2023-11-26 18:27:42,040:DEBUG:certbot._internal.main:certbot version: 1.6.0 2023-11-26 18:27:42,040:DEBUG:certbot._internal.main:Arguments: [] 2023-11-26 18:27:42,040:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2023-11-26 18:27:42,953:DEBUG:certbot._internal.log:Root logging level set at 20 2023-11-26 18:27:42,953:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2023-11-26 18:27:42,989:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2023-11-26 18:27:43,028:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-26 18:27:43,255:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-26 18:27:43,267:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is signed by the certificate's issuer. 2023-11-26 18:27:43,271:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is: OCSPCertStatus.GOOD 2023-11-26 18:27:43,278:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:23 UTC. 2023-11-26 18:27:43,279:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-26 18:27:43,279:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-26 18:27:43,284:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-26 18:27:43,284:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-26 18:27:43,284:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-26 18:27:43,296:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-26 18:27:43,298:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-26 18:27:43,301:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-26 18:27:43,868:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-26 18:27:43,869:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:27:41 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "jAKR-o88QRQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-26 18:27:43,870:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-26 18:27:48,848:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7090_key-certbot.pem 2023-11-26 18:27:53,233:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7088_csr-certbot.pem 2023-11-26 18:27:53,233:DEBUG:acme.client:Requesting fresh nonce 2023-11-26 18:27:53,233:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-26 18:27:53,411:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-26 18:27:53,411:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:27:51 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjTOoK_0eb8lIHQzryI7yw4Wh_rRUxDamNAjIxPzZG3_c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-26 18:27:53,411:DEBUG:acme.client:Storing nonce: SFMYLIQjTOoK_0eb8lIHQzryI7yw4Wh_rRUxDamNAjIxPzZG3_c 2023-11-26 18:27:53,412:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2023-11-26 18:27:53,418:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpUT29LXzBlYjhsSUhRenJ5STd5dzRXaF9yUlV4RGFtTkFqSXhQelpHM19jIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "XB7zkaP0UVOmq_YWSUrXzM98kQzm9wWjkZB8BTKx-OiCGtdJ9z7vR87vS8-SQ_M2zumAx5A0TaQ0UAt0e3HSGpFZesqQb35rYQUFfs3sDJ4spiKcrtlpKakh7489rT5gdi2SJbv1--cPBeEsFawUrvOTPWEZWZvxX5cUKpywSqKfthpR3exlM9vGi8mzp9s9OVxN4Nhl3P0wjRNzlBHVEARf9gzYUnmIxstqoZtVOGcCVWdlLyOxDKB9SV6pVqXnfPkLZMHUrJTfwU7KH9Nd5X_zeFNtvW9IwcJhvhmipEPP-GVbz7N5R0sWUCD0ACJFJBUqPQ18HQLX23dEMVTbiA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-26 18:27:53,614:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2023-11-26 18:27:53,615:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 26 Nov 2023 17:27:51 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223795980256 Replay-Nonce: jXyutbsnMr4_6n_HWY3lanPnVzdQp-x6fPg7PQr5jI0OfRHjeVE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:00Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066491486" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223795980256" } 2023-11-26 18:27:53,615:DEBUG:acme.client:Storing nonce: jXyutbsnMr4_6n_HWY3lanPnVzdQp-x6fPg7PQr5jI0OfRHjeVE 2023-11-26 18:27:53,615:DEBUG:acme.client:JWS payload: b'' 2023-11-26 18:27:53,621:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066491486: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25NcjRfNm5fSFdZM2xhblBuVnpkUXAteDZmUGc3UFFyNWpJME9mUkhqZVZFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY0OTE0ODYifQ", "signature": "ofOAmEhlcEdLzkYpSniBExBB8PCrzTyJsyWxaq8yMcFAKSE8uXi6XYy0_zX0mevniNkwttsMKwTSqBkkHPN36tIL0YfbtaNC0HB186jbD4pZmElGnsksh10utEImLVlNbXt78w9GkMlxic5z7fbnrz2O2G-mWROQTarH1xR60Ztw2ChFf0Na1N05TljiYEMjmqFW2yNsw6AFlyD9oSI6FsHIVowrKyOGRkjAtFFECBbpL_kF68htKgGtU4d7syogLWAaSJ8SPBLCvb4gOV-sL1osmTbcexpx2TpnGHKnanMJqafWMRw9gD_M8Z9Bja9ig3tLgT0I8qBiVJrxTobnug", "payload": "" } 2023-11-26 18:27:53,802:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066491486 HTTP/1.1" 200 810 2023-11-26 18:27:53,803:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:27:51 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjBvyyywLbzpgdIkeG_nKV1T0BhmxI5IiqYrTxzmFKr8c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:00Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066491486/iZpoTw", "token": "sb15n-zcYGZjmBEw4udDUXuX-BTwRrUMF--2J3EM_48" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066491486/hLn7qQ", "token": "sb15n-zcYGZjmBEw4udDUXuX-BTwRrUMF--2J3EM_48" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066491486/g8UZBg", "token": "sb15n-zcYGZjmBEw4udDUXuX-BTwRrUMF--2J3EM_48" } ] } 2023-11-26 18:27:53,803:DEBUG:acme.client:Storing nonce: SFMYLIQjBvyyywLbzpgdIkeG_nKV1T0BhmxI5IiqYrTxzmFKr8c 2023-11-26 18:27:53,803:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-26 18:27:53,804:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2023-11-26 18:27:53,804:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-26 18:27:53,805:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-26 18:27:53,815:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-26 18:27:53,816:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-26 18:27:53,816:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-26 18:27:53,816:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-26 18:27:53,821:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-26 18:27:53,862:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-26 18:27:54,271:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-26 18:27:54,272:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-26 18:27:54,273:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-26 18:27:54,277:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:36 UTC. 2023-11-26 18:27:54,277:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-26 18:27:54,277:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-26 18:27:54,282:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-26 18:27:54,282:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-26 18:27:54,282:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-26 18:27:54,286:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-26 18:27:54,287:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-26 18:27:54,289:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-26 18:27:54,808:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-26 18:27:54,809:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:27:52 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "gRpA-vOhZyo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-26 18:27:54,809:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-26 18:27:58,505:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7091_key-certbot.pem 2023-11-26 18:28:02,146:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7089_csr-certbot.pem 2023-11-26 18:28:02,147:DEBUG:acme.client:Requesting fresh nonce 2023-11-26 18:28:02,147:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-26 18:28:02,320:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-26 18:28:02,321:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:28:00 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsniW38uQVeKWGXPZ_xGYmkdLBlQZSBH6P5MqQ9o0l78Xc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-26 18:28:02,321:DEBUG:acme.client:Storing nonce: jXyutbsniW38uQVeKWGXPZ_xGYmkdLBlQZSBH6P5MqQ9o0l78Xc 2023-11-26 18:28:02,321:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2023-11-26 18:28:02,327:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25pVzM4dVFWZUtXR1hQWl94R1lta2RMQmxRWlNCSDZQNU1xUTlvMGw3OFhjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "UaowPKctCTMaJIyWxxy_W9z80nnJHmDGbGGuoBghm9a_6VWpDRNwUZ9CSHPfDfDHY0x41RbJmeMqxpGATe28ffz8SNm1N3790ZVqbOHQ0pftgZFDVihhb5QIZzeMKMz7pbiyc34qrkpfv43SzA6PVKsVdc4r3rWOUYqF36KJLWfP3NtiQzBZgrxMMNQmmgGFg8S4foWEUMQKanxSwXQ2XbmNG5AsqkjN3hjCjeEQMvU3Yafn_9-q11vTwCaZGw7HP4cTPOIM5fAPuWV25CTU6Gt7Q_LscrfuVoXrSGlO2hWlkznbcN8APAgnqRz_TrhweEubAlbX3ow8GRy6It2L5Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-26 18:28:02,594:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2023-11-26 18:28:02,594:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 26 Nov 2023 17:28:00 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796010606 Replay-Nonce: jXyutbsnJj2tiEUhFO8jkroqdF_SIGdQI5EpACkEpcpuGcx6atQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:09Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066531206" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796010606" } 2023-11-26 18:28:02,594:DEBUG:acme.client:Storing nonce: jXyutbsnJj2tiEUhFO8jkroqdF_SIGdQI5EpACkEpcpuGcx6atQ 2023-11-26 18:28:02,595:DEBUG:acme.client:JWS payload: b'' 2023-11-26 18:28:02,600:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066531206: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25KajJ0aUVVaEZPOGprcm9xZEZfU0lHZFFJNUVwQUNrRXBjcHVHY3g2YXRRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY1MzEyMDYifQ", "signature": "DWdMCzFsOeuuNkK3u6yPruXW_K0Z6OiRaFKoCcThSrjPduDQgxgxC8e7UyqdmJnbrPYVMdTsE--tDRQNFG0QzPRdctieOkEZlLJPi5rBJIwDjl8iAyBkYI7pPLjWyubpRRVociGLQwNqBb9K87LJp0i0M_ByRSNSPkjG2-m5hz_9fDON7QNloViM03TIc7wrN0lKddd5hv1kv3_teKwWziQECkJWfyEDPnmdO-gXsuLBOr2h3gqyqGMJgA1U0LP95kc1sX0F8lM7U0SIE28J3Ou1OA7n-ixIsLzhdXDWRg2orA6RXs3mP__IGB3PiIRDmEqGGBJD2hygO5jCJTxn5w", "payload": "" } 2023-11-26 18:28:02,789:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066531206 HTTP/1.1" 200 804 2023-11-26 18:28:02,790:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:28:00 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQj6b084-XqtWCiP43_WwoEtw3MBBWImg3tawdQg08u90Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:09Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066531206/HwkKGg", "token": "XnSnBmyZRInRNHNise1p6HXmMUAmTdgzqO5hi25GzvI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066531206/RFhChg", "token": "XnSnBmyZRInRNHNise1p6HXmMUAmTdgzqO5hi25GzvI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066531206/Q06UlA", "token": "XnSnBmyZRInRNHNise1p6HXmMUAmTdgzqO5hi25GzvI" } ] } 2023-11-26 18:28:02,790:DEBUG:acme.client:Storing nonce: SFMYLIQj6b084-XqtWCiP43_WwoEtw3MBBWImg3tawdQg08u90Y 2023-11-26 18:28:02,790:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-26 18:28:02,791:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2023-11-26 18:28:02,791:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-26 18:28:02,792:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-26 18:28:02,792:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-26 18:28:02,793:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-26 18:28:02,793:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-26 18:28:02,793:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-26 18:28:02,794:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-26 18:28:02,845:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-26 18:28:03,302:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-26 18:28:03,304:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-26 18:28:03,304:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-26 18:28:03,308:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:49 UTC. 2023-11-26 18:28:03,309:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-26 18:28:03,309:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-26 18:28:03,314:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-26 18:28:03,314:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-26 18:28:03,314:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-26 18:28:03,318:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-26 18:28:03,319:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-26 18:28:03,321:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-26 18:28:03,764:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-26 18:28:03,765:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:28:01 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "wzOXHzLIN8I": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2023-11-26 18:28:03,766:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-26 18:28:07,505:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7092_key-certbot.pem 2023-11-26 18:28:11,201:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7090_csr-certbot.pem 2023-11-26 18:28:11,201:DEBUG:acme.client:Requesting fresh nonce 2023-11-26 18:28:11,201:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-26 18:28:11,348:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-26 18:28:11,349:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:28:09 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf81sZ3x4TlCLpUdR-MTRytdPU9yfWIFeuXuMuJCci7_F8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-26 18:28:11,349:DEBUG:acme.client:Storing nonce: nbWKegf81sZ3x4TlCLpUdR-MTRytdPU9yfWIFeuXuMuJCci7_F8 2023-11-26 18:28:11,349:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2023-11-26 18:28:11,355:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjgxc1ozeDRUbENMcFVkUi1NVFJ5dGRQVTl5ZldJRmV1WHVNdUpDY2k3X0Y4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "XoIOiLeLQB2kpTp02S-7ldd3s1zimiDBFutWbKAiOu75xw1Sa5mwVMUYwpevTqneNbbEfz015wj1z1xHkK3-GyH5lRTNYwFRQP7Qpdh9nXXWc94g6jq4j3ITEMPciRs625NSxcg9BVbGn_oeiu68goGNhLGfOaOvc60sNobjwbnKs5hlU4hWaBTa5hsy4O8kTEhvkNHGR4dXNZP4sflfZ5oX2pyPA7volv91UYb2gxv9x8C67rMDUblhsdo43IKehPuPxu27zxHoXmm7p22sTm_bO7X20tUhB5ZchynKisTpP1p-Wc8ydmqhgbQahwGmjQBaiCOO2oYw8e432T6EJA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-26 18:28:11,526:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2023-11-26 18:28:11,527:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 26 Nov 2023 17:28:09 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796034066 Replay-Nonce: nbWKegf8udm4J8p_b2x7gDKJw4mSB1qGFzTZjTKSwylZlZPz7m8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:17Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066566356" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796034066" } 2023-11-26 18:28:11,527:DEBUG:acme.client:Storing nonce: nbWKegf8udm4J8p_b2x7gDKJw4mSB1qGFzTZjTKSwylZlZPz7m8 2023-11-26 18:28:11,527:DEBUG:acme.client:JWS payload: b'' 2023-11-26 18:28:11,533:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066566356: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjh1ZG00SjhwX2IyeDdnREtKdzRtU0IxcUdGelRaalRLU3d5bFpsWlB6N204IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY1NjYzNTYifQ", "signature": "N9G7Xl9xiy38PpO1pKadE-W2K4nHeBZLWcQNSu1pUiLs27RNWd_OmUy5Lt0UZZ2xOupkZ_X7vGu6_5AMMuvLgDK4Xq4ZIdJhSfsELs8Ku06GJPNUUM4rTOmSMZ0agNXY6RhMmQayDu842It4fL-IuenFlCW_nVnJguL-FB4HODGF1c5IH3Mgrpl8vJrlXtTup7tESF1JXPUk2Ihyx_orKa5s9svQu2-gsUAWhTRfHxbm0a-jpojtPgGkQ1jd9yVqQN7ak7RQTEZZGuY0GQNTJfqsFtFQaWPL33xXar-784gRiF57jOOxqnq2vF0zc4dv8xtHQlNMATBx6BgCS5PgUA", "payload": "" } 2023-11-26 18:28:11,698:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066566356 HTTP/1.1" 200 807 2023-11-26 18:28:11,698:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:28:09 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfi7nFrhvMxdySVEZVmxJtKcfqTPYwTdPq-PHMqweU5UZM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:17Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066566356/Ahrirw", "token": "4G7MK_dXMu2C2sZjEzJh8AI0cmHBR_DIlPql7MrNzK0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066566356/5ji8UA", "token": "4G7MK_dXMu2C2sZjEzJh8AI0cmHBR_DIlPql7MrNzK0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066566356/9qmJcg", "token": "4G7MK_dXMu2C2sZjEzJh8AI0cmHBR_DIlPql7MrNzK0" } ] } 2023-11-26 18:28:11,699:DEBUG:acme.client:Storing nonce: v0bMowfi7nFrhvMxdySVEZVmxJtKcfqTPYwTdPq-PHMqweU5UZM 2023-11-26 18:28:11,699:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-26 18:28:11,699:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2023-11-26 18:28:11,700:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-26 18:28:11,700:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-26 18:28:11,701:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-26 18:28:11,701:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-26 18:28:11,701:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-26 18:28:11,702:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-26 18:28:11,703:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-26 18:28:11,755:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-26 18:28:11,866:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-26 18:28:11,867:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-26 18:28:11,868:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-26 18:28:11,872:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:02 UTC. 2023-11-26 18:28:11,872:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-26 18:28:11,872:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-26 18:28:11,876:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-26 18:28:11,877:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-26 18:28:11,877:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-26 18:28:11,881:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-26 18:28:11,882:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-26 18:28:11,884:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-26 18:28:12,403:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-26 18:28:12,404:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:28:10 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "5gPXouLccJQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-26 18:28:12,404:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-26 18:28:16,221:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7093_key-certbot.pem 2023-11-26 18:28:19,935:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7091_csr-certbot.pem 2023-11-26 18:28:19,935:DEBUG:acme.client:Requesting fresh nonce 2023-11-26 18:28:19,935:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-26 18:28:20,109:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-26 18:28:20,109:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:28:18 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnrLrtCg4SFx7CvlM_--cZsPTkp3LRs6PRwP83hRqz-KQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-26 18:28:20,110:DEBUG:acme.client:Storing nonce: jXyutbsnrLrtCg4SFx7CvlM_--cZsPTkp3LRs6PRwP83hRqz-KQ 2023-11-26 18:28:20,110:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2023-11-26 18:28:20,115:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25yTHJ0Q2c0U0Z4N0N2bE1fLS1jWnNQVGtwM0xSczZQUndQODNoUnF6LUtRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Uj7c4s_vlih7Y5TMw9QxDE44l2zLDB1e3C9F0Ismhka3uTnXQN-KnIbRwiFCQu-XqJAA_I_Vjwbt5U6g2H5slchuxTHZ9qXyK_H6BfNRoKeH9khLHM4AgeGUadC-SRLbsiWNr2b-9B3q0ABUFC92O5LcnFeYh2hGfkTFmByN3trJJymbneMk0hM0aRQbcc6KRI_57VvLw_5AiI0L3jqPWtX-yrLzzz8xb2-_-YQ3PiaeAgNwZSYjFMNBgZi-hbrYxzpMU4nflggoAJ6x08xBJ1WcRQZw6P5sZupFbsj8C2DG2VhVTVrhYsOm7p5V-85gFSD1-gnCkT70lcQmlHY3Iw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-26 18:28:20,315:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2023-11-26 18:28:20,316:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 26 Nov 2023 17:28:18 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796055606 Replay-Nonce: jXyutbsnYpZl51kBNd9pbIRq2T-8He-OE865mnQYnTBQnW-CyxE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:26Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066598576" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796055606" } 2023-11-26 18:28:20,316:DEBUG:acme.client:Storing nonce: jXyutbsnYpZl51kBNd9pbIRq2T-8He-OE865mnQYnTBQnW-CyxE 2023-11-26 18:28:20,316:DEBUG:acme.client:JWS payload: b'' 2023-11-26 18:28:20,322:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066598576: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25ZcFpsNTFrQk5kOXBiSVJxMlQtOEhlLU9FODY1bW5RWW5UQlFuVy1DeXhFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY1OTg1NzYifQ", "signature": "IAfMfcEkJjl5tiLaSDkN3k2e2Abkq-LW4ZfmIrSB4FKn4dfGOdFmhZUU-SCXe_ry1tNR4kIo_Yw05qr-VBfsENeiw9zD2SjuvF63cPI2djZWVmXUX3K5_4mAqIS1i_cCJwRJewjYVXErJrPRWIugpJrQkFxY_IglMTjD7jll2yM9Efjidn45DSWFvfHbgnw4dmtGzByuPi8jBjYJcUv1IYhZ_XWPVJawTRqUj0E0_jqLSkq0_YUHMJ3Vt_-GtXAbwI4Qxk5epsOp9RsCYHCcHULWe7crHIn5VUzHVa15PGWlmXHdX8KKKGfoFGx1hdF-g1CYstoGh3J206g_MjkX8Q", "payload": "" } 2023-11-26 18:28:20,512:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066598576 HTTP/1.1" 200 801 2023-11-26 18:28:20,512:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:28:18 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjmDNmg4KSqNlb05yQRq0z7KsYiF9b6B2nJAf4pfp_BOI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:26Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066598576/f3URKA", "token": "J6ZL0EQU-jtK9avoLKda1DkzwcegKRZen1GsEEp4cxs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066598576/iDceBQ", "token": "J6ZL0EQU-jtK9avoLKda1DkzwcegKRZen1GsEEp4cxs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066598576/LT38xQ", "token": "J6ZL0EQU-jtK9avoLKda1DkzwcegKRZen1GsEEp4cxs" } ] } 2023-11-26 18:28:20,513:DEBUG:acme.client:Storing nonce: SFMYLIQjmDNmg4KSqNlb05yQRq0z7KsYiF9b6B2nJAf4pfp_BOI 2023-11-26 18:28:20,513:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-26 18:28:20,514:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2023-11-26 18:28:20,514:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-26 18:28:20,514:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-26 18:28:20,515:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-26 18:28:20,515:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-26 18:28:20,515:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-26 18:28:20,516:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-26 18:28:20,517:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-26 18:28:20,568:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-26 18:28:20,970:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-26 18:28:20,971:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-26 18:28:20,972:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-26 18:28:20,976:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:14 UTC. 2023-11-26 18:28:20,976:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-26 18:28:20,977:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-26 18:28:20,981:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-26 18:28:20,982:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-26 18:28:20,982:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-26 18:28:20,986:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-26 18:28:20,987:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-26 18:28:20,988:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-26 18:28:21,443:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-26 18:28:21,444:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:28:19 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "L73G3dGVL9U": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-26 18:28:21,444:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-26 18:28:25,326:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7094_key-certbot.pem 2023-11-26 18:28:28,965:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7092_csr-certbot.pem 2023-11-26 18:28:28,966:DEBUG:acme.client:Requesting fresh nonce 2023-11-26 18:28:28,966:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-26 18:28:29,116:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-26 18:28:29,116:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:28:27 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfizYWbYiuZRnBMW8Lf1GqrgqZQbH31Mdn3MMHgT4LOZkM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-26 18:28:29,117:DEBUG:acme.client:Storing nonce: v0bMowfizYWbYiuZRnBMW8Lf1GqrgqZQbH31Mdn3MMHgT4LOZkM 2023-11-26 18:28:29,117:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2023-11-26 18:28:29,123:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93Zml6WVdiWWl1WlJuQk1XOExmMUdxcmdxWlFiSDMxTWRuM01NSGdUNExPWmtNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "qYZ5glf30AtqslMkcvKxavodZV8xDW5mv9sIc8WHVs-0OM7kW-2CO91LBdPYL5Fu31UqWfEqCNU0dDT1L5EdmJ7ajlW4FJjCd24Lbxiu9TL4iEaXDvsrhD87zlIvUZGmBqhHZVBwQJYKpNk8pZfJ9DgEbgXwgVeL09Giq4sFYDJKvQK0RV-t-A2_AFvPlFbCcGDbACwl81nSTbD_M3X0bodr6NarVn9ZmDIWBKtdt6FAHYoUJTq_pNcdf9m-t-49-X6jESjTv4sVyLxGwQhK7QfEXr1ZOVy7AzYMMkveikqXvIV9MqnRmsFrj09e9zjXa4eAG4I2MEHv-aQtAR1LwQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-26 18:28:29,297:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-26 18:28:29,298:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 26 Nov 2023 17:28:27 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796073426 Replay-Nonce: nbWKegf8GKqdlQoVQ6-LJT18iXZ_cBjcbPKUmq2WTlas-rWqk2w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:34Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066622126" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796073426" } 2023-11-26 18:28:29,298:DEBUG:acme.client:Storing nonce: nbWKegf8GKqdlQoVQ6-LJT18iXZ_cBjcbPKUmq2WTlas-rWqk2w 2023-11-26 18:28:29,298:DEBUG:acme.client:JWS payload: b'' 2023-11-26 18:28:29,304:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066622126: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhHS3FkbFFvVlE2LUxKVDE4aVhaX2NCamNiUEtVbXEyV1RsYXMtcldxazJ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2MjIxMjYifQ", "signature": "g0diDU0Ylchjcg-ZF77jCosBjkm44Iyn2AMBKLHUVkzJSJ4QNlaaMr0xFPvxSsyruQG0YmGP1KaYASGS0L8V6RKSlAt43_5mIbf54Iu31hqfy6VsL01T9LY62T3d7Jh-pKRmwaDV89qegKFPPeNIVUuPAv3YM_hBf-pdqZ7QHOVrH2IioXIUXfKhJ0YMJo-oIh_6roRgCWz7UcvwaKpU2goq9lx2xRuwcEhwTno3ftlneX4xJp8Ov3jchfxIi6XbePZxmZWQR0feG0vFK2wGZ2PhwXs4x0bMWjV02769XXXn8uEbXFGdmlfk2NT179kfI5-HOdfsROckN6OncQucFg", "payload": "" } 2023-11-26 18:28:29,472:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066622126 HTTP/1.1" 200 805 2023-11-26 18:28:29,472:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:28:27 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8aS-cPmE4Q313W52Sbzvpv9N0chFJUC84wJSQD1e6iOE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:34Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066622126/zRCxuQ", "token": "gv2fmd0seZNcl7Js9O_Y9lNTlUdsETbsewgxCi8k0AI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066622126/gv15MQ", "token": "gv2fmd0seZNcl7Js9O_Y9lNTlUdsETbsewgxCi8k0AI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066622126/tryPHA", "token": "gv2fmd0seZNcl7Js9O_Y9lNTlUdsETbsewgxCi8k0AI" } ] } 2023-11-26 18:28:29,473:DEBUG:acme.client:Storing nonce: nbWKegf8aS-cPmE4Q313W52Sbzvpv9N0chFJUC84wJSQD1e6iOE 2023-11-26 18:28:29,473:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-26 18:28:29,473:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2023-11-26 18:28:29,474:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-26 18:28:29,474:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-26 18:28:29,475:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-26 18:28:29,475:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-26 18:28:29,475:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-26 18:28:29,476:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-26 18:28:29,477:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-26 18:28:29,523:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-26 18:28:29,905:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-26 18:28:29,906:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-26 18:28:29,907:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-26 18:28:29,911:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:27 UTC. 2023-11-26 18:28:29,911:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-26 18:28:29,912:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-26 18:28:29,917:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-26 18:28:29,917:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-26 18:28:29,917:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-26 18:28:29,922:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-26 18:28:29,923:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-26 18:28:29,925:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-26 18:28:30,471:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-26 18:28:30,472:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:28:28 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "CLAPKzZMx1c": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-26 18:28:30,472:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-26 18:28:34,173:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7095_key-certbot.pem 2023-11-26 18:28:37,830:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7093_csr-certbot.pem 2023-11-26 18:28:37,830:DEBUG:acme.client:Requesting fresh nonce 2023-11-26 18:28:37,831:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-26 18:28:38,013:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-26 18:28:38,014:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:28:36 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjnKVJ8AkBnuteeqxOXLp_1q-WiGegYNYWnnfp7hDoAu8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-26 18:28:38,014:DEBUG:acme.client:Storing nonce: SFMYLIQjnKVJ8AkBnuteeqxOXLp_1q-WiGegYNYWnnfp7hDoAu8 2023-11-26 18:28:38,014:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2023-11-26 18:28:38,020:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpuS1ZKOEFrQm51dGVlcXhPWExwXzFxLVdpR2VnWU5ZV25uZnA3aERvQXU4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Bj3aqjEwtXxGCtnavPYqF0ZRpWKqVf92gCfKo708dON-y2aMqHRbT79yE_K_DxaqWK5I4XkYP9lv3XwxLVtZlkkh9B50TxiQq13o_70Pyd-GQTHEbeooOfDPoInnjGAmxcwmbIg0nfFpTeDNxj2rPpsiMEyTVQfPYeXTGXJI1sTUGsnUHgqov0i-t91Yz05_oOApLZ051Debzq08ap_-GBFl-El4nxDaSGXSm6w25Fc8k556MpQvonJFJAo_L0fuXaSFmrqNbr4JsThAF6c1hfDUADCIc95Aetpaihga4X_MsH00OdEP1_A71pCzZH-Vd4WsNHYYcf-r6UKRfd5Hpg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-26 18:28:38,220:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2023-11-26 18:28:38,221:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 26 Nov 2023 17:28:36 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796091136 Replay-Nonce: SFMYLIQj4ktQDc06xhWqhhsY1BRfaPZva0hOspjn3jMWMVrN6RQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:43Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066646896" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796091136" } 2023-11-26 18:28:38,221:DEBUG:acme.client:Storing nonce: SFMYLIQj4ktQDc06xhWqhhsY1BRfaPZva0hOspjn3jMWMVrN6RQ 2023-11-26 18:28:38,222:DEBUG:acme.client:JWS payload: b'' 2023-11-26 18:28:38,227:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066646896: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWo0a3RRRGMwNnhoV3FoaHNZMUJSZmFQWnZhMGhPc3BqbjNqTVdNVnJONlJRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2NDY4OTYifQ", "signature": "lu7KCM6CVcsn1hp0CXQ8HkzuF2jrfSoM6nRUyQd30H_wM23QN8mj053TrYGbQ_TPMO-JoIw_OZ_dBUKeQwnNxWWM-f0cbIijDnOmrLx2Gd9EklvwJOz3hCd-uu2qZU-3J-_UAJssnT_1l2ovoAGL4eHEDelr2gZx5FB8Cm2vbzNwhpW3uXJN9lRgQgG8J6rKP9YtsuRl-o7lBs5LWvylw01oZbbCrF7QnuYtTfZLMzxa1PRopPL2arN7UpQONpxhVK78W35AR4nxcjRiHYxcL1wf-QoBdYplCKEGewu7OEGtU59EWIX_bIAT0bSaLppKhC8d-wWSyKItyZ_lbra6jQ", "payload": "" } 2023-11-26 18:28:38,413:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066646896 HTTP/1.1" 200 809 2023-11-26 18:28:38,413:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:28:36 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjAoiKpaZ7d2M0FFa5TZxE2Eq7Ctn1gZCNqLyDaMjBu0k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:43Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066646896/juW_-A", "token": "CWWUm3uLuT3l53wpiS92M-Qv-NaCbupUBW732wE0vd8" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066646896/EWbN0Q", "token": "CWWUm3uLuT3l53wpiS92M-Qv-NaCbupUBW732wE0vd8" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066646896/0CyP5g", "token": "CWWUm3uLuT3l53wpiS92M-Qv-NaCbupUBW732wE0vd8" } ] } 2023-11-26 18:28:38,413:DEBUG:acme.client:Storing nonce: SFMYLIQjAoiKpaZ7d2M0FFa5TZxE2Eq7Ctn1gZCNqLyDaMjBu0k 2023-11-26 18:28:38,414:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-26 18:28:38,414:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2023-11-26 18:28:38,415:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-26 18:28:38,415:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-26 18:28:38,416:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-26 18:28:38,416:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-26 18:28:38,416:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-26 18:28:38,417:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-26 18:28:38,418:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-26 18:28:38,467:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-26 18:28:38,874:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-26 18:28:38,876:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-26 18:28:38,876:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-26 18:28:38,881:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:41 UTC. 2023-11-26 18:28:38,881:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-26 18:28:38,881:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-26 18:28:38,886:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-26 18:28:38,886:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-26 18:28:38,886:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-26 18:28:38,890:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-26 18:28:38,891:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-26 18:28:38,893:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-26 18:28:39,413:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-26 18:28:39,413:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:28:37 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "2WN6uYJhs8k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-26 18:28:39,414:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-26 18:28:43,214:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7096_key-certbot.pem 2023-11-26 18:28:46,922:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7094_csr-certbot.pem 2023-11-26 18:28:46,922:DEBUG:acme.client:Requesting fresh nonce 2023-11-26 18:28:46,923:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-26 18:28:47,097:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-26 18:28:47,098:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:28:45 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjGok9FLGrf7EKOHL12Hwbhtr3ePt7Xf8sog5nqk0cFaw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-26 18:28:47,098:DEBUG:acme.client:Storing nonce: SFMYLIQjGok9FLGrf7EKOHL12Hwbhtr3ePt7Xf8sog5nqk0cFaw 2023-11-26 18:28:47,098:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2023-11-26 18:28:47,104:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpHb2s5RkxHcmY3RUtPSEwxMkh3Ymh0cjNlUHQ3WGY4c29nNW5xazBjRmF3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "uLF_M0-xu4RJsWyRHqMaVrKikej9XvozPoBP7UjWKMzYrARb7vsI3MrnMnHp7-y02oRoHB6MbXOnoBrFquni1QWozODiRQrLO8uzcJZfj10SNFiRXE6tt7Gb_dI996M2gEA0Ezzo-oN22vqRnj2wpUnf2c57QmnTMtqrJktsYWI6iDelQ51anNfxhoyLl_jQ-D8jp35tK7s8Lg8n5_XRStVQ0UuPifyKFlFc8FrznkjbPKKlzune5A3P-0cWxN3fuHa237cMu8cRC9aS9tTvlVZP5L0E5q02F4Uw3Elm6piPJOoEpvDM-Sb8zw5REP61UVRSPeAdXPWMVf33A46vgw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-26 18:28:47,295:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2023-11-26 18:28:47,296:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 26 Nov 2023 17:28:45 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796108646 Replay-Nonce: jXyutbsnDIPZ-IH_Md08cNn1L_xovLvbZY6jcmUYx-K8rK2uoj8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:52Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066669286" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796108646" } 2023-11-26 18:28:47,296:DEBUG:acme.client:Storing nonce: jXyutbsnDIPZ-IH_Md08cNn1L_xovLvbZY6jcmUYx-K8rK2uoj8 2023-11-26 18:28:47,296:DEBUG:acme.client:JWS payload: b'' 2023-11-26 18:28:47,302:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066669286: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25ESVBaLUlIX01kMDhjTm4xTF94b3ZMdmJaWTZqY21VWXgtSzhySzJ1b2o4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2NjkyODYifQ", "signature": "o648BN7xZEMm2fu6pssxbCaB5uEd95q2_cJUAMV8OZ1NDhWrd3U1zidRPBmPUbeqnuKFdQOPPe4ocrGZYIPIasM_TUkTONDB7w0efPrsuHedIFRIdvlR6ZYmRjgmJOSx2K-ZWSDfZ4dZGJNqc6ZrEGJvApflfsWS_k0Kti_UHgH__pyHR-66miOwoDJ3Qawm5VSmu6TaI2mOWfA9ACwJysVeJtj7IoFISIU2bxvF-Uq3egYvpLD6i8IzMyduCA_mYGTStktzrYyaxYtTfcZm3j_2-IJ6JIvjJASNq9Du4zbx0KW6wOkKcTykarI3qtIpmk8JxDywPR4J3nFMFFGk0Q", "payload": "" } 2023-11-26 18:28:47,477:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066669286 HTTP/1.1" 200 806 2023-11-26 18:28:47,478:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:28:45 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjS0v4xzWF4dKIpbPBK8sFf2V1JbrM4TZgD6OYXZaik3Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:52Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066669286/DZCB_w", "token": "FOLQeQhM5d7jUf4G9Qq1v4w7kH45foXttXys0ZoHmyY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066669286/3LwN7g", "token": "FOLQeQhM5d7jUf4G9Qq1v4w7kH45foXttXys0ZoHmyY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066669286/N8DWOw", "token": "FOLQeQhM5d7jUf4G9Qq1v4w7kH45foXttXys0ZoHmyY" } ] } 2023-11-26 18:28:47,478:DEBUG:acme.client:Storing nonce: SFMYLIQjS0v4xzWF4dKIpbPBK8sFf2V1JbrM4TZgD6OYXZaik3Q 2023-11-26 18:28:47,479:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-26 18:28:47,479:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2023-11-26 18:28:47,480:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-26 18:28:47,480:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-26 18:28:47,481:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-26 18:28:47,481:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-26 18:28:47,481:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-26 18:28:47,481:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-26 18:28:47,483:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-26 18:28:47,534:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2023-11-26 18:28:47,534:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-26 18:28:47,535:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2023-11-26 18:28:47,547:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2023-11-26 18:28:47,550:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2023-11-26 18:28:47,550:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2023-11-26 18:28:47,550:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2023-11-26 18:28:47,551:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2023-11-26 18:28:47,552:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2023-11-26 18:28:47,590:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-26 18:28:47,824:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-26 18:28:47,826:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-26 18:28:47,826:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-26 18:28:47,830:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:56 UTC. 2023-11-26 18:28:47,831:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-26 18:28:47,831:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-26 18:28:47,836:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-26 18:28:47,836:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-26 18:28:47,836:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-26 18:28:47,840:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-26 18:28:47,841:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-26 18:28:47,843:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-26 18:28:48,291:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-26 18:28:48,292:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:28:46 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "crb8aof6sew": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-26 18:28:48,292:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-26 18:28:52,373:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7097_key-certbot.pem 2023-11-26 18:28:56,036:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7095_csr-certbot.pem 2023-11-26 18:28:56,036:DEBUG:acme.client:Requesting fresh nonce 2023-11-26 18:28:56,036:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-26 18:28:56,186:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-26 18:28:56,187:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:28:54 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiA0h1JCEgkvsfUR-Wtlx7JiUQV9nQT4CqFVHfAcSySIk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-26 18:28:56,187:DEBUG:acme.client:Storing nonce: v0bMowfiA0h1JCEgkvsfUR-Wtlx7JiUQV9nQT4CqFVHfAcSySIk 2023-11-26 18:28:56,187:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2023-11-26 18:28:56,192:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlBMGgxSkNFZ2t2c2ZVUi1XdGx4N0ppVVFWOW5RVDRDcUZWSGZBY1N5U0lrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "jKgoNEWvI0Y_dQxUrk4MMVH3QnOJt79YwHpc4aFEuVlF9R5OXmk4eLOnufGYtxuhoFZ7xgX5pkqkitVw41ush0-0XbqbZ5VKfCgglHxgkia09F9hmTH2ie-Tm7oudMT9rMHXzXooqugrCQ-vG6pq9RYpAQ7P4N4TXgXrgqGWroQ86HkdmjIOmQ8BBjalewqbydOGm5PM9p9ORkviHqUTK0wlg9cylX3uhXTwqkG1SQtf4u2diMbwsg6x518SWu7LcxrRpEY2OVz4MaZPlj3m3bruCywaTczyKLlUqimoz5xBoXwYvF-rIVpH71r2nT0TtTZcIQigJArXjzDOHM-tZA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-26 18:28:56,434:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2023-11-26 18:28:56,435:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 26 Nov 2023 17:28:54 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796125916 Replay-Nonce: v0bMowfiQ984sJB05dodDWc_pFQja2q21yqVynwDgPKhj343jP8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:00Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066692866" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796125916" } 2023-11-26 18:28:56,435:DEBUG:acme.client:Storing nonce: v0bMowfiQ984sJB05dodDWc_pFQja2q21yqVynwDgPKhj343jP8 2023-11-26 18:28:56,435:DEBUG:acme.client:JWS payload: b'' 2023-11-26 18:28:56,441:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066692866: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlROTg0c0pCMDVkb2REV2NfcEZRamEycTIxeXFWeW53RGdQS2hqMzQzalA4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2OTI4NjYifQ", "signature": "Ttrkd7ZL3cAcjHYmmi0VuY03Manp9WRwo3MZHXz6LdlfDjenVIij76NjwgenbPth7G1_YB4GmxiamB_N7H6rocEw91EQxInl0nVu2ErQGJsCqI9r2ILkuVy6kiHrBHJQ-_0X7i7til-Ep28Tnlf7OiK6JPOZ60St5U16DAFVE8qz9gXq4XuoomOJMi3W1QRD1IZZBrxEHC9mmS4jICmaCaIYhkSKIbN8thSPiAkSP4wsa9dB9EzXpNjjs0M_fWqpiL74GBFxU_NUc0eOAxgqD1NyQjS9rNW1awKm2xjhhNSYIzzry_9qdoH0xZ7pX4DolnsjmMxrd6lt9FwSWyYjAg", "payload": "" } 2023-11-26 18:28:56,608:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066692866 HTTP/1.1" 200 811 2023-11-26 18:28:56,609:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:28:54 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiKs6m_tIllf8Ax7sdfrwGabjzStLCkoNTdThF4LDwbr8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:00Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066692866/TZHJ0A", "token": "otJKkgRT8z2VOaRDiAmAclIadkc79VXFNmsAESfM3y0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066692866/YBeUJQ", "token": "otJKkgRT8z2VOaRDiAmAclIadkc79VXFNmsAESfM3y0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066692866/i1p7PQ", "token": "otJKkgRT8z2VOaRDiAmAclIadkc79VXFNmsAESfM3y0" } ] } 2023-11-26 18:28:56,609:DEBUG:acme.client:Storing nonce: v0bMowfiKs6m_tIllf8Ax7sdfrwGabjzStLCkoNTdThF4LDwbr8 2023-11-26 18:28:56,609:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-26 18:28:56,610:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2023-11-26 18:28:56,610:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-26 18:28:56,611:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-26 18:28:56,611:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-26 18:28:56,612:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-26 18:28:56,612:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-26 18:28:56,612:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-26 18:28:56,613:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-26 18:28:56,662:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-26 18:28:56,889:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-26 18:28:56,890:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-26 18:28:56,891:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-26 18:28:56,895:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:09 UTC. 2023-11-26 18:28:56,895:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-26 18:28:56,896:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-26 18:28:56,900:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-26 18:28:56,901:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-26 18:28:56,901:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-26 18:28:56,905:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-26 18:28:56,906:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-26 18:28:56,908:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-26 18:28:57,430:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-26 18:28:57,430:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:28:55 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "FvRCyzlVPiU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-26 18:28:57,431:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-26 18:29:01,212:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7098_key-certbot.pem 2023-11-26 18:29:04,894:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7096_csr-certbot.pem 2023-11-26 18:29:04,894:DEBUG:acme.client:Requesting fresh nonce 2023-11-26 18:29:04,894:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-26 18:29:05,072:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-26 18:29:05,072:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:29:03 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnvJpOiHRJVngt9nAv1_XXXM-MQovBj7RzdQC4ySopK_k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-26 18:29:05,073:DEBUG:acme.client:Storing nonce: jXyutbsnvJpOiHRJVngt9nAv1_XXXM-MQovBj7RzdQC4ySopK_k 2023-11-26 18:29:05,073:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2023-11-26 18:29:05,079:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic252SnBPaUhSSlZuZ3Q5bkF2MV9YWFhNLU1Rb3ZCajdSemRRQzR5U29wS19rIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "vpF6dht5sWFgZP6ZMZDRzMJLpF1S1NuBa8FXC-hYZMCm0F5u1oS2pqttakJ5BPZaj8NS8o38M6Ulex-k5ot8ulAyu01-jghGHGtrnWOSrGWstgg9wOWHHBMjUmJuWw7VehqYFqw7HzORW9ZgngLo8ePMN8vUi5876GtiMf7cjKV2hwBGZYPNwKTEL2_OWr8mpMes7iYRR5AmDR1o_eBnzoH5WDZ4zO2XeeWK-uls9_lysgIkggjUurUh4SxU7PnBGLPYQUgwCVaN8-gZoV_971TiUH2fiIuqRWW9sGc54msnvws3O-TzPAiYMXAFuwfI6eQ3YmtN4wyINCatc23ihQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-26 18:29:05,280:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2023-11-26 18:29:05,281:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 26 Nov 2023 17:29:03 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796165656 Replay-Nonce: jXyutbsnWCHUbq7uignhBAIqZQ1TfFKMcQSGeAWpnbABlQ4i150 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:08Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066738016" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796165656" } 2023-11-26 18:29:05,281:DEBUG:acme.client:Storing nonce: jXyutbsnWCHUbq7uignhBAIqZQ1TfFKMcQSGeAWpnbABlQ4i150 2023-11-26 18:29:05,281:DEBUG:acme.client:JWS payload: b'' 2023-11-26 18:29:05,287:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066738016: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25XQ0hVYnE3dWlnbmhCQUlxWlExVGZGS01jUVNHZUFXcG5iQUJsUTRpMTUwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY3MzgwMTYifQ", "signature": "dLGnax7yrt_OsZ79WaFA8VgmXK60SCa33u73voXx_I-kySRE-EXrqHvYq7NlXWZ9AXOuXp8N86aLKKfJI4D9V9Geme9qi4DifoPHGM0_QjzZW6AEKTU0oBFgxFDhjHYkF_SDrzQTzohK3eTQ5IEWZujF8WVoUiuN3LuHagwI5WghV3Uht6LigMb_jWk5-03PBOOu3SzqccKazRgFodQph95XfVwRNEOlVKsXeWZTbYJYpxHsd8qrG1q2gv8ZaRwSRXqMLaFjIN0vMLB-Adi33v6DuFMcw1v0PVF2ffmyDy7S61SKPov2jBshS5XKvvb0DoZaeEhtCf-5TOPCbJmIog", "payload": "" } 2023-11-26 18:29:05,465:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066738016 HTTP/1.1" 200 810 2023-11-26 18:29:05,466:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:29:03 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQj3mfGOVMLGp7KJh9jWmbrcobVRFcqopCgnyORXUPaM7Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:08Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066738016/ypE5ag", "token": "6TDiXsqmeP1Jr6MAv3ggvn4O3hX5INT6PvOa_y3w6tM" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066738016/HUvErQ", "token": "6TDiXsqmeP1Jr6MAv3ggvn4O3hX5INT6PvOa_y3w6tM" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066738016/nzokTQ", "token": "6TDiXsqmeP1Jr6MAv3ggvn4O3hX5INT6PvOa_y3w6tM" } ] } 2023-11-26 18:29:05,466:DEBUG:acme.client:Storing nonce: SFMYLIQj3mfGOVMLGp7KJh9jWmbrcobVRFcqopCgnyORXUPaM7Y 2023-11-26 18:29:05,466:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-26 18:29:05,466:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2023-11-26 18:29:05,466:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-26 18:29:05,467:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-26 18:29:05,467:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-26 18:29:05,468:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-26 18:29:05,468:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-26 18:29:05,468:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-26 18:29:05,469:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-26 18:29:05,506:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-26 18:29:06,485:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-26 18:29:06,486:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2023-11-26 18:29:06,487:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2023-11-26 18:29:06,491:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:22 UTC. 2023-11-26 18:29:06,492:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-26 18:29:06,492:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-26 18:29:06,496:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-26 18:29:06,496:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-26 18:29:06,496:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-26 18:29:06,501:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-26 18:29:06,501:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-26 18:29:06,503:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-26 18:29:07,035:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-26 18:29:07,036:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:29:05 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "-izNi_G0ul4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-26 18:29:07,037:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-26 18:29:10,847:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7099_key-certbot.pem 2023-11-26 18:29:14,504:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7097_csr-certbot.pem 2023-11-26 18:29:14,504:DEBUG:acme.client:Requesting fresh nonce 2023-11-26 18:29:14,504:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-26 18:29:14,682:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-26 18:29:14,683:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:29:12 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjTD3G3sTBLN_TouA96988znKcHJy1ZZPX1Sk6wFpGtAs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-26 18:29:14,683:DEBUG:acme.client:Storing nonce: SFMYLIQjTD3G3sTBLN_TouA96988znKcHJy1ZZPX1Sk6wFpGtAs 2023-11-26 18:29:14,683:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2023-11-26 18:29:14,689:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpURDNHM3NUQkxOX1RvdUE5Njk4OHpuS2NISnkxWlpQWDFTazZ3RnBHdEFzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ghgFX_GNcWEoCjDUwdrLg4aqMTZH6psIqZvQJ3gbJT9S0f_rUSK60zt4P69KLEkMChaeG44GlTRJ5Ey9_yPR6KLT0ck25Gq8mUacm_zUXt1rXdmy2DIUc_DN21UOqqZTC-p_7wUCrTtkydLIqwTEjC7Q-tZh0SdTS_cMvzsQ-fee_Upf6JXLQl-MitMgMea30mIvMd6RjZCOoO7khynyupM8wLNShK7NMlLlh5EODSICHjJzJlmQm4T8bBZgFplE2i89rKzg6lHEFqE5D0FnvNxdSlbMpa8uE1f44du-_SxY28GpRxiuxUW0Q9C8NqT5-Wadn0hPEJs5eJC3U5ilkw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-26 18:29:14,884:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2023-11-26 18:29:14,884:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 26 Nov 2023 17:29:12 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796190496 Replay-Nonce: SFMYLIQjk0_PwSuFIZKwtP3M-VK1gzrgW9pHXEDI2U35eIYRlH4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:17Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066771416" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796190496" } 2023-11-26 18:29:14,885:DEBUG:acme.client:Storing nonce: SFMYLIQjk0_PwSuFIZKwtP3M-VK1gzrgW9pHXEDI2U35eIYRlH4 2023-11-26 18:29:14,885:DEBUG:acme.client:JWS payload: b'' 2023-11-26 18:29:14,890:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066771416: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWprMF9Qd1N1RklaS3d0UDNNLVZLMWd6cmdXOXBIWEVESTJVMzVlSVlSbEg0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY3NzE0MTYifQ", "signature": "osac6KH43D-wbBVVc0YwToUZfH0b_PzjUiASk2siqdEx9nyhHpXJtXHnXb0hrU7JXDJZ88TUznURws0KMmzOgmwAj-V2BTWa_Xlbd2qJbAsLTaorzmv_S5FsLWcYoHXYOrZRf3BbB-YEImmDJeAIcbslrZXlUMy19fftCCZgWSpRMwK5eXN9oLm5ujR4eFvB7XmBUq0YrgWgFCszy_kAcB80JM-BPFNtZ5HAC-jT3RxcoAsj1oJoErljAKommidH2kqZHOEXbnE-JxQ1AbUBkMLuM5L50ab139CUETnB_wSuPtFXu2ebJJtC86Q07EFmrwdLeAjVIbTVgbT_vMrh4Q", "payload": "" } 2023-11-26 18:29:15,070:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066771416 HTTP/1.1" 200 809 2023-11-26 18:29:15,071:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:29:13 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnx3vIg4Ud5uFJ68GjTa_PVizmBFEOQVquDkiH7SFi_2A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:17Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066771416/1qhCuQ", "token": "cVVMxW9zwT-iEFrTBcAWPKCXYKiDFVXWvmhWDvf--Y4" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066771416/isn6Gw", "token": "cVVMxW9zwT-iEFrTBcAWPKCXYKiDFVXWvmhWDvf--Y4" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066771416/lLjJ0A", "token": "cVVMxW9zwT-iEFrTBcAWPKCXYKiDFVXWvmhWDvf--Y4" } ] } 2023-11-26 18:29:15,071:DEBUG:acme.client:Storing nonce: jXyutbsnx3vIg4Ud5uFJ68GjTa_PVizmBFEOQVquDkiH7SFi_2A 2023-11-26 18:29:15,071:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-26 18:29:15,072:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2023-11-26 18:29:15,072:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-26 18:29:15,073:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-26 18:29:15,073:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-26 18:29:15,073:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-26 18:29:15,074:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-26 18:29:15,074:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-26 18:29:15,075:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-26 18:29:15,113:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-26 18:29:15,532:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-26 18:29:15,533:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2023-11-26 18:29:15,534:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2023-11-26 18:29:15,538:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:34 UTC. 2023-11-26 18:29:15,538:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-26 18:29:15,539:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-26 18:29:15,544:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-26 18:29:15,544:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-26 18:29:15,544:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-26 18:29:15,549:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-26 18:29:15,550:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-26 18:29:15,552:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-26 18:29:16,002:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-26 18:29:16,002:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:29:14 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "9MaVCizQiOw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-26 18:29:16,003:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-26 18:29:21,016:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7100_key-certbot.pem 2023-11-26 18:29:24,882:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7098_csr-certbot.pem 2023-11-26 18:29:24,883:DEBUG:acme.client:Requesting fresh nonce 2023-11-26 18:29:24,883:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-26 18:29:25,033:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-26 18:29:25,034:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:29:23 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8qbA6ClhXSvHcmQu69kwLG7kfdaMwUsZOVwS8pb4liHA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-26 18:29:25,034:DEBUG:acme.client:Storing nonce: nbWKegf8qbA6ClhXSvHcmQu69kwLG7kfdaMwUsZOVwS8pb4liHA 2023-11-26 18:29:25,034:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2023-11-26 18:29:25,040:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhxYkE2Q2xoWFN2SGNtUXU2OWt3TEc3a2ZkYU13VXNaT1Z3UzhwYjRsaUhBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Oux-a9BxSYMn0501Eh5s8lB8gOOjkiwy2lTHMd66oDZr9kq9kLBDbT0N2RG1Ts6yX5c5NihuklJDjU2uuYP8r9JTIWny_45QfzBBDk9PRLbz2TMsLb1TknkcbfXzy3cJZFVJEyDCkSHkkW0-3GUrCJ80xIlAOTK9inLTf70SX2E_Hp77B_GJyLfr4LC97E-vPqJiSsNsMa5Czm43VxFrtBcnzlrpVnqSstaZa8ESdbLU_P9tCvYRzhLM818XIsvF1_cNPt9HOa5P8wASKOCTM6zplwYeqSIsGV1Jsh82NxCpwqBfrbiQakdSeFvcPTcyhlD57cpvR3VTV72-gmj5gg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-26 18:29:25,222:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-26 18:29:25,223:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 26 Nov 2023 17:29:23 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796210686 Replay-Nonce: nbWKegf8iHRsObG8c-x5Z5q4_hyf3JTn2nEd63R-W4QkwO89d3o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:25Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066800166" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796210686" } 2023-11-26 18:29:25,223:DEBUG:acme.client:Storing nonce: nbWKegf8iHRsObG8c-x5Z5q4_hyf3JTn2nEd63R-W4QkwO89d3o 2023-11-26 18:29:25,223:DEBUG:acme.client:JWS payload: b'' 2023-11-26 18:29:25,229:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066800166: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhpSFJzT2JHOGMteDVaNXE0X2h5ZjNKVG4ybkVkNjNSLVc0UWt3Tzg5ZDNvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY4MDAxNjYifQ", "signature": "TT1X5-QSi5uwrnMp7r09U0wPZhx3VeHofA1XnhyRci1WDqICibqTbi9HcynoIKBv6nBp26dCviwZVhK4DfQI8ENmKcj5PFIYzffZDm3BKumuY1CjsMpizhKtlfePxWEG0X6QNSqExKR8MCylVrP-bzVDtuO-PAYeSFAUEVNW03LW0aQjudb0Yvo4HBw1IyX3RMEW_J6kx9iKidgv8p5p1Mml4OhGaexJ9VwGtZC05I_Gb34K-wwWiTQO2Gk_iohfhw2Dy48PjYiMq0To1FTC2gyeBFpnTlj7Ktk3hAkXl_waapGqwErmn6fqRwHQxJLAiPpIFGQNtz9b7CbXoxlNtQ", "payload": "" } 2023-11-26 18:29:25,384:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066800166 HTTP/1.1" 200 805 2023-11-26 18:29:25,384:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:29:23 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfigM7fDuFwmcKVkWd2HTzt0O1Ktn71upRoSkf3Ca988sE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:25Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066800166/zXEJ0Q", "token": "chax4aVJRBAwxdLyEKOihE2bmz-XL8HJpzNL8ytpyn8" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066800166/b777tA", "token": "chax4aVJRBAwxdLyEKOihE2bmz-XL8HJpzNL8ytpyn8" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066800166/Gd6Xnw", "token": "chax4aVJRBAwxdLyEKOihE2bmz-XL8HJpzNL8ytpyn8" } ] } 2023-11-26 18:29:25,385:DEBUG:acme.client:Storing nonce: v0bMowfigM7fDuFwmcKVkWd2HTzt0O1Ktn71upRoSkf3Ca988sE 2023-11-26 18:29:25,385:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-26 18:29:25,385:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2023-11-26 18:29:25,386:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-26 18:29:25,386:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-26 18:29:25,387:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-26 18:29:25,387:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-26 18:29:25,387:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-26 18:29:25,388:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-26 18:29:25,389:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-26 18:29:25,438:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-26 18:29:25,693:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-26 18:29:25,694:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-26 18:29:25,694:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-26 18:29:25,698:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:48 UTC. 2023-11-26 18:29:25,699:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-26 18:29:25,699:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-26 18:29:25,704:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-26 18:29:25,704:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-26 18:29:25,704:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-26 18:29:25,708:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-26 18:29:25,709:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-26 18:29:25,711:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-26 18:29:26,233:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-26 18:29:26,234:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:29:24 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "WIc3Ov3SS1I": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-26 18:29:26,234:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-26 18:29:30,416:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7101_key-certbot.pem 2023-11-26 18:29:34,089:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7099_csr-certbot.pem 2023-11-26 18:29:34,090:DEBUG:acme.client:Requesting fresh nonce 2023-11-26 18:29:34,090:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-26 18:29:34,264:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-26 18:29:34,264:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:29:32 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjd9YUp8NBnDr8zYQ7vUhTW-zozwYEmqrFl0GFGLV-2vo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-26 18:29:34,265:DEBUG:acme.client:Storing nonce: SFMYLIQjd9YUp8NBnDr8zYQ7vUhTW-zozwYEmqrFl0GFGLV-2vo 2023-11-26 18:29:34,265:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2023-11-26 18:29:34,272:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpkOVlVcDhOQm5Ecjh6WVE3dlVoVFctem96d1lFbXFyRmwwR0ZHTFYtMnZvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "mobnip3CuHBaf9LIR8-vpohaAik4IZfln74sJZ6UkW_DpJbaZJjU1HhdRZZR2CTzgUVCLJec7THRPq9SLKAwbH6AqA6cgttYC1K4l_PVjTnI6PbWJNWKAuJsv8hFms8spUqLxKjwvvOkELcTP28NjmsK_QeAQHUkN4QTI6SAfbH_JmAEGxsG9e0bW5v2KP9wJrpTJOSmfI8GYVDpgg-NGs0fE1KiQvtTA-pqYLSAdOFqNi9q9KnR3D2OF6DpSNR9WQL3mmZbmHC7a2WxLCW4dTf06vMUyicQBvte5YtI1ZTmPUJ-UXfJg2gBuK12JxkxdW0e0Hqde7eYCB2KUnyXKw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-26 18:29:34,476:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-26 18:29:34,476:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 26 Nov 2023 17:29:32 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796230126 Replay-Nonce: jXyutbsnMAqPI9INHS_RQFLWh9EMygO57m4GMxnFMiQcmgNgrXM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:34Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066828686" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796230126" } 2023-11-26 18:29:34,476:DEBUG:acme.client:Storing nonce: jXyutbsnMAqPI9INHS_RQFLWh9EMygO57m4GMxnFMiQcmgNgrXM 2023-11-26 18:29:34,477:DEBUG:acme.client:JWS payload: b'' 2023-11-26 18:29:34,482:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066828686: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25NQXFQSTlJTkhTX1JRRkxXaDlFTXlnTzU3bTRHTXhuRk1pUWNtZ05nclhNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY4Mjg2ODYifQ", "signature": "YPnO1ftgUgwOZAq2mAb9eHRunyw4GrF-gSo-IqyhMJwjhkPQwmzbecIU3E33nD82Oemgp_Kp2wWq_-VH222fQx9aCo0SMllcX0rOHCrzK0Xb2kVbx3VxnWnqco98VWV7ZSEHZsiUd2SHN96GAGYyLBLTzHCwHd_RoTVS28Cufe2BSxs1zO2RVPi1f1Fr1Q65yXKhxkgw6JgAmf5q3hR02uf5WhGhiNTfUgWl6jqCnMk1UnZglvTy_fJgt4kdn5b9XtbEsHiDfNlpFXEMcBq81PhoQGVf2uZtevUCkzH5Vfj3Os7FaYYKiLCoT3WSuWR-A4HytAAWMz25GW3I9vk0lA", "payload": "" } 2023-11-26 18:29:34,659:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066828686 HTTP/1.1" 200 805 2023-11-26 18:29:34,660:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:29:32 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjOTXVL--3xkcr5gVy4KqLmI8t7HlPJBNucxT1i9eezSU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:34Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066828686/TFIwLw", "token": "kAlE0kR-pqo9F_UYGQCvSB7TRTjOLQiZBJq_dZ7iFHs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066828686/se4r1w", "token": "kAlE0kR-pqo9F_UYGQCvSB7TRTjOLQiZBJq_dZ7iFHs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066828686/Hc2_wQ", "token": "kAlE0kR-pqo9F_UYGQCvSB7TRTjOLQiZBJq_dZ7iFHs" } ] } 2023-11-26 18:29:34,660:DEBUG:acme.client:Storing nonce: SFMYLIQjOTXVL--3xkcr5gVy4KqLmI8t7HlPJBNucxT1i9eezSU 2023-11-26 18:29:34,660:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-26 18:29:34,661:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2023-11-26 18:29:34,661:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-26 18:29:34,662:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-26 18:29:34,662:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-26 18:29:34,663:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-26 18:29:34,663:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-26 18:29:34,663:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-26 18:29:34,664:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-26 18:29:34,711:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-26 18:29:35,114:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-26 18:29:35,115:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-26 18:29:35,116:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-26 18:29:35,120:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:31:01 UTC. 2023-11-26 18:29:35,121:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-26 18:29:35,121:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-26 18:29:35,132:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-26 18:29:35,132:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-26 18:29:35,133:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-26 18:29:35,138:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-26 18:29:35,139:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-26 18:29:35,141:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-26 18:29:35,659:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-26 18:29:35,660:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:29:33 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "GaFF0H_JIyk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-26 18:29:35,660:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-26 18:29:40,007:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7102_key-certbot.pem 2023-11-26 18:29:43,650:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7100_csr-certbot.pem 2023-11-26 18:29:43,651:DEBUG:acme.client:Requesting fresh nonce 2023-11-26 18:29:43,651:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-26 18:29:43,824:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-26 18:29:43,825:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:29:41 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQj6cCL3C0N_x4LJOfaWz3iFJv_DofO1lgww2UXcgRZXtk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-26 18:29:43,825:DEBUG:acme.client:Storing nonce: SFMYLIQj6cCL3C0N_x4LJOfaWz3iFJv_DofO1lgww2UXcgRZXtk 2023-11-26 18:29:43,825:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2023-11-26 18:29:43,831:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWo2Y0NMM0MwTl94NExKT2ZhV3ozaUZKdl9Eb2ZPMWxnd3cyVVhjZ1JaWHRrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "a2L7pfkaPEuFwiscwp-qRvxpVG9xYBQrUFRb5ZeT4X4FKoCPXJbIP4NlK94mwOSUHtDvmVdlOK8N2_MotTfa_l2PiqHvwRyCJi5xFalwrwjRBpENpL9J_7AJWCnhiydUHPLu3NGo8jNR_a6FccU_GwgHIVGQD7qpBByrSPHhOEipVi6DhK2r_Hc2iNlU6g_agR48geM04K1Bh5wtAItfE5mrCc35bGYb-UKnYnQay_istyXzdEBREgXW2mI6t6pV4gvefRRaQP8X8d4z17lJ6nKtIW4GmiYajLDhbOkwgNID84le3V56g4MWI5L-pDUnPssvbXHqKJ6v25MKUxIdMg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-26 18:29:44,021:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-26 18:29:44,021:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 26 Nov 2023 17:29:42 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796249816 Replay-Nonce: SFMYLIQjiQYBUePpeQaMghvJ2PzZO5O1RCCO5K5RUFaCk-LemhA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:42Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066858576" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796249816" } 2023-11-26 18:29:44,022:DEBUG:acme.client:Storing nonce: SFMYLIQjiQYBUePpeQaMghvJ2PzZO5O1RCCO5K5RUFaCk-LemhA 2023-11-26 18:29:44,022:DEBUG:acme.client:JWS payload: b'' 2023-11-26 18:29:44,028:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066858576: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWppUVlCVWVQcGVRYU1naHZKMlB6Wk81TzFSQ0NPNUs1UlVGYUNrLUxlbWhBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY4NTg1NzYifQ", "signature": "mgKhCz2_A1e2UZuHUXY5uaGfU7ck2nRQvVlPlp3l66L9K4hbujw4zwfHGh8qt1lRh_CjALN8p22Xf10sSu0RIDr2D3ZEWVYWO9CPzGgm-qZE7YI_-MB7ghWqKnYWbyC0V6j118HNeCcasFBcvBq9acvBomYI6ns1D_jeFLFXpd3sIHeLI95GQdQp-36Do6GSffJkgDlPmraArP8cYEZ-HI61VPrqRYfRXvL12rXeElf1od2unyzXT7h3sFWy_gam1rwZxlIEWErjIVYuSNDQKW1vALU9uG28jDecMBm-QZrFQxSc6qq_UK0f8zRFnjbU68K4aKt5Ag6r-NBhNGlWjA", "payload": "" } 2023-11-26 18:29:44,205:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066858576 HTTP/1.1" 200 805 2023-11-26 18:29:44,206:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 26 Nov 2023 17:29:42 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjN0A5F8kFZjmVNh2-Ux-w54YZKamrMHzIP-DBttMLuRs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:42Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066858576/p5HniQ", "token": "vgTEYICaF9gMErZyGxBr6V0KD9ZEoeesWVIQ8h9Ks48" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066858576/JwX8uw", "token": "vgTEYICaF9gMErZyGxBr6V0KD9ZEoeesWVIQ8h9Ks48" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066858576/_ogaVA", "token": "vgTEYICaF9gMErZyGxBr6V0KD9ZEoeesWVIQ8h9Ks48" } ] } 2023-11-26 18:29:44,206:DEBUG:acme.client:Storing nonce: SFMYLIQjN0A5F8kFZjmVNh2-Ux-w54YZKamrMHzIP-DBttMLuRs 2023-11-26 18:29:44,206:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-26 18:29:44,207:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2023-11-26 18:29:44,207:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-26 18:29:44,208:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-26 18:29:44,208:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-26 18:29:44,209:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-26 18:29:44,209:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-26 18:29:44,209:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-26 18:29:44,211:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-26 18:29:44,211:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2023-11-26 18:29:44,211:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2023-11-26 18:29:44,212:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2023-11-26 18:29:44,214:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)