,984:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-25 17:42:43,984:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:42:45 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5m-m03bOPr8sFH8ImnBr8F7GWZtUc7maGrO0p44z_9di2QTgXBs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-25 17:42:43,985:DEBUG:acme.client:Storing nonce: 5m-m03bOPr8sFH8ImnBr8F7GWZtUc7maGrO0p44z_9di2QTgXBs 2025-01-25 17:42:43,985:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2025-01-25 17:42:43,991:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk9QcjhzRkg4SW1uQnI4RjdHV1p0VWM3bWFHck8wcDQ0el85ZGkyUVRnWEJzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "fBnnlWYb-ABHfj9jUvHv_JZjOF_T3KUnFtQu6UNpfgcfNV-rT6XRVWG13nK9ogUTG2Pne1Xll_tur0viZBjTe6Vz-gEgXqSa4VmSRNW-tna73_1g6U05Svw68gHdMdBQgswzuvynhXGL9Uwpv1rvPednemn6dBxRRNQXWBflZK9B5vTGvSvzS5dsgJeaux-yjB-LmfV7BUs2_eFqncqrMNYmL2DdksPaOFmpqwz3oOyre23CzFQ3qLsE6x5kuPIyJ-a9vV2U1QhBb7sxaAlc6IkVDrh0hZoNc8d6isR1TcxgvDfPn8Pmw1wJnevQCe1hY-612mOIy6dUrjGFI9kfQQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-01-25 17:42:44,176:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 352 2025-01-25 17:42:44,176:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Jan 2025 16:42:45 GMT Content-Type: application/json Content-Length: 352 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140337675 Replay-Nonce: qx2pCBNfLUd0oQTS2lm77sBsRNxSiNlXtkl_b3xXU5HxgJTFrBc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:50:47Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854251985" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140337675" } 2025-01-25 17:42:44,177:DEBUG:acme.client:Storing nonce: qx2pCBNfLUd0oQTS2lm77sBsRNxSiNlXtkl_b3xXU5HxgJTFrBc 2025-01-25 17:42:44,177:DEBUG:acme.client:JWS payload: b'' 2025-01-25 17:42:44,186:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854251985: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZMVWQwb1FUUzJsbTc3c0JzUk54U2lObFh0a2xfYjN4WFU1SHhnSlRGckJjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQyNTE5ODUifQ", "signature": "pWHmdb28sH7Jq4ql3LP9tiAHRsU0a2CLuQODmT6k_Hf5tBXpxD7DK0aIaQc8coyn4dVbbgoBzG6QapOdXhNZPCbldGXOKgoalqg0o7buCIzka-QoyFUCmz2vninTTaSV_hBaBPoy5y6b8uKKXAzE8XCTQXSUqRZVkxf57FhmIABns6OWNJjDMEbGuKbY8Cacs-cJCyKQ3bEoqgtaMOd_gRI_wpwpmRImU3-yexjJux6gT0Cs0PRCQsiAkDK_C1ul8gJZ9y7QzFpgT0EABLTBylbDyefeyp4f1HIuJjof7EgN2oMBoWGhwl_DGneo3ibf3D_711UhBIssORkOCceR7w", "payload": "" } 2025-01-25 17:42:44,359:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854251985 HTTP/1.1" 200 824 2025-01-25 17:42:44,360:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:42:46 GMT Content-Type: application/json Content-Length: 824 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5m-m03bOcJSCo6_FbVd-DHedKhpkWaoSzN2Fmtdy0odH3buaFr8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:50:47Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854251985/0MCU7A", "status": "pending", "token": "6G2w1CurrpHij2hITHkq2tRG08iPbRRnVO6r0-K3hiU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854251985/BXlLPQ", "status": "pending", "token": "6G2w1CurrpHij2hITHkq2tRG08iPbRRnVO6r0-K3hiU" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854251985/5c2Euw", "status": "pending", "token": "6G2w1CurrpHij2hITHkq2tRG08iPbRRnVO6r0-K3hiU" } ] } 2025-01-25 17:42:44,360:DEBUG:acme.client:Storing nonce: 5m-m03bOcJSCo6_FbVd-DHedKhpkWaoSzN2Fmtdy0odH3buaFr8 2025-01-25 17:42:44,361:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-25 17:42:44,361:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2025-01-25 17:42:44,363:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-25 17:42:44,363:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-25 17:42:44,364:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 17:42:44,364:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-25 17:42:44,364:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-25 17:42:44,365:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-25 17:42:44,367:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 17:42:44,424:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2025-01-25 17:42:44,424:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-25 17:42:44,424:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2025-01-25 17:42:44,434:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2025-01-25 17:42:44,441:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2025-01-25 17:42:44,441:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2025-01-25 17:42:44,441:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2025-01-25 17:42:44,442:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2025-01-25 17:42:44,446:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2025-01-25 17:42:44,492:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-25 17:42:44,730:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 17:42:44,732:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-25 17:42:44,733:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-25 17:42:44,738:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:35 UTC. 2025-01-25 17:42:44,738:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-25 17:42:44,739:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 17:42:44,744:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-25 17:42:44,745:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-25 17:42:44,745:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-25 17:42:44,753:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-25 17:42:44,754:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-25 17:42:44,758:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-25 17:42:45,240:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-25 17:42:45,241:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:42:46 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "1Fmp0tFTzig": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-25 17:42:45,241:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-25 17:42:53,412:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8907_key-certbot.pem 2025-01-25 17:43:01,636:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8905_csr-certbot.pem 2025-01-25 17:43:01,636:DEBUG:acme.client:Requesting fresh nonce 2025-01-25 17:43:01,636:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-25 17:43:01,799:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-25 17:43:01,800:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:43:03 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Z6auUXuunB1McktbT-buPUCQPElP6ZZWshLYkmA-pR6wOrA-uTo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-25 17:43:01,800:DEBUG:acme.client:Storing nonce: Z6auUXuunB1McktbT-buPUCQPElP6ZZWshLYkmA-pR6wOrA-uTo 2025-01-25 17:43:01,800:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2025-01-25 17:43:01,807:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVuQjFNY2t0YlQtYnVQVUNRUEVsUDZaWldzaExZa21BLXBSNndPckEtdVRvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "dfJuRue5c37C9nxbCy9q01QyLAD5AtgBAvPSXarACGd5e7t9Zy6opcN0HSVtIBT3OS4KhtQy2CyU4JhaFbSzpd9xsns7nlyxfbsD77I_Hsv9vIORNtZGh1Wpaagw4WbYv3km0lFCf7b7hIZO2bSQemTXEGUIDu4VnyAtIRyWOq1NXh8TeocXFjXcFluGF465iUZokvFI8jhvyQBoI0ch_ZUfpzKV802dDtAmLEaKINGwn_2a94kbN299i0JcjWm81xz7DXgGkY30w8R2By65Rl5_x9YgHYcdXjKdOi8WHNKr82ktqvIXNint8RE8D2scRqoinqvErukVCxMgykQIGQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-25 17:43:02,022:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 357 2025-01-25 17:43:02,023:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Jan 2025 16:43:03 GMT Content-Type: application/json Content-Length: 357 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140387985 Replay-Nonce: Z6auUXuuXVQJWhrTaZXJ_6yXnfHXj_jyzIh3gUoJ0HPnJpxoaLk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:51:01Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854328725" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140387985" } 2025-01-25 17:43:02,023:DEBUG:acme.client:Storing nonce: Z6auUXuuXVQJWhrTaZXJ_6yXnfHXj_jyzIh3gUoJ0HPnJpxoaLk 2025-01-25 17:43:02,024:DEBUG:acme.client:JWS payload: b'' 2025-01-25 17:43:02,032:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854328725: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVYVlFKV2hyVGFaWEpfNnlYbmZIWGpfanl6SWgzZ1VvSjBIUG5KcHhvYUxrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQzMjg3MjUifQ", "signature": "TL4I57Of45D-jf_vAql78i8QbJtOTVuodLyzCvalE27uJYLtysO-brYbctl9Yhj6RJ4kwcHaASbrdV6b4XCbDB0HH9ka9Lj-lnaSEFW2AGlzB-ivBBrHQg0J24395pXZCMfXaCp7cv4YDDfd5YW__8IMMxiv8Hz7cMtx5e0Qs2fgRgQS0R0f8Q53m25-gPZ2SaHW8nQzicJ8_xmjfHt5d5gE1eUdM0RzbOwBGae_7w_i7T6dsNZ97fbzzVHcC2PqITkozej_oyqDWOKunzfhW3oeKDlhXxynXueuAHeAKtxNMe2xQGj5xUQnuSR-YKPpZL40cf61RHK-RUNY5M8RqQ", "payload": "" } 2025-01-25 17:43:02,206:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854328725 HTTP/1.1" 200 829 2025-01-25 17:43:02,207:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:43:03 GMT Content-Type: application/json Content-Length: 829 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: KY2mD_AjgcBAiJx2ORVNlnE5AZ90MEU4_hZvNBrN61BsaF5aJAA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:51:01Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854328725/HpD31A", "status": "pending", "token": "YkklgBeK2o9V4mrDoqb54xIn-8JMHXfG6sfufSWxePI" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854328725/VqO_UQ", "status": "pending", "token": "YkklgBeK2o9V4mrDoqb54xIn-8JMHXfG6sfufSWxePI" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854328725/F1PGXg", "status": "pending", "token": "YkklgBeK2o9V4mrDoqb54xIn-8JMHXfG6sfufSWxePI" } ] } 2025-01-25 17:43:02,207:DEBUG:acme.client:Storing nonce: KY2mD_AjgcBAiJx2ORVNlnE5AZ90MEU4_hZvNBrN61BsaF5aJAA 2025-01-25 17:43:02,207:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-25 17:43:02,208:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2025-01-25 17:43:02,209:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-25 17:43:02,209:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-25 17:43:02,210:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 17:43:02,210:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-25 17:43:02,211:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-25 17:43:02,211:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-25 17:43:02,212:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 17:43:02,257:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-25 17:43:02,469:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 17:43:02,471:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-25 17:43:02,472:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-25 17:43:02,476:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:05 UTC. 2025-01-25 17:43:02,477:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-25 17:43:02,477:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 17:43:02,485:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-25 17:43:02,485:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-25 17:43:02,485:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-25 17:43:02,502:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-25 17:43:02,503:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-25 17:43:02,505:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-25 17:43:02,997:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-25 17:43:02,998:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:43:04 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "hkte5wtpbLY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-25 17:43:02,998:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-25 17:43:11,373:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8908_key-certbot.pem 2025-01-25 17:43:19,376:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8906_csr-certbot.pem 2025-01-25 17:43:19,377:DEBUG:acme.client:Requesting fresh nonce 2025-01-25 17:43:19,377:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-25 17:43:19,541:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-25 17:43:19,542:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:43:21 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Z6auUXuuZMrVxRIwjle6F0TPD4Sa1-E6iQ6acsVABQq4_egH4oU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-25 17:43:19,543:DEBUG:acme.client:Storing nonce: Z6auUXuuZMrVxRIwjle6F0TPD4Sa1-E6iQ6acsVABQq4_egH4oU 2025-01-25 17:43:19,543:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2025-01-25 17:43:19,550:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVaTXJWeFJJd2psZTZGMFRQRDRTYTEtRTZpUTZhY3NWQUJRcTRfZWdING9VIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "WBrJELXO0jk15AttO2WEls_miRjX1V5TnMdQUkjMFzRfNVn0EMZYN-0_NqOzSSfwW7VRL20TX8-Y9PqBVbfQTV0Oggd70k5eQltQleaGm7T3cG1QKlxCvoenbWOoxSpXMzdNKA2SsZMzbd_R7HMto8tJZV8jyX0vjzaLf12MlnCBhzKCiO-ExqBSnIaGgdoo2tJDzJEn78mYdU6FnN678qjF-vq1V77ea1TrfnY-cEtRVIGaxietGJ3QHtwx6SaP6BvEcZvFYKaK7IBuXNdWFMGC7izV5uczSJrBGIzH17G-vzkQekqICcwnndaPB24QtqRUzfvVBX4Rw9h4Teztzw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2025-01-25 17:43:19,751:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356 2025-01-25 17:43:19,751:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Jan 2025 16:43:21 GMT Content-Type: application/json Content-Length: 356 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140450885 Replay-Nonce: Z6auUXuuACC78KFzSQ-TY8GLfVhrIpvImQC9AsztL25UIRrIpyQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:51:16Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854428445" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140450885" } 2025-01-25 17:43:19,751:DEBUG:acme.client:Storing nonce: Z6auUXuuACC78KFzSQ-TY8GLfVhrIpvImQC9AsztL25UIRrIpyQ 2025-01-25 17:43:19,751:DEBUG:acme.client:JWS payload: b'' 2025-01-25 17:43:19,758:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854428445: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVBQ0M3OEtGelNRLVRZOEdMZlZocklwdkltUUM5QXN6dEwyNVVJUnJJcHlRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ0Mjg0NDUifQ", "signature": "yqZbVqA-EKMuMyMSMZ3qvTDPIyF7llJeePR50T96HyOUMWV0zzdcdrWIldreL_2SyMO025GpNZ9XzZUwSI2Nlz_LH-4HZS-dLzMXKuk7MJmUonsZ8qDKB-qMchbzv59bf8g2J_EkYB6NWLzMzNHEIACqQgcir9A-f_YXk7Rk0V7o_8KEqnbhRQRwPmP0FZ7d6e6AePwkpiKITmPw0qoh-gc6FRYvRhFfSIFM7Jr69Rigx0WiiTUg0DsIA8BqEe4_m6Nb4xMmJN9YikC2TcVptMpEuupQNy-ttdYm8Ay8UtBD2wNgovDgH5t0nsZQV6Nt0Wu2DD6xIaeZRLivESfWaw", "payload": "" } 2025-01-25 17:43:19,929:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854428445 HTTP/1.1" 200 828 2025-01-25 17:43:19,930:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:43:21 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: KY2mD_AjK-LxNMEV9634QOucDpxqx94ZrrOmnl46ggYK3x_oX_s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:51:16Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854428445/Ra9g4Q", "status": "pending", "token": "kR-nkArfvAb4RqjGdmf_0sc2lDYeXub72wgxP10lapo" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854428445/tA2UdQ", "status": "pending", "token": "kR-nkArfvAb4RqjGdmf_0sc2lDYeXub72wgxP10lapo" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854428445/HO9jNQ", "status": "pending", "token": "kR-nkArfvAb4RqjGdmf_0sc2lDYeXub72wgxP10lapo" } ] } 2025-01-25 17:43:19,930:DEBUG:acme.client:Storing nonce: KY2mD_AjK-LxNMEV9634QOucDpxqx94ZrrOmnl46ggYK3x_oX_s 2025-01-25 17:43:19,931:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-25 17:43:19,931:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2025-01-25 17:43:19,932:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-25 17:43:19,932:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-25 17:43:19,933:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 17:43:19,933:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-25 17:43:19,933:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-25 17:43:19,934:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-25 17:43:19,935:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 17:43:19,985:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-25 17:43:20,177:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 17:43:20,179:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2025-01-25 17:43:20,180:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2025-01-25 17:43:20,184:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:33 UTC. 2025-01-25 17:43:20,184:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-25 17:43:20,185:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 17:43:20,190:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-25 17:43:20,191:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-25 17:43:20,191:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-25 17:43:20,196:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-25 17:43:20,197:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-25 17:43:20,199:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-25 17:43:20,705:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-25 17:43:20,706:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:43:22 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "LwSnICZZT8k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-25 17:43:20,706:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-25 17:43:28,558:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8909_key-certbot.pem 2025-01-25 17:43:36,576:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8907_csr-certbot.pem 2025-01-25 17:43:36,577:DEBUG:acme.client:Requesting fresh nonce 2025-01-25 17:43:36,577:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-25 17:43:36,744:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-25 17:43:36,745:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:43:38 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5m-m03bOlXMIUnQpagTaWVn8xiD85Pxrdg5uqBkdQy8HuLd_HIY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-25 17:43:36,745:DEBUG:acme.client:Storing nonce: 5m-m03bOlXMIUnQpagTaWVn8xiD85Pxrdg5uqBkdQy8HuLd_HIY 2025-01-25 17:43:36,746:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2025-01-25 17:43:36,753:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk9sWE1JVW5RcGFnVGFXVm44eGlEODVQeHJkZzV1cUJrZFF5OEh1TGRfSElZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "I33R3kMGxKJyu4fQJG3gN959-vMf-ctOyOj6diEsdBie6_LoisoAu_5541txAnGr4xHCh48zyUOlAFjk9xCCI09s6jnKmXi2UopGx5nPB5nDc0NChlvCTnuk81wBA2rSJeWqolh0NRtAZaEUb5qODNEG8KXj2gckFGhlxZDn0q3quKFkZLmMTwP5pdwEqrTsIGmjmkvPE4mEiyd2ZQuBKSm4I3vKkuVt1qEB-GSC_xPc4Jz0ZGEBDJmpD1m9slKYgbaqPHRuZEg2HsSeiFhGWhBJBS3D2_HuF08ZVr1rvFfpMiXBRMMRz39_0Vh4OuP0v2OU-F_Q0_0mHQjVAC9Hvg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-01-25 17:43:36,935:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2025-01-25 17:43:36,936:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Jan 2025 16:43:38 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140503565 Replay-Nonce: qx2pCBNfhlIqcsoJC32rbCCtluEIsfFv19av-CYlLFVT-i6iET0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:51:31Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854513645" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140503565" } 2025-01-25 17:43:36,936:DEBUG:acme.client:Storing nonce: qx2pCBNfhlIqcsoJC32rbCCtluEIsfFv19av-CYlLFVT-i6iET0 2025-01-25 17:43:36,936:DEBUG:acme.client:JWS payload: b'' 2025-01-25 17:43:36,944:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854513645: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZobElxY3NvSkMzMnJiQ0N0bHVFSXNmRnYxOWF2LUNZbExGVlQtaTZpRVQwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ1MTM2NDUifQ", "signature": "pyVIT5OrSBOCK5spL3PhXppq88UQ4-No6q4JcxO4ax70or1nv233NkpbwamyKybA1IOj1CT_3Tigf_a3VVNYlwkPWFSG0Y8nVZTHcfF8Aq40V_AlLOdlmpoVyvgwQxhDJVvd2Bm724h4sSDUjDk_GJIQWcprLfRcKrQlmxHbx8FcjEFHM1BpX7vqn0DED4AIB0zJJgy8mZoPs4TM2JpnN4IGi46EdQxSOPeDCoTnOlL_l4M7ITCymfZGASySLz0HVW8x8w9HWVCYudBiqqLsTTavhYdnOXRFhrFrTde4EvbySoCx08PQTdOM5seBX1-Pck43spnX6Sr63O3kxKlgTA", "payload": "" } 2025-01-25 17:43:37,118:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854513645 HTTP/1.1" 200 827 2025-01-25 17:43:37,118:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:43:38 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNf3GaiF0kcDXYOUIEWZYSHH4Zh71GPyFiHqsYA87YeIGY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:51:31Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854513645/YCt_0g", "status": "pending", "token": "s0IZH-lt4CcoWX89FYesqwmuLxn1XQ-WV9fmxwfzdJ0" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854513645/2DTePg", "status": "pending", "token": "s0IZH-lt4CcoWX89FYesqwmuLxn1XQ-WV9fmxwfzdJ0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854513645/IJYfNQ", "status": "pending", "token": "s0IZH-lt4CcoWX89FYesqwmuLxn1XQ-WV9fmxwfzdJ0" } ] } 2025-01-25 17:43:37,118:DEBUG:acme.client:Storing nonce: qx2pCBNf3GaiF0kcDXYOUIEWZYSHH4Zh71GPyFiHqsYA87YeIGY 2025-01-25 17:43:37,119:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-25 17:43:37,119:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2025-01-25 17:43:37,120:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-25 17:43:37,121:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-25 17:43:37,121:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 17:43:37,121:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-25 17:43:37,122:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-25 17:43:37,122:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-25 17:43:37,123:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 17:43:37,164:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-25 17:43:37,354:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 17:43:37,355:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2025-01-25 17:43:37,356:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2025-01-25 17:43:37,362:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:54 UTC. 2025-01-25 17:43:37,362:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-25 17:43:37,362:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 17:43:37,369:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-25 17:43:37,369:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-25 17:43:37,369:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-25 17:43:37,374:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-25 17:43:37,375:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-25 17:43:37,376:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-25 17:43:37,876:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-25 17:43:37,877:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:43:39 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "N8St_GbD_LE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-25 17:43:37,877:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-25 17:43:46,221:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8910_key-certbot.pem 2025-01-25 17:43:54,516:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8908_csr-certbot.pem 2025-01-25 17:43:54,517:DEBUG:acme.client:Requesting fresh nonce 2025-01-25 17:43:54,517:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-25 17:43:54,683:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-25 17:43:54,684:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:43:56 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5m-m03bO44bq8RwAyfqyDCmIMbR96OcC2NCg2O4v7kJezJmSjmg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-25 17:43:54,684:DEBUG:acme.client:Storing nonce: 5m-m03bO44bq8RwAyfqyDCmIMbR96OcC2NCg2O4v7kJezJmSjmg 2025-01-25 17:43:54,685:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2025-01-25 17:43:54,693:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk80NGJxOFJ3QXlmcXlEQ21JTWJSOTZPY0MyTkNnMk80djdrSmV6Sm1Tam1nIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "gMDcOvle2oOMlXCNS97d99sDTH2ytQ0oKRQyWm6CQ35lStZIIk9Kg3imZZVeK8p6-o1bZQyUPHpV8lT_gZEp9YPe6Ih-B04gg4_sKMWlCGvhoMPBFjD7j6aCx1bJH1bEgKO9TiEqqEH34JMvgB2vSJOcCe0wWzaw7RSNKqXXOD3SeZgN15vSIhBiFZGblOHdyDjQO5Qt5x--8Kc37I-yL1_SbGOAHfOZNv9G_D6jrHCkfejhBpb9TKQJ0Hf4vRh2xeaq7PvWxhrRa7qZ7v9T85NhY3IgGCye8bl_GbWx1ed-U-_EAOKC5HDxVYSxsifqHepISVGGEJpjzfuGEwwlLg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-25 17:43:54,886:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-25 17:43:54,887:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Jan 2025 16:43:56 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140552425 Replay-Nonce: 5m-m03bOdYtlDMrBP7JC8dlz-EbwemxargFR2o4NzpEaXY99-Tw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:51:46Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854589515" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140552425" } 2025-01-25 17:43:54,887:DEBUG:acme.client:Storing nonce: 5m-m03bOdYtlDMrBP7JC8dlz-EbwemxargFR2o4NzpEaXY99-Tw 2025-01-25 17:43:54,888:DEBUG:acme.client:JWS payload: b'' 2025-01-25 17:43:54,894:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854589515: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk9kWXRsRE1yQlA3SkM4ZGx6LUVid2VteGFyZ0ZSMm80TnpwRWFYWTk5LVR3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ1ODk1MTUifQ", "signature": "Jaf8i84s9B5MVcPZLakNuaTClhNiEqiL4fbT-FjVi_y7Bl_z5LX9-sgyHLaOPn_l__c0eTJyDQlaY5o6WJqwOPg-_T_U5sSvr5sszWVMYEP0weAWXaKZvfgRil2SQ_sun9wVLLoBjkV3xevxynA3FloymZ6JAeWIIEyrQKz8pHBA_HhzE-6j9mGayqhEK9GdDgzj6alus9AuCJ6AdBlzlzNl77GT2cjF4oM_m56-2640ayz3Fi5r4fCWNvbbT86za7XbRvqKoopK4V9aFaTlUUWjkgVQjSikqHfi61tAU9hkKvsuR3nIRJEOjx7nC0rcrGNIbaBU4TfCRIaN-NN1CA", "payload": "" } 2025-01-25 17:43:55,065:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854589515 HTTP/1.1" 200 823 2025-01-25 17:43:55,066:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:43:56 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNfmOCD1dB0GVu-RKbQOTL940KI-6xkb2yBV6vjIRr6gPc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:51:46Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854589515/0ytQ9g", "status": "pending", "token": "vgzC_qBhQwpwOiNo_CvLkC_XDVMlXhOW2G1auAvN-v8" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854589515/qQ_GAQ", "status": "pending", "token": "vgzC_qBhQwpwOiNo_CvLkC_XDVMlXhOW2G1auAvN-v8" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854589515/MXV7zQ", "status": "pending", "token": "vgzC_qBhQwpwOiNo_CvLkC_XDVMlXhOW2G1auAvN-v8" } ] } 2025-01-25 17:43:55,066:DEBUG:acme.client:Storing nonce: qx2pCBNfmOCD1dB0GVu-RKbQOTL940KI-6xkb2yBV6vjIRr6gPc 2025-01-25 17:43:55,067:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-25 17:43:55,067:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2025-01-25 17:43:55,068:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-25 17:43:55,069:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-25 17:43:55,070:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 17:43:55,070:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-25 17:43:55,070:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-25 17:43:55,071:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-25 17:43:55,072:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 17:43:55,135:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-25 17:43:55,335:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 17:43:55,336:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-25 17:43:55,337:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-25 17:43:55,342:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:15 UTC. 2025-01-25 17:43:55,342:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-25 17:43:55,342:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 17:43:55,347:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-25 17:43:55,347:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-25 17:43:55,348:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-25 17:43:55,354:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-25 17:43:55,355:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-25 17:43:55,358:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-25 17:43:55,795:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-25 17:43:55,796:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:43:57 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "FRpoSjwYW0g": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-25 17:43:55,797:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-25 17:44:04,279:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8911_key-certbot.pem 2025-01-25 17:44:12,253:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8909_csr-certbot.pem 2025-01-25 17:44:12,254:DEBUG:acme.client:Requesting fresh nonce 2025-01-25 17:44:12,254:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-25 17:44:12,404:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-25 17:44:12,405:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:44:14 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Z6auUXuurOA6pGvWBLCUlUrZdCXLOqsjidZeu0PAFed93uRHY70 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-25 17:44:12,405:DEBUG:acme.client:Storing nonce: Z6auUXuurOA6pGvWBLCUlUrZdCXLOqsjidZeu0PAFed93uRHY70 2025-01-25 17:44:12,405:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2025-01-25 17:44:12,411:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVyT0E2cEd2V0JMQ1VsVXJaZENYTE9xc2ppZFpldTBQQUZlZDkzdVJIWTcwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "vYe9GTISjmXbV2wBqiyebWPiSOMTBwfxMwQ_vLhHVpRIpDVloVpGHcTsbS6drsRe1S0abbHgNaHW6lHDsFIZzJGEMckg-vgB4tNgLmKk3K8PmyGUxrZ2pY3OwM7FKz01EXxOUK0jbZO2ZwxD-fLhK2BCGT-wlx8Yu-Feigvugyg5BhSVBoYiQvRVdljvCmURJ8zyJcEUdIvBoovv28H4Q4eo1TiZwzmQeXO1b0nhdE1_59NR8Ja_iEXjabTzJg9-_FfQLYYzPsR3CKPIlrcNkttTjZvarYPod-UA7QZu5dUFpxzl4JyL_9X1sdus48TNoUfM47lIulSU73OFg9TXQA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-25 17:44:12,605:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-25 17:44:12,605:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Jan 2025 16:44:14 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140602055 Replay-Nonce: KY2mD_Aj8fsiQLWLy3ZChVBzfYwuaSUoekgT0I69BodNwIlBJT0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:52:00Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854665835" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140602055" } 2025-01-25 17:44:12,606:DEBUG:acme.client:Storing nonce: KY2mD_Aj8fsiQLWLy3ZChVBzfYwuaSUoekgT0I69BodNwIlBJT0 2025-01-25 17:44:12,606:DEBUG:acme.client:JWS payload: b'' 2025-01-25 17:44:12,612:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854665835: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWo4ZnNpUUxXTHkzWkNoVkJ6Zll3dWFTVW9la2dUMEk2OUJvZE53SWxCSlQwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ2NjU4MzUifQ", "signature": "FPEhEEmzPgCUcr3KKmfV9MEvUPh_UTXH9k8bCEPkOhGh8seqIYKf9aLOxQIY8DbDBRp7nkek8eMa_ukoy3ohQ30KjmaLWugSR8N5y3yLbasGRtaIir5LH5G-wEhiE0oRTfJGlc05fLmqhVpzFnsrhQ1ECsiJdYy5ueTy88Iqc2FIXmT4Le5r0oYw_nWL5eJg8tdLNfG2J0ZLQscm2nGtQyqGgWBbTN4oIChxvs3FA-4EeCuBNhE8tHoopJt2kKhoilNdAgFZf6tsiSFBJH78FIULN6iGEKJxLfjK9ZwPBETeK4JrxoV3BVbVdXaUQknlgSLv85a75sTZ5njAkqESkw", "payload": "" } 2025-01-25 17:44:12,767:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854665835 HTTP/1.1" 200 823 2025-01-25 17:44:12,767:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:44:14 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: KY2mD_AjU9C5AHeteFrpkA1OX5-GP1jhIYYuq6Y8OIJc8LUw924 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:52:00Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854665835/A7xmXA", "status": "pending", "token": "IQq7H-CrjRngbvlfBYyq4TC9BGO3mQb9XFlUCm-xOp8" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854665835/hkfxMA", "status": "pending", "token": "IQq7H-CrjRngbvlfBYyq4TC9BGO3mQb9XFlUCm-xOp8" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854665835/VSa2Qg", "status": "pending", "token": "IQq7H-CrjRngbvlfBYyq4TC9BGO3mQb9XFlUCm-xOp8" } ] } 2025-01-25 17:44:12,767:DEBUG:acme.client:Storing nonce: KY2mD_AjU9C5AHeteFrpkA1OX5-GP1jhIYYuq6Y8OIJc8LUw924 2025-01-25 17:44:12,768:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-25 17:44:12,768:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2025-01-25 17:44:12,769:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-25 17:44:12,769:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-25 17:44:12,770:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 17:44:12,770:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-25 17:44:12,771:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-25 17:44:12,771:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-25 17:44:12,772:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 17:44:12,819:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-25 17:44:13,109:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 17:44:13,111:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2025-01-25 17:44:13,112:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2025-01-25 17:44:13,119:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:38 UTC. 2025-01-25 17:44:13,119:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-25 17:44:13,119:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 17:44:13,124:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-25 17:44:13,125:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-25 17:44:13,125:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-25 17:44:13,131:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-25 17:44:13,132:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-25 17:44:13,134:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-25 17:44:13,602:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-25 17:44:13,603:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:44:15 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "nZBx3FND0Ws": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-25 17:44:13,604:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-25 17:44:21,691:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8912_key-certbot.pem 2025-01-25 17:44:29,681:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8910_csr-certbot.pem 2025-01-25 17:44:29,682:DEBUG:acme.client:Requesting fresh nonce 2025-01-25 17:44:29,682:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-25 17:44:29,839:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-25 17:44:29,840:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:44:31 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5m-m03bO2JqZkT1DTpj99BP8sGHMzuXaunMVfkRIkj_cu3UZsGg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-25 17:44:29,840:DEBUG:acme.client:Storing nonce: 5m-m03bO2JqZkT1DTpj99BP8sGHMzuXaunMVfkRIkj_cu3UZsGg 2025-01-25 17:44:29,840:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2025-01-25 17:44:29,848:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk8ySnFaa1QxRFRwajk5QlA4c0dITXp1WGF1bk1WZmtSSWtqX2N1M1Vac0dnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "dNoZEuJBFMFq2rcPdnb339waLqPtyoCM1BlbiIzENZEkNG8oUYB0uEqLnzp-fMPTp2DIYMmLsZbzLly3s7RJgcyYNtLnsExLD55TjH4ES8ctLX38tdg_UgjdJp6iM2FV1jaqTp1H00Vdc819KXs24kAIhSPuPt-grfD5iM8S7-9--cTaVOhQca0d92ZR5YRXbYFi7SOOO5rzBpAYoWU0VM3_PlgeG5i2GTnYFdkrm3cNsd05DM_-S-uLLJh43nYkIbLsqSmZYu1ENzIQINoO6TwxT84pZDppVGpRUepcegCKRYmHcOdOoYvIq6Zi1xk7uBW9jDaHejfxtEgBem2_iQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-25 17:44:30,096:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-25 17:44:30,097:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Jan 2025 16:44:31 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140669395 Replay-Nonce: qx2pCBNfPRl_-8lRD-rkIGiWRctsrFLmwqceb98vCImJnu0ct9w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:52:15Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854767445" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140669395" } 2025-01-25 17:44:30,097:DEBUG:acme.client:Storing nonce: qx2pCBNfPRl_-8lRD-rkIGiWRctsrFLmwqceb98vCImJnu0ct9w 2025-01-25 17:44:30,098:DEBUG:acme.client:JWS payload: b'' 2025-01-25 17:44:30,106:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854767445: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZQUmxfLThsUkQtcmtJR2lXUmN0c3JGTG13cWNlYjk4dkNJbUpudTBjdDl3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ3Njc0NDUifQ", "signature": "k7w5hIKeILSgXbEM21FqK0-5nY36YjraJxPx1jLPkoKz4KkuQFznIeHmn-WR4yhMQCh71l_VQax5uxDpXPlTc38NVTsPvZLm_fB_D-RqfZCR_apswvIdt9HlJs9rXoklDKSJkoDY6NqVsOYsEWkY7lgCrkwq5VlJPzuW55FevIbgAJwDCV8fkThvY7sNrBel5zhDO47-V24woSuPqe3HsrbvrVz0cNVNoQtwST5A6mwiv6b95Tz-n_nHObYkaZdCqkKtkYzAI0G_XP1yf6qwHwBdKx_Ge_dSOFL5Zw9wIDM215wOkSeNEKwKCUXxUDabryOzgSi8D90hynpD7_Zy6A", "payload": "" } 2025-01-25 17:44:30,267:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854767445 HTTP/1.1" 200 823 2025-01-25 17:44:30,268:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 16:44:31 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5m-m03bOkTxV9ai-7tD5XZVIfXN98Jv92gJcGOSOkCV5yZcEYuQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:52:15Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854767445/I_YfaQ", "status": "pending", "token": "Z2FjGy5YI24p9E9ApXNQZTvas2Cq6xGIBczpA5STm0k" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854767445/9iBbmQ", "status": "pending", "token": "Z2FjGy5YI24p9E9ApXNQZTvas2Cq6xGIBczpA5STm0k" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854767445/KFIdlQ", "status": "pending", "token": "Z2FjGy5YI24p9E9ApXNQZTvas2Cq6xGIBczpA5STm0k" } ] } 2025-01-25 17:44:30,269:DEBUG:acme.client:Storing nonce: 5m-m03bOkTxV9ai-7tD5XZVIfXN98Jv92gJcGOSOkCV5yZcEYuQ 2025-01-25 17:44:30,269:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-25 17:44:30,270:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2025-01-25 17:44:30,270:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-25 17:44:30,271:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-25 17:44:30,272:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 17:44:30,272:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-25 17:44:30,272:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-25 17:44:30,273:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-25 17:44:30,274:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 17:44:30,274:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2025-01-25 17:44:30,274:ERROR:certbot._internal.renewal: C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2025-01-25 17:44:30,276:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 11 renew failure(s), 0 parse failure(s) 2025-01-25 17:44:30,291:ERROR:certbot._internal.log:11 renew failure(s), 0 parse failure(s)