2023-11-25 07:02:13,163:DEBUG:certbot._internal.main:certbot version: 1.6.0 2023-11-25 07:02:13,164:DEBUG:certbot._internal.main:Arguments: [] 2023-11-25 07:02:13,164:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2023-11-25 07:02:13,991:DEBUG:certbot._internal.log:Root logging level set at 20 2023-11-25 07:02:13,991:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2023-11-25 07:02:14,025:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2023-11-25 07:02:14,063:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-25 07:02:14,335:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-25 07:02:14,346:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is signed by the certificate's issuer. 2023-11-25 07:02:14,350:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is: OCSPCertStatus.GOOD 2023-11-25 07:02:14,357:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:23 UTC. 2023-11-25 07:02:14,358:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-25 07:02:14,358:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-25 07:02:14,363:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-25 07:02:14,363:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-25 07:02:14,363:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-25 07:02:14,369:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-25 07:02:14,370:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-25 07:02:14,372:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-25 07:02:14,903:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-25 07:02:14,904:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:02:14 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "dI37oxOtyzs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-25 07:02:14,904:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-25 07:02:19,879:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7051_key-certbot.pem 2023-11-25 07:02:24,099:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7049_csr-certbot.pem 2023-11-25 07:02:24,100:DEBUG:acme.client:Requesting fresh nonce 2023-11-25 07:02:24,100:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-25 07:02:24,273:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-25 07:02:24,274:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:02:23 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjxq4U4Ov0zIZSiIAWKcRZ_zNEcijPGXhOIO1RkKlTIKI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-25 07:02:24,274:DEBUG:acme.client:Storing nonce: SFMYLIQjxq4U4Ov0zIZSiIAWKcRZ_zNEcijPGXhOIO1RkKlTIKI 2023-11-25 07:02:24,274:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2023-11-25 07:02:24,281:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWp4cTRVNE92MHpJWlNpSUFXS2NSWl96TkVjaWpQR1hoT0lPMVJrS2xUSUtJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ym08XEQQkOa-f0ixMwvfp3XifSblexeXncIH9ocfYyOYiaxUxu7s-2QXQOCdLQAu12czdMOS3p8olng97NZpdrV0_XMU12WwHAxqoZ3NgJbV8y3RQmiFWGf2ve-5nGLEbUlBtTt7vdo9TJobOeCZXGIo_VVsrjyH1FJ2AVpIrl3cFq13y9bqlfx5QsSMcNZt1k08xk5kE8s0UnXBVg12EVM94p1atAoA216p0SGEu7JkHM8kK51k6N_09wpxjjJ7rd2RxprZgj05LIU82xAPjkRp5Dm8jJxbYCuC5mgh8RvORbUJxTjk2iiInEN7bGFpwwQZFiAQ48j3tos3P1QJRA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-25 07:02:24,599:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2023-11-25 07:02:24,600:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Nov 2023 06:02:23 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223795980256 Replay-Nonce: jXyutbsnuUPThxnsD7R7qWWRIpFqb34HD0bcyD0_j_Mn_EsqXoM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:00Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066491486" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223795980256" } 2023-11-25 07:02:24,600:DEBUG:acme.client:Storing nonce: jXyutbsnuUPThxnsD7R7qWWRIpFqb34HD0bcyD0_j_Mn_EsqXoM 2023-11-25 07:02:24,601:DEBUG:acme.client:JWS payload: b'' 2023-11-25 07:02:24,607:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066491486: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic251VVBUaHhuc0Q3UjdxV1dSSXBGcWIzNEhEMGJjeUQwX2pfTW5fRXNxWG9NIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY0OTE0ODYifQ", "signature": "wNoXDl9QZu0lGLrlGX1MSbt_q3IF3mVY3NI4sgr7XR3ZC36u6I3DU8NU-Si_BRdLD9iAai2uOCZzoTKeSZmCTqdK2XFP4hbeGABJiYJSg5Ai-zeBa8xF2CRtrbPVyLabsQDO_6Mts5vGuoLb-OtBIuf0SQ2sIrdq8cT38m6HiZqSXwBEQRG_wFqEWxFyqoSlsNof8uNESVlv4HrtTOIxVSL05S5tMQsFTiWD65PcJQxifIvpne7ZePhhFqLg-1kXwnB4Q6f0jCX7WVGGcQgzEX6wy7ekVbfMthL015N9ajyCRR6L5wPMeTek_phtzrpPUqsiHk-zpnRO_ikxOKg4Qg", "payload": "" } 2023-11-25 07:02:24,783:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066491486 HTTP/1.1" 200 810 2023-11-25 07:02:24,784:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:02:24 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnlvb284DVca7AuVQ0xW0vsjPggfzTUxIQD7fftVIwTto X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:00Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066491486/iZpoTw", "token": "sb15n-zcYGZjmBEw4udDUXuX-BTwRrUMF--2J3EM_48" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066491486/hLn7qQ", "token": "sb15n-zcYGZjmBEw4udDUXuX-BTwRrUMF--2J3EM_48" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066491486/g8UZBg", "token": "sb15n-zcYGZjmBEw4udDUXuX-BTwRrUMF--2J3EM_48" } ] } 2023-11-25 07:02:24,784:DEBUG:acme.client:Storing nonce: jXyutbsnlvb284DVca7AuVQ0xW0vsjPggfzTUxIQD7fftVIwTto 2023-11-25 07:02:24,784:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-25 07:02:24,784:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2023-11-25 07:02:24,784:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-25 07:02:24,785:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-25 07:02:24,788:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-25 07:02:24,788:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-25 07:02:24,788:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-25 07:02:24,788:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-25 07:02:24,793:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-25 07:02:24,831:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-25 07:02:25,215:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-25 07:02:25,216:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-25 07:02:25,217:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-25 07:02:25,221:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:36 UTC. 2023-11-25 07:02:25,221:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-25 07:02:25,222:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-25 07:02:25,227:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-25 07:02:25,227:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-25 07:02:25,227:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-25 07:02:25,231:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-25 07:02:25,232:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-25 07:02:25,234:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-25 07:02:25,691:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-25 07:02:25,691:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:02:25 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "qhaWxS2ttzM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-25 07:02:25,692:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-25 07:02:29,378:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7052_key-certbot.pem 2023-11-25 07:02:32,900:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7050_csr-certbot.pem 2023-11-25 07:02:32,900:DEBUG:acme.client:Requesting fresh nonce 2023-11-25 07:02:32,901:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-25 07:02:33,054:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-25 07:02:33,054:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:02:32 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiFLPpl9uC7ETQIZZ8CoVD10w64LyaHFY8El3qNiJ1pDc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-25 07:02:33,055:DEBUG:acme.client:Storing nonce: v0bMowfiFLPpl9uC7ETQIZZ8CoVD10w64LyaHFY8El3qNiJ1pDc 2023-11-25 07:02:33,055:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2023-11-25 07:02:33,060:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlGTFBwbDl1QzdFVFFJWlo4Q29WRDEwdzY0THlhSEZZOEVsM3FOaUoxcERjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "k4_g54Rbf91-FOIxDfexC6fVOptm_tvcusgiNQv1PPZZbUqByMk_jVUFfH7uJr-qZLmVvw_hx3FdZXV9AMM5rmvBhvedCs6HrlQkkQGy6iGh2huNpMcD7c2fy99jmO1sbKlnIlcapmfFGsFMPx5Jh5SH2v2KdFS1Grje2W6hKPtR8NR9cOEBDU3NCRjeMK2F1IpcshQvIGmX87psukJiLQxsGiZXAoVQfh1EVH5648aJYb52mF2dT3fd7-LsNpGoRYvoy0aiNZiFFHz1v5p-KMhToJrZRl7UKKfQyYHvhnbtDsRT8inoKmPMnawlU8IA6xlkYNgGuO4Ju11vdekbKg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-25 07:02:33,247:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2023-11-25 07:02:33,248:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Nov 2023 06:02:32 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796010606 Replay-Nonce: v0bMowfiE84zNt2yjaSAZlOOZZCZl1wLb0HvET9lg9IDbFnUDv8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:09Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066531206" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796010606" } 2023-11-25 07:02:33,248:DEBUG:acme.client:Storing nonce: v0bMowfiE84zNt2yjaSAZlOOZZCZl1wLb0HvET9lg9IDbFnUDv8 2023-11-25 07:02:33,248:DEBUG:acme.client:JWS payload: b'' 2023-11-25 07:02:33,254:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066531206: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlFODR6TnQyeWphU0FabE9PWlpDWmwxd0xiMEh2RVQ5bGc5SURiRm5VRHY4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY1MzEyMDYifQ", "signature": "m7fY1nunglmyR5hFe5DzsAj-LHSZrxi8PWjuJOx19ZuiW3sK6w2c48hCFmPKuH1g3o7QcbnJfWl9DToeg37dy3GO0raRkMNW-nPak0_VCgKX3H8V8VLWgPpVmjNgDaRG6ONB8P99xzfFonJiJWof9bYM3PODJWBoBAnGEzGDFgvqHH3Sxi2mdbkaDFhMKLt0yhvZ_M57mYuCyUHghDtRYYYI9UwUdQmREGPbI8uujgDsqsDHQ-nXcZNib2-UTrYgy4N8to6NovZGAmZRQQ1G9nAJHFk9D_Qz1mz82Nne9zacy3Ny64xFYju6BtP_u6WGC3IMO9MalCdXZyTnf0K7SA", "payload": "" } 2023-11-25 07:02:33,410:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066531206 HTTP/1.1" 200 804 2023-11-25 07:02:33,411:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:02:32 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiPWmCsmMhTRZKMQfqRShofcnPJFkbIMrJLtl4kNB6hsY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:09Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066531206/HwkKGg", "token": "XnSnBmyZRInRNHNise1p6HXmMUAmTdgzqO5hi25GzvI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066531206/RFhChg", "token": "XnSnBmyZRInRNHNise1p6HXmMUAmTdgzqO5hi25GzvI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066531206/Q06UlA", "token": "XnSnBmyZRInRNHNise1p6HXmMUAmTdgzqO5hi25GzvI" } ] } 2023-11-25 07:02:33,411:DEBUG:acme.client:Storing nonce: v0bMowfiPWmCsmMhTRZKMQfqRShofcnPJFkbIMrJLtl4kNB6hsY 2023-11-25 07:02:33,412:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-25 07:02:33,412:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2023-11-25 07:02:33,412:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-25 07:02:33,413:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-25 07:02:33,413:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-25 07:02:33,413:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-25 07:02:33,414:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-25 07:02:33,414:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-25 07:02:33,415:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-25 07:02:33,463:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-25 07:02:33,843:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-25 07:02:33,844:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-25 07:02:33,845:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-25 07:02:33,850:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:49 UTC. 2023-11-25 07:02:33,850:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-25 07:02:33,850:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-25 07:02:33,856:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-25 07:02:33,856:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-25 07:02:33,856:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-25 07:02:33,860:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-25 07:02:33,861:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-25 07:02:33,863:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-25 07:02:34,309:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-25 07:02:34,309:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:02:33 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "0ZSFVci3uwQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-25 07:02:34,310:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-25 07:02:38,239:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7053_key-certbot.pem 2023-11-25 07:02:41,804:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7051_csr-certbot.pem 2023-11-25 07:02:41,804:DEBUG:acme.client:Requesting fresh nonce 2023-11-25 07:02:41,804:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-25 07:02:41,954:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-25 07:02:41,955:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:02:41 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8DzCiQqyov8CYLXgBqtKcZjv8UJ6r8OCRvrKuqDUy1LE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-25 07:02:41,955:DEBUG:acme.client:Storing nonce: nbWKegf8DzCiQqyov8CYLXgBqtKcZjv8UJ6r8OCRvrKuqDUy1LE 2023-11-25 07:02:41,955:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2023-11-25 07:02:41,960:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhEekNpUXF5b3Y4Q1lMWGdCcXRLY1pqdjhVSjZyOE9DUnZyS3VxRFV5MUxFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "a2yA3AEt3f7rHH6amu4Oy4bvK2h9ToZOuEUqRzTjxHMZhEvNYUwD703s5Wixx1kaiPwc5nOi-gfzRQpM8kux3VeVunAq1PrNRBswuqnMi_DGj5fYjzATOzt_SuPNEIlN-YAmE9oNQbauCt0FPKYCM7nbgo1DZ9-vhdvdDSIh3Lfu35Xm77cS-XyZ0QJ_3tFAk4TidGTxDuAZz2qeo1P2mUhms2EOrHoq9fWTxySVC0TzdVbcemZXRzLEuz7WwDSMw_dR_6qjdflO5wSbdR05txUiKY0ggt3RTaQFcBCbe6TlmZBp-XBe7Y1OgzPguX4bLdEs9uMMoPaByGYDIalgyw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-25 07:02:42,207:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2023-11-25 07:02:42,208:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Nov 2023 06:02:41 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796034066 Replay-Nonce: nbWKegf8fQWbu0iXyOWXDy6iu2vBufDvqI_0XeBqXWejyF7qw3M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:17Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066566356" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796034066" } 2023-11-25 07:02:42,208:DEBUG:acme.client:Storing nonce: nbWKegf8fQWbu0iXyOWXDy6iu2vBufDvqI_0XeBqXWejyF7qw3M 2023-11-25 07:02:42,208:DEBUG:acme.client:JWS payload: b'' 2023-11-25 07:02:42,214:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066566356: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhmUVdidTBpWHlPV1hEeTZpdTJ2QnVmRHZxSV8wWGVCcVhXZWp5RjdxdzNNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY1NjYzNTYifQ", "signature": "LC17yCzexK_kczJCLLFCAXYMAmGsMt_EN6DqNcbXHphYAC63-u_3Kj2sJwv1nTiTBSep0KGfivz4Gjn9LLXm5L2U-7BoZ_Ar9hCJKZVpSgoD5ZRefZE4XOQ0Gw_hJzKojdRq3z9r5mXWi75I_uhZu7-bNU3a8zq1H2Q11wiZwTRE1-H7AVZEwmJyNXYXxMQpKHfS42N4hJ3yRW6bVXIa-nqyf7_aKpKZu0KG4kutQBXySn_3PMQQXnRZuStjrHSTmhMhU8BtUuZVt803gakbcozQDvjOlE-UAfPspFs0sNYdUXgDfJ0rhkDyLE0t_xE7vDCxvYqTbCEQ6HCQ8t0Weg", "payload": "" } 2023-11-25 07:02:42,369:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066566356 HTTP/1.1" 200 807 2023-11-25 07:02:42,369:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:02:41 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf88eeY20psJoRN-yRANh3aoLSeK-G_uw5Zn2NTUJsMsDo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:17Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066566356/Ahrirw", "token": "4G7MK_dXMu2C2sZjEzJh8AI0cmHBR_DIlPql7MrNzK0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066566356/5ji8UA", "token": "4G7MK_dXMu2C2sZjEzJh8AI0cmHBR_DIlPql7MrNzK0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066566356/9qmJcg", "token": "4G7MK_dXMu2C2sZjEzJh8AI0cmHBR_DIlPql7MrNzK0" } ] } 2023-11-25 07:02:42,370:DEBUG:acme.client:Storing nonce: nbWKegf88eeY20psJoRN-yRANh3aoLSeK-G_uw5Zn2NTUJsMsDo 2023-11-25 07:02:42,370:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-25 07:02:42,370:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2023-11-25 07:02:42,371:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-25 07:02:42,371:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-25 07:02:42,372:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-25 07:02:42,372:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-25 07:02:42,372:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-25 07:02:42,372:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-25 07:02:42,373:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-25 07:02:42,420:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-25 07:02:42,662:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-25 07:02:42,663:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-25 07:02:42,664:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-25 07:02:42,668:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:02 UTC. 2023-11-25 07:02:42,668:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-25 07:02:42,668:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-25 07:02:42,673:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-25 07:02:42,673:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-25 07:02:42,673:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-25 07:02:42,677:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-25 07:02:42,678:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-25 07:02:42,681:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-25 07:02:43,139:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-25 07:02:43,140:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:02:42 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "mBCsXnsh2tw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-25 07:02:43,140:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-25 07:02:46,790:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7054_key-certbot.pem 2023-11-25 07:02:50,298:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7052_csr-certbot.pem 2023-11-25 07:02:50,298:DEBUG:acme.client:Requesting fresh nonce 2023-11-25 07:02:50,298:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-25 07:02:50,451:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-25 07:02:50,452:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:02:49 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiNph2KU1SnqEjxKGjrq-eisgMv4OkwJCOXmYl8JSPQIw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-25 07:02:50,452:DEBUG:acme.client:Storing nonce: v0bMowfiNph2KU1SnqEjxKGjrq-eisgMv4OkwJCOXmYl8JSPQIw 2023-11-25 07:02:50,452:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2023-11-25 07:02:50,458:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlOcGgyS1UxU25xRWp4S0dqcnEtZWlzZ012NE9rd0pDT1htWWw4SlNQUUl3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "JMyhdFw22thd9uY13DXinadHbVcDDSPusH5Hr9C6XzyXkvhJDvEhyLJ0P5AxuNfDIa21D8fdamhHHxUPP4kecEhoIBKhmugzbfWpvO0RRkw2QLwTtn5NDWmaSogqQH1ukL-GNT5QoYz9kkRSfJsO7gXwdR0E5ouPuudlEprbXBzsq6uFTgwnJ19vuumnJ2pal_UJbS1L_cMD_-cyMom3jx99jwsKEfzfJO4Gp206482XLgQ-6Ez1xzW35VTP5snJPgiM6tQQgJhtt_nOXPUyZ7FFRpM6Hyr--HMkYkJ99xo_auVkV9kwnjoavXmFpcrUVeG0bXcGzxuOJaKhJuZ-IA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-25 07:02:50,636:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2023-11-25 07:02:50,636:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Nov 2023 06:02:49 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796055606 Replay-Nonce: nbWKegf8xDYXVPUcqLJKncnbPcY6bJM6rHEWnUenHX8s56QDyCU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:26Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066598576" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796055606" } 2023-11-25 07:02:50,636:DEBUG:acme.client:Storing nonce: nbWKegf8xDYXVPUcqLJKncnbPcY6bJM6rHEWnUenHX8s56QDyCU 2023-11-25 07:02:50,637:DEBUG:acme.client:JWS payload: b'' 2023-11-25 07:02:50,642:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066598576: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjh4RFlYVlBVY3FMSktuY25iUGNZNmJKTTZySEVXblVlbkhYOHM1NlFEeUNVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY1OTg1NzYifQ", "signature": "XsZmfYUWVwm36xwMa3GDIJnUncdXRiXfNLo24Gopbgu4V3gSmqRHCd5GGozVZGNHOlJnjyPlFhZ-XnTZKel3zR1bYgXEbPA2aUhaS7Ax43-GJZAedoE22OVygr_HuLqi-ghrWTCODak124-rfKUUId9irbP3TyigjTMWaRv_Y-2CpbuZJHGnZQJDPBpDE0rZMepsijCMP5dXWGUlXkmaRiwsYcwfrU0l9KbPsEVd5vxnpkTs7kkUlhTYJl2E31_EbzAADigs9pjYDBkyKILBy_sz5-WwCr-jzoR_36P1iVHsWNCa1UAMUkxet6iQrxIyqqt0tA1BF-MRKuEhkFYbxA", "payload": "" } 2023-11-25 07:02:50,823:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066598576 HTTP/1.1" 200 801 2023-11-25 07:02:50,824:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:02:50 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfi4XCbec3RNihZXFUN1wKxBPl4Iglur676bl8fGz3ICFE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:26Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066598576/f3URKA", "token": "J6ZL0EQU-jtK9avoLKda1DkzwcegKRZen1GsEEp4cxs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066598576/iDceBQ", "token": "J6ZL0EQU-jtK9avoLKda1DkzwcegKRZen1GsEEp4cxs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066598576/LT38xQ", "token": "J6ZL0EQU-jtK9avoLKda1DkzwcegKRZen1GsEEp4cxs" } ] } 2023-11-25 07:02:50,824:DEBUG:acme.client:Storing nonce: v0bMowfi4XCbec3RNihZXFUN1wKxBPl4Iglur676bl8fGz3ICFE 2023-11-25 07:02:50,825:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-25 07:02:50,825:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2023-11-25 07:02:50,825:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-25 07:02:50,826:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-25 07:02:50,826:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-25 07:02:50,827:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-25 07:02:50,827:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-25 07:02:50,827:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-25 07:02:50,828:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-25 07:02:50,864:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-25 07:02:51,127:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-25 07:02:51,129:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-25 07:02:51,129:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-25 07:02:51,133:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:14 UTC. 2023-11-25 07:02:51,133:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-25 07:02:51,134:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-25 07:02:51,138:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-25 07:02:51,139:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-25 07:02:51,139:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-25 07:02:51,143:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-25 07:02:51,144:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-25 07:02:51,146:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-25 07:02:51,688:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-25 07:02:51,689:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:02:50 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "QeAeZHtBX8Q": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-25 07:02:51,690:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-25 07:02:55,357:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7055_key-certbot.pem 2023-11-25 07:02:58,917:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7053_csr-certbot.pem 2023-11-25 07:02:58,917:DEBUG:acme.client:Requesting fresh nonce 2023-11-25 07:02:58,917:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-25 07:02:59,102:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-25 07:02:59,103:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:02:58 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjCPcYFvAuVaNs_8F77f5lLRZEI_Fuf2K01JZ2B9TOMYE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-25 07:02:59,103:DEBUG:acme.client:Storing nonce: SFMYLIQjCPcYFvAuVaNs_8F77f5lLRZEI_Fuf2K01JZ2B9TOMYE 2023-11-25 07:02:59,103:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2023-11-25 07:02:59,109:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpDUGNZRnZBdVZhTnNfOEY3N2Y1bExSWkVJX0Z1ZjJLMDFKWjJCOVRPTVlFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "c1P9iwpW5jJhB71sa6AejMrl5iwsPmU-76nfySjAXCBH3UXLaXWpXG0Kns1_bCqUjSPHf9RJcDWa7SA0esy8sWNaBcga2j18qo58PHHSGeeGjhTP8VP3ycxy_SZR13U1Qh2JUlhKdPYRTFTB8b-uPRkpew1kFxaOEY6Gj6MjBeO6uFTeAUwBau5Oip-7VEg7Exp_vEJHduBuCQ_HmfK0202dnXsOoryi-pGzN8Vggok5CcmcF3KlnH3xFzc6OCNs3cx98CC6FziF9fbaQPcESOHTaqTwvGD3wapVpEmcJCWF7jDwh6kpOp1RBQDKAY3IOAkwO1UaZokv-nET2dPv8A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-25 07:02:59,311:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-25 07:02:59,312:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Nov 2023 06:02:58 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796073426 Replay-Nonce: jXyutbsn4Cw6by6oHykmbxYbSj3g5z65NShD-zB819oowDN7sBg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:34Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066622126" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796073426" } 2023-11-25 07:02:59,312:DEBUG:acme.client:Storing nonce: jXyutbsn4Cw6by6oHykmbxYbSj3g5z65NShD-zB819oowDN7sBg 2023-11-25 07:02:59,313:DEBUG:acme.client:JWS payload: b'' 2023-11-25 07:02:59,318:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066622126: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic240Q3c2Ynk2b0h5a21ieFliU2ozZzV6NjVOU2hELXpCODE5b293RE43c0JnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2MjIxMjYifQ", "signature": "htgtxOwOjMwjnGKwt3C1V9BNy-O_xO_Ptb3VPOOhuyqq-2cIwHr4frgGc_E6mISJ7QY8VQEIs6SumykIIqdMH84G-AhHJWpv9Rl2pr_HzvLCvJSz4onvcuxNMgRQR7JQJbbPRRCC11z-aRZxuwNu7l5TDOFKSTP42MVnl8BMaXmiQyfU5RI0PNr_gAPt1OlHtJrYsGM2Sh1uTl9VB4ngzf1G2ii-SRPh3BwWsDbY9fnFiwI5JgDuzoKO1zSmClf_dQITwcDCTDX-0CNY_kD7jqIu40OuakMrOkSvonZk3BI2X_g_xYPaVW5KuoVZQQFDrsERw0CzbDDovppyavULCg", "payload": "" } 2023-11-25 07:02:59,505:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066622126 HTTP/1.1" 200 805 2023-11-25 07:02:59,505:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:02:58 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQj1C7KWYiE0qUHhO2vmwrq3RvaQePZpYqfQ2mYPPSiEyw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:34Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066622126/zRCxuQ", "token": "gv2fmd0seZNcl7Js9O_Y9lNTlUdsETbsewgxCi8k0AI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066622126/gv15MQ", "token": "gv2fmd0seZNcl7Js9O_Y9lNTlUdsETbsewgxCi8k0AI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066622126/tryPHA", "token": "gv2fmd0seZNcl7Js9O_Y9lNTlUdsETbsewgxCi8k0AI" } ] } 2023-11-25 07:02:59,505:DEBUG:acme.client:Storing nonce: SFMYLIQj1C7KWYiE0qUHhO2vmwrq3RvaQePZpYqfQ2mYPPSiEyw 2023-11-25 07:02:59,506:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-25 07:02:59,506:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2023-11-25 07:02:59,507:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-25 07:02:59,507:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-25 07:02:59,508:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-25 07:02:59,508:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-25 07:02:59,508:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-25 07:02:59,509:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-25 07:02:59,510:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-25 07:02:59,557:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-25 07:02:59,791:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-25 07:02:59,792:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-25 07:02:59,793:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-25 07:02:59,797:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:27 UTC. 2023-11-25 07:02:59,797:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-25 07:02:59,798:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-25 07:02:59,802:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-25 07:02:59,803:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-25 07:02:59,803:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-25 07:02:59,806:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-25 07:02:59,807:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-25 07:02:59,809:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-25 07:03:00,354:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-25 07:03:00,354:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:02:59 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "R4EiZ10BEPk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-25 07:03:00,355:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-25 07:03:04,022:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7056_key-certbot.pem 2023-11-25 07:03:07,602:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7054_csr-certbot.pem 2023-11-25 07:03:07,602:DEBUG:acme.client:Requesting fresh nonce 2023-11-25 07:03:07,603:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-25 07:03:07,784:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-25 07:03:07,785:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:03:07 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjUMxTJ9fLxg8Qt1gaTNOUHyMHzdSxPOxY3U_EKE-RN2A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-25 07:03:07,785:DEBUG:acme.client:Storing nonce: SFMYLIQjUMxTJ9fLxg8Qt1gaTNOUHyMHzdSxPOxY3U_EKE-RN2A 2023-11-25 07:03:07,785:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2023-11-25 07:03:07,791:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpVTXhUSjlmTHhnOFF0MWdhVE5PVUh5TUh6ZFN4UE94WTNVX0VLRS1STjJBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "RaU8zDWquJEo1mknPhtqYctRVdbq1H0hGu9Z9AsuRCUKLQM0OIf0LUYHjN9NReY4RlbtFUNXuK8FR05Yg5T2XKnWgKvTzGY41q3Ctr5EPTSXMIUBlygsq-oG8kPi5bgQHf78SdWOqiZw3S9014fva6EMceiPNqVArRu-wBID_vDUkZ0cdC5SHHi3Hg9Uk2n9Q9mmR2ZatO_17_Z8rE6eyDtxqdvLoyQM1NKLV0bVg-sogRN6LwZZtPjoOU2vYAz4QWywyNTCXh7J-yiugu9NAVYAc2_OviA2Vqb7JSBvHngufwLdNMPHJLIGSUxjRccKAhcWdVpMUpAVF_RCrwnnwQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-25 07:03:08,007:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2023-11-25 07:03:08,008:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Nov 2023 06:03:07 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796091136 Replay-Nonce: jXyutbsnUItTAv6UnHz5Enp9Ol8t3tkui6G4QNgYDWxkh33qKfA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:43Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066646896" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796091136" } 2023-11-25 07:03:08,008:DEBUG:acme.client:Storing nonce: jXyutbsnUItTAv6UnHz5Enp9Ol8t3tkui6G4QNgYDWxkh33qKfA 2023-11-25 07:03:08,008:DEBUG:acme.client:JWS payload: b'' 2023-11-25 07:03:08,014:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066646896: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25VSXRUQXY2VW5IejVFbnA5T2w4dDN0a3VpNkc0UU5nWURXeGtoMzNxS2ZBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2NDY4OTYifQ", "signature": "lB0kuA7LTaTih2BKQX3JByAxlEzEbqjZj41gyXdN-GZ53kOX2fj5NziRGnhlgMQa4GwveiAL4qPaaV63lCgEAwVDVD7FIoKfcm4_J9SJVa80IKxD9ZOg6icXHTAVzyODVx5Z2Wx7aqDNX0V2LpQLz1lsc-30aM1UQ_M2_6KtEK8cMqokHdblYdhjwuhZlKKav9pgK-r7ct93VL0H9v5tXsDlKkayhbBXwVX0hHgCsYbNGpg7upq_hreVSP3YeWwXbD_Uiggdwc4ch5YhmP8cUMz2O5pf79TQgZUh4VvQNxECwtM7dAkJKQUiHE4D0c43IVF-3ovhpisFADj4vTHIRQ", "payload": "" } 2023-11-25 07:03:08,198:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066646896 HTTP/1.1" 200 809 2023-11-25 07:03:08,199:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:03:07 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQj6iI0cR3rdNIczw0x5aVocpO3_jPS8iGA69mF36vh4hQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:43Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066646896/juW_-A", "token": "CWWUm3uLuT3l53wpiS92M-Qv-NaCbupUBW732wE0vd8" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066646896/EWbN0Q", "token": "CWWUm3uLuT3l53wpiS92M-Qv-NaCbupUBW732wE0vd8" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066646896/0CyP5g", "token": "CWWUm3uLuT3l53wpiS92M-Qv-NaCbupUBW732wE0vd8" } ] } 2023-11-25 07:03:08,199:DEBUG:acme.client:Storing nonce: SFMYLIQj6iI0cR3rdNIczw0x5aVocpO3_jPS8iGA69mF36vh4hQ 2023-11-25 07:03:08,200:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-25 07:03:08,200:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2023-11-25 07:03:08,201:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-25 07:03:08,201:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-25 07:03:08,202:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-25 07:03:08,202:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-25 07:03:08,202:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-25 07:03:08,202:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-25 07:03:08,203:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-25 07:03:08,241:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-25 07:03:08,461:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-25 07:03:08,462:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-25 07:03:08,463:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-25 07:03:08,466:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:41 UTC. 2023-11-25 07:03:08,466:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-25 07:03:08,466:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-25 07:03:08,471:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-25 07:03:08,471:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-25 07:03:08,471:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-25 07:03:08,475:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-25 07:03:08,476:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-25 07:03:08,478:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-25 07:03:09,007:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-25 07:03:09,007:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:03:08 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "VyEGDH-et3c": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-25 07:03:09,008:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-25 07:03:12,883:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7057_key-certbot.pem 2023-11-25 07:03:16,403:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7055_csr-certbot.pem 2023-11-25 07:03:16,403:DEBUG:acme.client:Requesting fresh nonce 2023-11-25 07:03:16,403:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-25 07:03:16,581:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-25 07:03:16,581:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:03:15 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnpkM2usqiMczf9CnyStkJmwcxReZ8GeXpfSTy0Vabaus X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-25 07:03:16,581:DEBUG:acme.client:Storing nonce: jXyutbsnpkM2usqiMczf9CnyStkJmwcxReZ8GeXpfSTy0Vabaus 2023-11-25 07:03:16,582:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2023-11-25 07:03:16,587:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25wa00ydXNxaU1jemY5Q255U3RrSm13Y3hSZVo4R2VYcGZTVHkwVmFiYXVzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "KUX-Paeyu_ye5XuLsjreDoDSUj1W5RS5Fyig_5f65l_7G23Ov3esVZ47Sb7hNZofgfLWhC2Zhx6Aygt455ayQTw_TEXWgjJpYUDzgz_KWk7KXWoqddnpb7AVq2ieW4XOkHTJX8eesH5gmx4swTUst12eRX8YKpese_Na0WcXcvEHLbUScQpBZbSWR-aJaZ9c0ekRPJNI2vJhtjXrk7boLtvPCENuq9exChzZBvAwYz6-wHGi4mYqViBvOp0MGj12hg-l1V3L3ZIa9s7-dmbuIElHDSqHW5bVX7Ejit95WA94dPGDhBy1hh5LAK2AZnJXBn3yocaJxuORLo3mcRk1PA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-25 07:03:16,779:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2023-11-25 07:03:16,779:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Nov 2023 06:03:16 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796108646 Replay-Nonce: jXyutbsnM5PVrt1eVKJBM2nR3c4XhEyGFUBXGlkvTtuXjzTJ0pI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:52Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066669286" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796108646" } 2023-11-25 07:03:16,780:DEBUG:acme.client:Storing nonce: jXyutbsnM5PVrt1eVKJBM2nR3c4XhEyGFUBXGlkvTtuXjzTJ0pI 2023-11-25 07:03:16,780:DEBUG:acme.client:JWS payload: b'' 2023-11-25 07:03:16,786:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066669286: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25NNVBWcnQxZVZLSkJNMm5SM2M0WGhFeUdGVUJYR2xrdlR0dVhqelRKMHBJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2NjkyODYifQ", "signature": "Gr62rnRLA1x6CH_BBLFwUVtsZokDrfFHMmaBaRRnLLsFp_0cP_LrHu5UEnI1fh2eynDXFryADzas4ns9qt3WEMt_5iElEIg8EKZgBRfHXjj33HQkD89YO06KQsz6x1HNYiUkugplghpdpbJJhDV6P5QAITbdre-Ldp-iUz8--M-TIDWW-kMHFqPA2hrIY1Bi2EsvQ-EtC5YIi2uqUrNsSwlp0Kvps545-eqQn9lscNDHSTvIbbry2dw4-imG2B5wKlJPOljJ8MWrc67QwwxaROHJCahJA4-TjV0FgUe6n6JFY4gTEQu_DPlrW9oUEanoaO402OpFJyzf8NfvNviQCA", "payload": "" } 2023-11-25 07:03:16,967:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066669286 HTTP/1.1" 200 806 2023-11-25 07:03:16,968:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:03:16 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjHvotIhS9w6usFGYfVYzQhBNonbspnyDetCISw_X2jQY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:52Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066669286/DZCB_w", "token": "FOLQeQhM5d7jUf4G9Qq1v4w7kH45foXttXys0ZoHmyY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066669286/3LwN7g", "token": "FOLQeQhM5d7jUf4G9Qq1v4w7kH45foXttXys0ZoHmyY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066669286/N8DWOw", "token": "FOLQeQhM5d7jUf4G9Qq1v4w7kH45foXttXys0ZoHmyY" } ] } 2023-11-25 07:03:16,968:DEBUG:acme.client:Storing nonce: SFMYLIQjHvotIhS9w6usFGYfVYzQhBNonbspnyDetCISw_X2jQY 2023-11-25 07:03:16,969:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-25 07:03:16,969:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2023-11-25 07:03:16,969:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-25 07:03:16,970:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-25 07:03:16,970:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-25 07:03:16,971:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-25 07:03:16,971:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-25 07:03:16,971:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-25 07:03:16,972:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-25 07:03:17,018:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2023-11-25 07:03:17,018:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-25 07:03:17,019:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2023-11-25 07:03:17,026:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2023-11-25 07:03:17,028:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2023-11-25 07:03:17,028:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2023-11-25 07:03:17,028:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2023-11-25 07:03:17,029:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2023-11-25 07:03:17,031:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2023-11-25 07:03:17,067:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-25 07:03:17,470:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-25 07:03:17,471:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-25 07:03:17,472:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-25 07:03:17,476:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:56 UTC. 2023-11-25 07:03:17,476:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-25 07:03:17,476:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-25 07:03:17,480:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-25 07:03:17,480:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-25 07:03:17,481:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-25 07:03:17,485:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-25 07:03:17,486:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-25 07:03:17,488:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-25 07:03:17,939:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-25 07:03:17,940:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:03:17 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "3Lj2aF93dDM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-25 07:03:17,940:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-25 07:03:21,811:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7058_key-certbot.pem 2023-11-25 07:03:25,389:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7056_csr-certbot.pem 2023-11-25 07:03:25,389:DEBUG:acme.client:Requesting fresh nonce 2023-11-25 07:03:25,389:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-25 07:03:25,541:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-25 07:03:25,541:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:03:24 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8b_BFzS2-7W6LND-o1ArQtyL8gko1CFf8EEOAyL3cPLI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-25 07:03:25,542:DEBUG:acme.client:Storing nonce: nbWKegf8b_BFzS2-7W6LND-o1ArQtyL8gko1CFf8EEOAyL3cPLI 2023-11-25 07:03:25,542:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2023-11-25 07:03:25,548:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhiX0JGelMyLTdXNkxORC1vMUFyUXR5TDhna28xQ0ZmOEVFT0F5TDNjUExJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "w9Hx1omBtT21AOKuSqCXF95ifmKswV5GZiuj7NnHJon2KjXJ_dxe_f8ZM_nxTUzn3HgOkW9PfXTWdImhunmqH-RGBkLT4PO2w0lj6di7xuM5WgfbnG8In0vKPBDEP2mBhx5GmW19xW2LA5xIlaoZIY18L8j_3Xg0_iuKbzehRc6CexZJvfGFdAYyqMNT2lALHJOO3tPxwInXgPRT7qIG_h8nBbvQQEM_kGjh6rOFV63tg_LXc2GfjI_H3b7-5D5XbZSLkL8A2u4NaRHv6QrUSrB8XZAebb0-PoBwLpKLx81FcLXfUu3lrcMRaJEO_ZMpxWRczh41xLXlX5C2iHreAw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-25 07:03:25,711:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2023-11-25 07:03:25,712:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Nov 2023 06:03:25 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796125916 Replay-Nonce: nbWKegf8hv5E1g8_QmPGXvVIBFmG_hflMQ1Eu2V8Ndfyk04vA5g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:00Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066692866" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796125916" } 2023-11-25 07:03:25,712:DEBUG:acme.client:Storing nonce: nbWKegf8hv5E1g8_QmPGXvVIBFmG_hflMQ1Eu2V8Ndfyk04vA5g 2023-11-25 07:03:25,712:DEBUG:acme.client:JWS payload: b'' 2023-11-25 07:03:25,718:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066692866: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhodjVFMWc4X1FtUEdYdlZJQkZtR19oZmxNUTFFdTJWOE5kZnlrMDR2QTVnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2OTI4NjYifQ", "signature": "wdnalAhwDrYHlqzaQ6iXMKs24AaBXe4IdLkSGQttdxdNq4XBUmTPwnRWwIia0ZOGtvue-qra5zgqzN8TUPK5POQq8copuxGpheN8GD7qDAUMlRZmOhHQFgsaVa151ciNW4iV9rAmKOb35yNKUyNljqvi9rqtWQ2XP6pr7pL_hjTUiMpHVdwzWvY5Tte6n4XPUeKny7pdRlb-Y4iU61MoMrcqqfqsS1i3G5E6-zcbmvC4yiRLjdjVpXE1bliNegx5dYEuGNvnc3Cftn41bBq935ObSXIpF7F4ord6D6uAMRz7rtVz6QugooBxMwT7a4_nPU5_9q5qG_YlCKZcnAO4fw", "payload": "" } 2023-11-25 07:03:25,897:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066692866 HTTP/1.1" 200 811 2023-11-25 07:03:25,898:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:03:25 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8NmQEeBYVQJXHUD0AkcguFzxripb3q1lBY-Bo3VaWU2Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:00Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066692866/TZHJ0A", "token": "otJKkgRT8z2VOaRDiAmAclIadkc79VXFNmsAESfM3y0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066692866/YBeUJQ", "token": "otJKkgRT8z2VOaRDiAmAclIadkc79VXFNmsAESfM3y0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066692866/i1p7PQ", "token": "otJKkgRT8z2VOaRDiAmAclIadkc79VXFNmsAESfM3y0" } ] } 2023-11-25 07:03:25,898:DEBUG:acme.client:Storing nonce: nbWKegf8NmQEeBYVQJXHUD0AkcguFzxripb3q1lBY-Bo3VaWU2Q 2023-11-25 07:03:25,899:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-25 07:03:25,899:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2023-11-25 07:03:25,899:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-25 07:03:25,900:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-25 07:03:25,900:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-25 07:03:25,901:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-25 07:03:25,901:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-25 07:03:25,901:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-25 07:03:25,902:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-25 07:03:25,949:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-25 07:03:26,351:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-25 07:03:26,352:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-25 07:03:26,353:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-25 07:03:26,357:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:09 UTC. 2023-11-25 07:03:26,357:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-25 07:03:26,357:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-25 07:03:26,362:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-25 07:03:26,362:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-25 07:03:26,362:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-25 07:03:26,367:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-25 07:03:26,367:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-25 07:03:26,369:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-25 07:03:26,828:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-25 07:03:26,829:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:03:26 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "rs9t08mlqQE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2023-11-25 07:03:26,829:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-25 07:03:30,709:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7059_key-certbot.pem 2023-11-25 07:03:34,191:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7057_csr-certbot.pem 2023-11-25 07:03:34,192:DEBUG:acme.client:Requesting fresh nonce 2023-11-25 07:03:34,192:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-25 07:03:34,345:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-25 07:03:34,345:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:03:33 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf86ESYqrK6CO2cHS4emvKWAP8i-1DD8g0Js3_mDHdVCIA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-25 07:03:34,345:DEBUG:acme.client:Storing nonce: nbWKegf86ESYqrK6CO2cHS4emvKWAP8i-1DD8g0Js3_mDHdVCIA 2023-11-25 07:03:34,346:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2023-11-25 07:03:34,353:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjg2RVNZcXJLNkNPMmNIUzRlbXZLV0FQOGktMUREOGcwSnMzX21ESGRWQ0lBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "QqNwrX4Ju1tLutx_XoqkbKBpfQP-PWCaoLq2LhxikLxUn2Ew_Ybl7oVY9tmD_3tYGZRTxW5IydjJEu8DDD0RrYUSjWvwXb-c4hLELFvq9XHe_F7BIcTyaWtz9-9hRWWmY5o4MG4V6FTznIAIhYW6r-d9AXJkJEs0OdfO-NKvUyg_bO3ULh18OkJbCvHdnXDR-LE5K_G1J4OM_4yiOQoh_BnRVK2k1DQbuKbtWqRlZHcjJfKe3oatqDGlNiuXTfp79qAiRmGbdnBxe4iZPACpwf8z4Se45qrv5EiYqcNtim21Kv5u6oFfP8NQE3PhbMm4vLV6AQzNQEwgi4KV5a5PPg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-25 07:03:34,520:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2023-11-25 07:03:34,521:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Nov 2023 06:03:33 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796165656 Replay-Nonce: v0bMowfiAzUmYaVHvThrSpI8Iaylq2lU6kHX-DGhb7EKNSONw9E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:08Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066738016" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796165656" } 2023-11-25 07:03:34,521:DEBUG:acme.client:Storing nonce: v0bMowfiAzUmYaVHvThrSpI8Iaylq2lU6kHX-DGhb7EKNSONw9E 2023-11-25 07:03:34,521:DEBUG:acme.client:JWS payload: b'' 2023-11-25 07:03:34,527:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066738016: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlBelVtWWFWSHZUaHJTcEk4SWF5bHEybFU2a0hYLURHaGI3RUtOU09OdzlFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY3MzgwMTYifQ", "signature": "Y_ILi2YHxOBjMOkzAdC4c3NimLi4MRreY2-8zjQjJJsZZqU-3MPnhcdd3CCxQZN7RHmQV3isN5J0F_9r4GtMnRSzzoRZibtqJUFtmO96DNt8ntHYrOTDNfgoTLEGeVXNN_61JPmeSA3E5oQYH4vouOcMIPSAOeKxEeOK0AQT0FqDnQ7b3S3HZHrBgtmYYUOD4tDSmwAb6TWMUXNLNNFgdtAN3wzxih0KHHcN1QsdS54ZKRJyfvOLlhBBubQDfcXolaS7SPjKy2-57CEEYVKnnAwQAFYbTBNQZGyCUMQpXL-y4DK3uFFe6sLfZUf6y5-rb417hNm7nQTqCt6GUXrhDg", "payload": "" } 2023-11-25 07:03:34,698:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066738016 HTTP/1.1" 200 810 2023-11-25 07:03:34,698:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:03:34 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8BvEeHkN75f3sj63xMmG0Jxl7rn36PZpAMchnHzXqSns X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:08Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066738016/ypE5ag", "token": "6TDiXsqmeP1Jr6MAv3ggvn4O3hX5INT6PvOa_y3w6tM" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066738016/HUvErQ", "token": "6TDiXsqmeP1Jr6MAv3ggvn4O3hX5INT6PvOa_y3w6tM" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066738016/nzokTQ", "token": "6TDiXsqmeP1Jr6MAv3ggvn4O3hX5INT6PvOa_y3w6tM" } ] } 2023-11-25 07:03:34,698:DEBUG:acme.client:Storing nonce: nbWKegf8BvEeHkN75f3sj63xMmG0Jxl7rn36PZpAMchnHzXqSns 2023-11-25 07:03:34,699:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-25 07:03:34,699:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2023-11-25 07:03:34,700:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-25 07:03:34,700:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-25 07:03:34,701:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-25 07:03:34,701:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-25 07:03:34,701:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-25 07:03:34,701:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-25 07:03:34,702:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-25 07:03:34,748:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-25 07:03:35,120:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-25 07:03:35,121:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2023-11-25 07:03:35,122:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2023-11-25 07:03:35,126:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:22 UTC. 2023-11-25 07:03:35,126:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-25 07:03:35,126:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-25 07:03:35,131:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-25 07:03:35,131:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-25 07:03:35,131:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-25 07:03:35,136:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-25 07:03:35,137:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-25 07:03:35,139:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-25 07:03:35,574:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-25 07:03:35,575:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:03:34 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "srhcQdPIrq4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2023-11-25 07:03:35,575:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-25 07:03:39,411:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7060_key-certbot.pem 2023-11-25 07:03:42,922:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7058_csr-certbot.pem 2023-11-25 07:03:42,922:DEBUG:acme.client:Requesting fresh nonce 2023-11-25 07:03:42,923:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-25 07:03:43,070:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-25 07:03:43,070:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:03:42 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiWFJye5KT_tSUgAe8omCsmsft6MymcRtxYqltr6hS7Vs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-25 07:03:43,070:DEBUG:acme.client:Storing nonce: v0bMowfiWFJye5KT_tSUgAe8omCsmsft6MymcRtxYqltr6hS7Vs 2023-11-25 07:03:43,071:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2023-11-25 07:03:43,076:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlXRkp5ZTVLVF90U1VnQWU4b21Dc21zZnQ2TXltY1J0eFlxbHRyNmhTN1ZzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "D8cMtyzYAAw9NSqdwnGe7rjj9n9y6kgEJ0M6RwZqalmlwr_0MYKstcY1jHBLNfnN9Q02oXsFMQXHRfhRxDvUmC5WhAndo_jDrEsFqVMBEuXayWz1DBV3hsNr4wGo6obEKoMOnmWoDVBlXMQ7Kk2ex4uxkG05XekiYGRVatTks3q8cgFT5eqK875oSrk5kktHV_Er4tZyEjk5dfRFNyqqKX7b8FBoOqo6VleqLvfBCM-qfZNs3LQAwjTkEILBLS9Vh7v8rRrDpSoxhbJRii8a4G9KKBQJPFqLvnY1C6ogYbrG1R99QJwCJR3u1ynjr6nGWMh--VV6WIOQhpnt6EV9Fw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-25 07:03:43,240:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2023-11-25 07:03:43,240:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Nov 2023 06:03:42 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796190496 Replay-Nonce: nbWKegf8o_ZcMwa9kkJm6KuGrb2P_xcNURHs4D09JQd0AU0H2hY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:17Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066771416" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796190496" } 2023-11-25 07:03:43,241:DEBUG:acme.client:Storing nonce: nbWKegf8o_ZcMwa9kkJm6KuGrb2P_xcNURHs4D09JQd0AU0H2hY 2023-11-25 07:03:43,241:DEBUG:acme.client:JWS payload: b'' 2023-11-25 07:03:43,246:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066771416: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhvX1pjTXdhOWtrSm02S3VHcmIyUF94Y05VUkhzNEQwOUpRZDBBVTBIMmhZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY3NzE0MTYifQ", "signature": "rB0dmLiyZEFyGCESkDKKCp3me0wx-P7RDJdpEtoKhXrqPoNko4FCmBnoVlkQQkbBRyasQj0m41g8QG29k5mD1KmfCrEyzjwb6IrP8tGn1cik8xizzbHnVBEdl0_FjucgEwyL1SeRe_R-HxUcSgg4gfCBHalot4lhqdVdI0Cnnrdbyw4RWe2D9rzMjOS2AjoOnjPGjiZrptU9rGHVu5EAhZckFUJ0kbS6OlLGP5RcCYPoFZIt-QYPBHZtXGjrcD5V7bdeJa9Hq8lCfVUBxJ4fJL7OstejutUKZKWnU_BFJ-fqr0nfBEfViPWaA_6oZktN6pYEQaSUp0sVkIANpmuT0Q", "payload": "" } 2023-11-25 07:03:43,394:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066771416 HTTP/1.1" 200 809 2023-11-25 07:03:43,394:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:03:42 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8AnNVwiFBX72xeaJmGfh76cpiMi13VZWd8q4ElD3FLt0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:17Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066771416/1qhCuQ", "token": "cVVMxW9zwT-iEFrTBcAWPKCXYKiDFVXWvmhWDvf--Y4" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066771416/isn6Gw", "token": "cVVMxW9zwT-iEFrTBcAWPKCXYKiDFVXWvmhWDvf--Y4" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066771416/lLjJ0A", "token": "cVVMxW9zwT-iEFrTBcAWPKCXYKiDFVXWvmhWDvf--Y4" } ] } 2023-11-25 07:03:43,394:DEBUG:acme.client:Storing nonce: nbWKegf8AnNVwiFBX72xeaJmGfh76cpiMi13VZWd8q4ElD3FLt0 2023-11-25 07:03:43,395:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-25 07:03:43,395:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2023-11-25 07:03:43,396:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-25 07:03:43,396:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-25 07:03:43,397:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-25 07:03:43,397:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-25 07:03:43,397:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-25 07:03:43,397:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-25 07:03:43,399:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-25 07:03:43,437:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-25 07:03:43,813:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-25 07:03:43,814:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2023-11-25 07:03:43,815:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2023-11-25 07:03:43,819:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:34 UTC. 2023-11-25 07:03:43,820:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-25 07:03:43,820:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-25 07:03:43,825:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-25 07:03:43,825:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-25 07:03:43,825:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-25 07:03:43,830:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-25 07:03:43,831:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-25 07:03:43,833:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-25 07:03:44,353:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-25 07:03:44,353:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:03:43 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "J3MuigqeuZw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-25 07:03:44,354:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-25 07:03:48,167:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7061_key-certbot.pem 2023-11-25 07:03:51,658:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7059_csr-certbot.pem 2023-11-25 07:03:51,659:DEBUG:acme.client:Requesting fresh nonce 2023-11-25 07:03:51,659:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-25 07:03:51,833:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-25 07:03:51,833:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:03:51 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnhVtFLzwej4S0lqc04GDgnEwANILBX5zGReVWD0NHt3s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-25 07:03:51,833:DEBUG:acme.client:Storing nonce: jXyutbsnhVtFLzwej4S0lqc04GDgnEwANILBX5zGReVWD0NHt3s 2023-11-25 07:03:51,834:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2023-11-25 07:03:51,839:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25oVnRGTHp3ZWo0UzBscWMwNEdEZ25Fd0FOSUxCWDV6R1JlVldEME5IdDNzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "KKk-R1ZgBWnjPda7xje63tX1ZjZxcwMugX8tbyYZupmIiaANDX-Bv9GU0IgMQx27d01KuODra_rkgLi2dQvPkQQnwhGbz90skM7RccbsBoiMBcenNbVQZynw6EXp6DF6SUwv_Qb21uPuf98G62rqvNq4Z6v8y7xYP6TWhAaBnGtpWIv6op4nFlMYFjdB8YVJD75ILyUQqdU3QU8hvPXuf4pWs31KfXQtjuTYw34w93pDOAW_odNq1enOteavneQLQwdlvPJFfGHKLm44Et-a3QIyPgYHHgzMujNgq-AwE1pwkCyxffRbpYDrPQwPu6AXjrr3E8zg6zdYVd3w9Azzlw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-25 07:03:52,038:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-25 07:03:52,039:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Nov 2023 06:03:51 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796210686 Replay-Nonce: jXyutbsnHzkbeBJW6kzLCUQ__GjyqZH0QB-LpdV4rDAVQ3QfjJY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:25Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066800166" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796210686" } 2023-11-25 07:03:52,039:DEBUG:acme.client:Storing nonce: jXyutbsnHzkbeBJW6kzLCUQ__GjyqZH0QB-LpdV4rDAVQ3QfjJY 2023-11-25 07:03:52,039:DEBUG:acme.client:JWS payload: b'' 2023-11-25 07:03:52,044:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066800166: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25IemtiZUJKVzZrekxDVVFfX0dqeXFaSDBRQi1McGRWNHJEQVZRM1FmakpZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY4MDAxNjYifQ", "signature": "NfOSkLauJxMeHFoH5-ZPeZxqweZJeZm4H6jMhc4677aJn6vLAWe0HGmhn6Rs7LNaHeziFx-6HvhZc2LmyXGcO12xBOM2OWRSJrTuEr9eDlgv6u3PS5SlBX9tzCy0AcdYmJX-yEBQB8SDXbWsnYJyQSVZ9r-XFGfXhmgXNhRWXi5YMGpEYdJYEWn-s1M34V6FrjFpqJl_ZAXNnMdEGjh1xoGD6pmYJDmuSn8aTIdMa5RF-EVU6Ftqu1Pu_pXS0XxButGqwIPODdAol9ysz4OnXLQJxBv7biF8QBiEcn9-MEG9T9x0Rltvs5Ppvljg866X5jRHP1hyZfWjneKb4o9U0g", "payload": "" } 2023-11-25 07:03:52,221:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066800166 HTTP/1.1" 200 805 2023-11-25 07:03:52,222:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:03:51 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjxoFMwA0jKvkCqpylNDhRnGSznSoqtLLcGzoSNKJnpcM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:25Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066800166/zXEJ0Q", "token": "chax4aVJRBAwxdLyEKOihE2bmz-XL8HJpzNL8ytpyn8" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066800166/b777tA", "token": "chax4aVJRBAwxdLyEKOihE2bmz-XL8HJpzNL8ytpyn8" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066800166/Gd6Xnw", "token": "chax4aVJRBAwxdLyEKOihE2bmz-XL8HJpzNL8ytpyn8" } ] } 2023-11-25 07:03:52,222:DEBUG:acme.client:Storing nonce: SFMYLIQjxoFMwA0jKvkCqpylNDhRnGSznSoqtLLcGzoSNKJnpcM 2023-11-25 07:03:52,223:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-25 07:03:52,223:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2023-11-25 07:03:52,224:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-25 07:03:52,224:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-25 07:03:52,225:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-25 07:03:52,225:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-25 07:03:52,225:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-25 07:03:52,225:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-25 07:03:52,226:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-25 07:03:52,273:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-25 07:03:52,492:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-25 07:03:52,493:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-25 07:03:52,494:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-25 07:03:52,498:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:48 UTC. 2023-11-25 07:03:52,498:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-25 07:03:52,498:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-25 07:03:52,503:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-25 07:03:52,503:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-25 07:03:52,503:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-25 07:03:52,507:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-25 07:03:52,508:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-25 07:03:52,511:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-25 07:03:53,029:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-25 07:03:53,029:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:03:52 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "C6BZsZtVipc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-25 07:03:53,030:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-25 07:03:56,842:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7062_key-certbot.pem 2023-11-25 07:04:00,330:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7060_csr-certbot.pem 2023-11-25 07:04:00,331:DEBUG:acme.client:Requesting fresh nonce 2023-11-25 07:04:00,331:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-25 07:04:00,504:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-25 07:04:00,505:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:03:59 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnzJ2hG7DAaQRTdKLh93aBKZne9s8mRHEmF-3gnwXU84o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-25 07:04:00,505:DEBUG:acme.client:Storing nonce: jXyutbsnzJ2hG7DAaQRTdKLh93aBKZne9s8mRHEmF-3gnwXU84o 2023-11-25 07:04:00,505:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2023-11-25 07:04:00,513:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic256SjJoRzdEQWFRUlRkS0xoOTNhQktabmU5czhtUkhFbUYtM2dud1hVODRvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "pEJdWIJiKbEOcwWEdl6gdhu4ejr6nKFFAD78dog3_mIAzpKwE73qAK-5yW4ILDb4q6aU0Cv0t3vmc6OE1zVbJDon3OgP1H6tftHVx2F-jR7d9aAGTXCwafq7WLaCuZmdxWtoBU0Ke-CLulPz8pUQxCYg4WAK_bF39pw6kf7jBJyDwUMy2mdOR67f6uxZdPtFEtnVzaj70k1KpTyqlxK-_vVfQ5mBp9jEdL20I9hDNAy5t2zQ6eqpjf5OCt4zg2V59njqhU8tjCZEQSMTA_Y2EYsYezuzC5f1HpbNlL1gfKhU0WWGZbC-_FDYyjKwDHi3f4ZjWc9kUzz53vlPs4lUiA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-25 07:04:00,717:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-25 07:04:00,718:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Nov 2023 06:04:00 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796230126 Replay-Nonce: SFMYLIQjU3Zwqdnby-qWChlobaLvBoC8Zb_q1CNgJZbsMa_jkao X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:34Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066828686" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796230126" } 2023-11-25 07:04:00,718:DEBUG:acme.client:Storing nonce: SFMYLIQjU3Zwqdnby-qWChlobaLvBoC8Zb_q1CNgJZbsMa_jkao 2023-11-25 07:04:00,718:DEBUG:acme.client:JWS payload: b'' 2023-11-25 07:04:00,724:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066828686: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpVM1p3cWRuYnktcVdDaGxvYmFMdkJvQzhaYl9xMUNOZ0paYnNNYV9qa2FvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY4Mjg2ODYifQ", "signature": "n-sl4WcXgYNqsSLMgGlDN0zfD4jVEV8_DnZiVdKoCPdj-w5sZjfffnY7bXDwx-TodRyiIbX50WU6E9hOOD-QwwgMwLFL-FHds1Uj9_n-O2G7jvZr3eJ6GvmGHQHeLsOy25jn-35bpN677bwrcVv3UtkwYJjk2sm4x9R4CFj2Eq8LNdvxbc2voyXOd8EH4gwBGASY2noayCUvWIebOcAxmfSnaq_I1BC8fXelQ9nI_hnql353rTxR2znau-49rkagfNa-AzEAnF2X49QmcD7KdARAtrCqbL7eyiXvMBv34dLrj6gz1VwZAQ8AkJ-jrzwa8AY0G0M7MEF4N0in5ONh7g", "payload": "" } 2023-11-25 07:04:00,912:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066828686 HTTP/1.1" 200 805 2023-11-25 07:04:00,912:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:04:00 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjvOjABO6JSsGbm5WDgAB3UKBy-BsFqVdp4Bpa34NZm7g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:34Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066828686/TFIwLw", "token": "kAlE0kR-pqo9F_UYGQCvSB7TRTjOLQiZBJq_dZ7iFHs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066828686/se4r1w", "token": "kAlE0kR-pqo9F_UYGQCvSB7TRTjOLQiZBJq_dZ7iFHs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066828686/Hc2_wQ", "token": "kAlE0kR-pqo9F_UYGQCvSB7TRTjOLQiZBJq_dZ7iFHs" } ] } 2023-11-25 07:04:00,912:DEBUG:acme.client:Storing nonce: SFMYLIQjvOjABO6JSsGbm5WDgAB3UKBy-BsFqVdp4Bpa34NZm7g 2023-11-25 07:04:00,913:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-25 07:04:00,913:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2023-11-25 07:04:00,914:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-25 07:04:00,914:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-25 07:04:00,915:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-25 07:04:00,915:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-25 07:04:00,915:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-25 07:04:00,916:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-25 07:04:00,917:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-25 07:04:00,964:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-25 07:04:01,198:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-25 07:04:01,199:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-25 07:04:01,200:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-25 07:04:01,204:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:31:01 UTC. 2023-11-25 07:04:01,204:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-25 07:04:01,205:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-25 07:04:01,209:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-25 07:04:01,209:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-25 07:04:01,210:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-25 07:04:01,214:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-25 07:04:01,215:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-25 07:04:01,217:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-25 07:04:01,748:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-25 07:04:01,749:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:04:01 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "7ASy22gKqak": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-25 07:04:01,749:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-25 07:04:05,441:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7063_key-certbot.pem 2023-11-25 07:04:08,933:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7061_csr-certbot.pem 2023-11-25 07:04:08,933:DEBUG:acme.client:Requesting fresh nonce 2023-11-25 07:04:08,933:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-25 07:04:09,111:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-25 07:04:09,112:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:04:08 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjqsMx3jbzfuXUth-hCT62NrnaNmDpH-Lgye-7r3bmx4k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-25 07:04:09,112:DEBUG:acme.client:Storing nonce: SFMYLIQjqsMx3jbzfuXUth-hCT62NrnaNmDpH-Lgye-7r3bmx4k 2023-11-25 07:04:09,112:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2023-11-25 07:04:09,118:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpxc014M2piemZ1WFV0aC1oQ1Q2Mk5ybmFObURwSC1MZ3llLTdyM2JteDRrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "KiMMV9VWG-8MQ-3eiZhJnTN_wSEURutmqS4id35vOumoA_v-xQmK6Sy2eAa-6m50m0fLp-AMpecCHnx34ra2yTKbABlVVstbwWYUutT8vUtd_sYiG6i9SKI_eVhh4lrp72QP7wbaRrTvFbstjqvgMdyOQcqK1aaIrxOBpOB8oVEOiFiVmSxJHydOBAXrrGos0ZKrI6lN4P6aFeumNfxkzVq_yQT-kxalnp48RJVVbkKxtNh7X4cu-vTDY58uLA9w55CzLOZV_K2EttTvBGqFmHKQwgCZeetcHXhxallf0x6kVKqMlIEkwR9NB68kJgzFygGCYLwc-Ethfxp-UHfOiw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-25 07:04:09,335:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-25 07:04:09,336:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Nov 2023 06:04:08 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796249816 Replay-Nonce: SFMYLIQju3TyWenxP7B8vb2t1aJ0dLCucwBF6HPjpseZAxttQ60 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:42Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066858576" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796249816" } 2023-11-25 07:04:09,336:DEBUG:acme.client:Storing nonce: SFMYLIQju3TyWenxP7B8vb2t1aJ0dLCucwBF6HPjpseZAxttQ60 2023-11-25 07:04:09,336:DEBUG:acme.client:JWS payload: b'' 2023-11-25 07:04:09,341:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066858576: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWp1M1R5V2VueFA3Qjh2YjJ0MWFKMGRMQ3Vjd0JGNkhQanBzZVpBeHR0UTYwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY4NTg1NzYifQ", "signature": "YZELo4LZdhtacXmU7WTJ8N6VqY7ibdrefZaOfVJ8yjgm6iEAkkfUTag5xCaartmNwjfhCS28w3747P-fp04pFje_phwkF8hCfKqb4ncj-akb2huTx_VQlgdYGVlfya7ShLUmJ6UVMNtgJbnL9hAJSJRTBrr1ThJAbpgsx_8owG2uC_sFWxj9-ldUTd5zOmyBjFa6BJ0UBc4eHPeK436B-a4pllsenKn4Uvktp8zdVDJZ2aD3rl48mnjc9tnog_2ydRvh5_LT9qFL-KG7-XnqWMtzYQxWCBGep4rjBjy2kyquP9CKfncOIpTuslFCAZ-JxlN-Falm8AHvKAyGYkhjkA", "payload": "" } 2023-11-25 07:04:09,522:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066858576 HTTP/1.1" 200 805 2023-11-25 07:04:09,523:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Nov 2023 06:04:08 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjYxAYF0tSGCRRanL8WClqWXrgdGL3PPY4sTUYJXKPKzk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:42Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066858576/p5HniQ", "token": "vgTEYICaF9gMErZyGxBr6V0KD9ZEoeesWVIQ8h9Ks48" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066858576/JwX8uw", "token": "vgTEYICaF9gMErZyGxBr6V0KD9ZEoeesWVIQ8h9Ks48" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066858576/_ogaVA", "token": "vgTEYICaF9gMErZyGxBr6V0KD9ZEoeesWVIQ8h9Ks48" } ] } 2023-11-25 07:04:09,523:DEBUG:acme.client:Storing nonce: SFMYLIQjYxAYF0tSGCRRanL8WClqWXrgdGL3PPY4sTUYJXKPKzk 2023-11-25 07:04:09,523:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-25 07:04:09,524:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2023-11-25 07:04:09,524:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-25 07:04:09,525:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-25 07:04:09,525:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-25 07:04:09,526:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-25 07:04:09,526:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-25 07:04:09,526:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-25 07:04:09,527:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-25 07:04:09,528:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2023-11-25 07:04:09,528:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2023-11-25 07:04:09,529:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2023-11-25 07:04:09,530:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)