2023-11-23 20:45:36,223:DEBUG:certbot._internal.main:certbot version: 1.6.0 2023-11-23 20:45:36,223:DEBUG:certbot._internal.main:Arguments: [] 2023-11-23 20:45:36,223:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2023-11-23 20:45:37,183:DEBUG:certbot._internal.log:Root logging level set at 20 2023-11-23 20:45:37,183:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2023-11-23 20:45:37,226:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2023-11-23 20:45:37,274:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-23 20:45:37,747:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-23 20:45:37,759:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is signed by the certificate's issuer. 2023-11-23 20:45:37,763:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is: OCSPCertStatus.GOOD 2023-11-23 20:45:37,771:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:23 UTC. 2023-11-23 20:45:37,771:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 20:45:37,771:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-23 20:45:37,776:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-23 20:45:37,777:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-23 20:45:37,777:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-23 20:45:37,784:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-23 20:45:37,785:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-23 20:45:37,787:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-23 20:45:38,338:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-23 20:45:38,339:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:45:37 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Bmm-9uPmfH0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-23 20:45:38,340:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-23 20:45:43,519:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7012_key-certbot.pem 2023-11-23 20:45:48,253:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7010_csr-certbot.pem 2023-11-23 20:45:48,253:DEBUG:acme.client:Requesting fresh nonce 2023-11-23 20:45:48,253:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-23 20:45:48,431:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-23 20:45:48,431:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:45:47 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjt6anPOHdEWLmCBQsLauMlB6zySXKHAc6uU9qg8fhAn8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-23 20:45:48,432:DEBUG:acme.client:Storing nonce: SFMYLIQjt6anPOHdEWLmCBQsLauMlB6zySXKHAc6uU9qg8fhAn8 2023-11-23 20:45:48,432:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2023-11-23 20:45:48,438:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWp0NmFuUE9IZEVXTG1DQlFzTGF1TWxCNnp5U1hLSEFjNnVVOXFnOGZoQW44IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "YXhyvKyDz91jt0rPsOL7qK8P5k9IZCdByBV1klwi8gmzeXuCgq8FYQQZ0auwfXpSVStn7kO0qBONZZJ2LmwcqZhUgPXi_e4m49jEuRFUz7dU8OANAz6DbvEc0QonDPgfRkz9_58N8Cz0ZtexrF5rBNzv3q-SlNCuMM2Q_plb6DByZ4JkPEfnudCUj2Pie8sr3PLe-6YxN50mfbRyVHkRfrxiyursKWA23UGpDd6JXS235_mXPcJrJP2-eGIWftzOpvzbkMQq-gqliiAmj77BxV2bareBDBZDNDFRuCyXpRzN-KDAFIqE2jquzOMOogxzobU75Jb8Gpgd-mBxgDfU0Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-23 20:45:48,653:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2023-11-23 20:45:48,654:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 23 Nov 2023 19:45:47 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223795980256 Replay-Nonce: SFMYLIQjlXaD0d5u-6i8yecmtqJSVXtCVEgU7DwiLoaaPwGB1Cw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:00Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066491486" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223795980256" } 2023-11-23 20:45:48,654:DEBUG:acme.client:Storing nonce: SFMYLIQjlXaD0d5u-6i8yecmtqJSVXtCVEgU7DwiLoaaPwGB1Cw 2023-11-23 20:45:48,654:DEBUG:acme.client:JWS payload: b'' 2023-11-23 20:45:48,660:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066491486: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpsWGFEMGQ1dS02aTh5ZWNtdHFKU1ZYdENWRWdVN0R3aUxvYWFQd0dCMUN3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY0OTE0ODYifQ", "signature": "m7qTaMfV-nciTH-xcNuFCl4XMz_aN3o4zKuREazRgpLAHE-coggWiX5MIzLclAIiD361fo_JoTBK3Teuw7aU21XMi2sOc2RW6ZOBGAp7KideYZS5fbdoGFyIFWrDfOrFvtLWlA7ebpHN5oMe2Qj3rkUAx-8iTpRRRM4S0a7O42Icw6ZzG7Dcwh3E-a7Icz8mKlEdUvw9gZRk-w01lczMyycWojP1cyWhPKRVdQihf1JU-qyCg0f8o80a30lLWEVFNX9C6jRBE7S-uhROMEBK67EiGD3794an2s8Vr6bYlfZeLOvHCG44nZU5mesXw08tyRvIO4OuMDR9h4V-AywLtw", "payload": "" } 2023-11-23 20:45:48,853:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066491486 HTTP/1.1" 200 810 2023-11-23 20:45:48,854:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:45:47 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjwEt3ACXdSLQ-DtCUHcbWxmqYBbDoSJvidzBRAilQbwE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:00Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066491486/iZpoTw", "token": "sb15n-zcYGZjmBEw4udDUXuX-BTwRrUMF--2J3EM_48" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066491486/hLn7qQ", "token": "sb15n-zcYGZjmBEw4udDUXuX-BTwRrUMF--2J3EM_48" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066491486/g8UZBg", "token": "sb15n-zcYGZjmBEw4udDUXuX-BTwRrUMF--2J3EM_48" } ] } 2023-11-23 20:45:48,854:DEBUG:acme.client:Storing nonce: SFMYLIQjwEt3ACXdSLQ-DtCUHcbWxmqYBbDoSJvidzBRAilQbwE 2023-11-23 20:45:48,855:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-23 20:45:48,855:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2023-11-23 20:45:48,856:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-23 20:45:48,856:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-23 20:45:48,871:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 20:45:48,871:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-23 20:45:48,871:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-23 20:45:48,872:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-23 20:45:48,878:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 20:45:48,916:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-23 20:45:49,335:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-23 20:45:49,336:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-23 20:45:49,337:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-23 20:45:49,342:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:36 UTC. 2023-11-23 20:45:49,342:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 20:45:49,342:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-23 20:45:49,347:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-23 20:45:49,348:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-23 20:45:49,348:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-23 20:45:49,353:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-23 20:45:49,354:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-23 20:45:49,356:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-23 20:45:49,898:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-23 20:45:49,899:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:45:48 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "l0lRLDOdBpU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-23 20:45:49,900:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-23 20:45:54,502:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7013_key-certbot.pem 2023-11-23 20:45:58,904:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7011_csr-certbot.pem 2023-11-23 20:45:58,904:DEBUG:acme.client:Requesting fresh nonce 2023-11-23 20:45:58,905:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-23 20:45:59,087:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-23 20:45:59,087:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:45:57 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQj768Cnw09eCXqqJhLhhHslre8RSmqdRl_LNYFNU3vhgU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-23 20:45:59,087:DEBUG:acme.client:Storing nonce: SFMYLIQj768Cnw09eCXqqJhLhhHslre8RSmqdRl_LNYFNU3vhgU 2023-11-23 20:45:59,088:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2023-11-23 20:45:59,093:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWo3NjhDbncwOWVDWHFxSmhMaGhIc2xyZThSU21xZFJsX0xOWUZOVTN2aGdVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "tEf198xe2kGdZDV7JARVz6AI1BQm7yFuW8zMRkNEnghEobr-666a6uLo-JfkzTIfAqIZofC1eWl_tA660RcDDqNByjITgKrEFaGtdxCxUcB43fm2NIbxg-JYcc6SUI1iwpOcBF2m4xNtwRjGUugVpXDyc-1E540qBGuiu1IqUUNp2KT6W5P7SeSc6Tr6N8O9vbohiYSSPoKjbEdtwAjSxQT0dPy7IMCaPV6xUWCRM4TflM6OmfOXruofTXDjMU1wP5XrBRg9gShPgDJP-ORzqlMqMD4WD_23L8ze2iCK-IblPFvYFtXpmojv8SZKxIgM6ipDcpsMLEVdt-mJpqGD0w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-23 20:45:59,295:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2023-11-23 20:45:59,295:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 23 Nov 2023 19:45:58 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796010606 Replay-Nonce: jXyutbsnITeMpOuupsmlOIFi3sJK-ndks-OcGjM7tysCnNy3Kdc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:09Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066531206" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796010606" } 2023-11-23 20:45:59,296:DEBUG:acme.client:Storing nonce: jXyutbsnITeMpOuupsmlOIFi3sJK-ndks-OcGjM7tysCnNy3Kdc 2023-11-23 20:45:59,296:DEBUG:acme.client:JWS payload: b'' 2023-11-23 20:45:59,302:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066531206: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25JVGVNcE91dXBzbWxPSUZpM3NKSy1uZGtzLU9jR2pNN3R5c0NuTnkzS2RjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY1MzEyMDYifQ", "signature": "IStfdyY8K6-E5aFy_kIoFSL1cnhqhXFeVbrhGdYmoSHxD1JxmNUOW2KAOyCKPx4_hsUg45OZ13mDZLuuzhn06L403ka6Fc4t0HBsHDVZ1Jis9wUglw9mPm5G8o2LKpflk9p3IRvEtvn15Q8EJoH4qzlag-Ye9bsps1KvoCzs1WuVeSyo3xn4liw9_aQEobRfQ-RPqDcKanwFMx3143NiUE6XGX4JS51q1KOIphyv-Ng6IQiY6WJCF4GKOtFPKks0n_k42GErmC1-ATyAN68PRerkeFs0fS9p1nhME55uiQfnvs_4D8FPqHjXoUElQx8H4iYckWTO6V563s0NrNAcBg", "payload": "" } 2023-11-23 20:45:59,486:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066531206 HTTP/1.1" 200 804 2023-11-23 20:45:59,487:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:45:58 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjgTPn15D9ODJy0Czuiu8QUC8pALW0t63mRZdXZ4g2-Cw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:09Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066531206/HwkKGg", "token": "XnSnBmyZRInRNHNise1p6HXmMUAmTdgzqO5hi25GzvI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066531206/RFhChg", "token": "XnSnBmyZRInRNHNise1p6HXmMUAmTdgzqO5hi25GzvI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066531206/Q06UlA", "token": "XnSnBmyZRInRNHNise1p6HXmMUAmTdgzqO5hi25GzvI" } ] } 2023-11-23 20:45:59,487:DEBUG:acme.client:Storing nonce: SFMYLIQjgTPn15D9ODJy0Czuiu8QUC8pALW0t63mRZdXZ4g2-Cw 2023-11-23 20:45:59,488:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-23 20:45:59,488:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2023-11-23 20:45:59,489:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-23 20:45:59,489:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-23 20:45:59,490:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 20:45:59,490:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-23 20:45:59,490:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-23 20:45:59,490:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-23 20:45:59,492:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 20:45:59,547:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-23 20:45:59,777:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-23 20:45:59,778:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-23 20:45:59,780:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-23 20:45:59,784:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:49 UTC. 2023-11-23 20:45:59,784:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 20:45:59,785:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-23 20:45:59,789:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-23 20:45:59,790:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-23 20:45:59,790:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-23 20:45:59,802:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-23 20:45:59,802:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-23 20:45:59,804:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-23 20:46:00,335:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-23 20:46:00,336:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:45:59 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "dtxTNnASyFU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-23 20:46:00,336:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-23 20:46:05,099:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7014_key-certbot.pem 2023-11-23 20:46:09,472:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7012_csr-certbot.pem 2023-11-23 20:46:09,472:DEBUG:acme.client:Requesting fresh nonce 2023-11-23 20:46:09,472:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-23 20:46:09,650:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-23 20:46:09,650:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:46:08 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnLfptCxhwVbGTMvALu-jY1QmPkOqt2seoFbxYbgRpXv0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-23 20:46:09,650:DEBUG:acme.client:Storing nonce: jXyutbsnLfptCxhwVbGTMvALu-jY1QmPkOqt2seoFbxYbgRpXv0 2023-11-23 20:46:09,651:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2023-11-23 20:46:09,657:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25MZnB0Q3hod1ZiR1RNdkFMdS1qWTFRbVBrT3F0MnNlb0ZieFliZ1JwWHYwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "rFvLeYguK5FG5F04y7OAuxFhZYkQOB5-P_M-veTfDBH-HNcvassgWBKgVCE-to8OfYE7ZGTVE29zPBWwRtd1pa75C4QMkVw3GNGbdZsWn4nIIZcVHtE-h7kvOVQ1zZjNn4eF4EXH_IlgVUWq5NDJ1W2ddOy_wBx2hdKcsbJ-btSkjDMxbZsPgx95BsHkpkBsb_9IJMVXWy96s1BdSncIU86GiuxOV08Mpj32s54RL4pS9NdeY6CPZ_rI6Ok9CMfhvdKuQa8g285mG4CH2CQqLxVFCNGRy7NKWz4h57DLDJ5hbkLDJTbH70SvmOUwgOQOgGvwL5yXHrxvuWuZEkiZ6Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-23 20:46:09,897:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2023-11-23 20:46:09,897:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 23 Nov 2023 19:46:08 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796034066 Replay-Nonce: jXyutbsnv2Y0y0CpEJzHw8Ss2hS4lsGl_oRCSqRLXGCab_TjB8Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:17Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066566356" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796034066" } 2023-11-23 20:46:09,898:DEBUG:acme.client:Storing nonce: jXyutbsnv2Y0y0CpEJzHw8Ss2hS4lsGl_oRCSqRLXGCab_TjB8Q 2023-11-23 20:46:09,898:DEBUG:acme.client:JWS payload: b'' 2023-11-23 20:46:09,902:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066566356: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic252MlkweTBDcEVKekh3OFNzMmhTNGxzR2xfb1JDU3FSTFhHQ2FiX1RqQjhRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY1NjYzNTYifQ", "signature": "tdsnA8wqarcIsihoOqrz8P_M3u-798_61dSidIAR56q8KcwHsfGIXOFAPHiCvp3MJ0UjFB3qb1fKOyqUKV8LAc4xjc4oZg1qhHEaWcmpPkoBEI1bWm7I7YqWNAOSAjRd8aPKrEyBuCadSy1SEJ141NnG-572nxn1ae5dbFkcKNjZ_7xjsmWa8U_gJjEq_xo-jPnePA-pXZUt4bIKDKfcbdEv72xWM85masm0ZXCiLcOfXVaeokZKWxeA9vuSTExMgZZzcCgzH2QP0t4gogJnpuA6SPaRVAXeo9egm9P7rIUqEJvL1RzQaVpYZzdT4vmaC2P2jsWYwna4pOIGTUcQ-Q", "payload": "" } 2023-11-23 20:46:10,085:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066566356 HTTP/1.1" 200 807 2023-11-23 20:46:10,086:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:46:08 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnzXdxLhXCZOFVnhjD-PsA9gz0koMKF11XyTiNzKaGCPU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:17Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066566356/Ahrirw", "token": "4G7MK_dXMu2C2sZjEzJh8AI0cmHBR_DIlPql7MrNzK0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066566356/5ji8UA", "token": "4G7MK_dXMu2C2sZjEzJh8AI0cmHBR_DIlPql7MrNzK0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066566356/9qmJcg", "token": "4G7MK_dXMu2C2sZjEzJh8AI0cmHBR_DIlPql7MrNzK0" } ] } 2023-11-23 20:46:10,086:DEBUG:acme.client:Storing nonce: jXyutbsnzXdxLhXCZOFVnhjD-PsA9gz0koMKF11XyTiNzKaGCPU 2023-11-23 20:46:10,086:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-23 20:46:10,087:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2023-11-23 20:46:10,087:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-23 20:46:10,087:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-23 20:46:10,088:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 20:46:10,088:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-23 20:46:10,088:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-23 20:46:10,089:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-23 20:46:10,090:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 20:46:10,145:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-23 20:46:10,183:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-23 20:46:10,183:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-23 20:46:10,184:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-23 20:46:10,189:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:02 UTC. 2023-11-23 20:46:10,189:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 20:46:10,189:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-23 20:46:10,194:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-23 20:46:10,194:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-23 20:46:10,194:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-23 20:46:10,199:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-23 20:46:10,200:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-23 20:46:10,202:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-23 20:46:10,739:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-23 20:46:10,740:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:46:09 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "p-ciRtRrerY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-23 20:46:10,741:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-23 20:46:15,190:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7015_key-certbot.pem 2023-11-23 20:46:19,580:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7013_csr-certbot.pem 2023-11-23 20:46:19,581:DEBUG:acme.client:Requesting fresh nonce 2023-11-23 20:46:19,581:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-23 20:46:19,758:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-23 20:46:19,760:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:46:18 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnOkeq-P1naVRMNyaSFUEjRgysl5zsj9kxvN1JmeMrecs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-23 20:46:19,760:DEBUG:acme.client:Storing nonce: jXyutbsnOkeq-P1naVRMNyaSFUEjRgysl5zsj9kxvN1JmeMrecs 2023-11-23 20:46:19,760:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2023-11-23 20:46:19,765:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25Pa2VxLVAxbmFWUk1OeWFTRlVFalJneXNsNXpzajlreHZOMUptZU1yZWNzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Bkj5v9Hg7IPjbwMqo7WNMvr2n6BLpBfK7UPrK9Gqme3AKqkJNzfn0IjEJv1bT8UwxoqDd3_voa7k-XvSr414SlfGc0LUydeABc6xNaZG8Ce91kbDirwmyVgHgOme8TYmV9k9osKWeRRzdGChFZtXT6Hp2T9ICImAAJ8LeqbWbNGiBtrDic-p7NwwiCHNQSjuhS_McqvEfV8jneJ0DePQUdjhzkyJInB0GdNOTQenoCqfq4LjVYVT1QpZiDW1BCplVY31pc7n6QKzlPBL9LNzej7SPvH3FBhu19OUKoLBwXDSzBC4MM52DMzCaGKEOMm2Ep6xuvB_AHy5B0JYcyUM9A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-23 20:46:19,962:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2023-11-23 20:46:19,963:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 23 Nov 2023 19:46:18 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796055606 Replay-Nonce: jXyutbsnT-TQpeu3XnMkLvwIPX67-JnYnWN39iIg9TKXRsUnqOs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:26Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066598576" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796055606" } 2023-11-23 20:46:19,963:DEBUG:acme.client:Storing nonce: jXyutbsnT-TQpeu3XnMkLvwIPX67-JnYnWN39iIg9TKXRsUnqOs 2023-11-23 20:46:19,963:DEBUG:acme.client:JWS payload: b'' 2023-11-23 20:46:19,969:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066598576: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25ULVRRcGV1M1huTWtMdndJUFg2Ny1KblluV04zOWlJZzlUS1hSc1VucU9zIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY1OTg1NzYifQ", "signature": "TNSzlJrtwmymG486JwyXlJ9mgv9BkAScTiqHW9BDPXFWsVyoBy3tlqzKHWPb9UEqLumtOtkHWcVklC_IB2ds4TkLQVs4aXEG8lEOVvUz2XiBIx9CU2rjzRTWTpd-aNL5NDnW81qDLsQzdZe7uJmKgDw_GXSGcWl1hdfdcFIOyxju2R5GocHLYWCPtwndpHxvFPWJooKL2oTfyLN6iKoz87XeyV4Zbpy0ynNZhsZfyLqShY0cpIxAgg7ZmThzTG_nhfSvox2dzDLD4caNQEAQulKZB1ZqGq0fUaXJ4yqUdReDyKnsSavC1idrTQzyzz4ItwKCF8UwM5dZkgtvmJnLbQ", "payload": "" } 2023-11-23 20:46:20,149:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066598576 HTTP/1.1" 200 801 2023-11-23 20:46:20,150:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:46:18 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQj0WJuwF4sEH9Kx31R_HZwvI_ff4eOjRAHZF_C96YOFMA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:26Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066598576/f3URKA", "token": "J6ZL0EQU-jtK9avoLKda1DkzwcegKRZen1GsEEp4cxs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066598576/iDceBQ", "token": "J6ZL0EQU-jtK9avoLKda1DkzwcegKRZen1GsEEp4cxs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066598576/LT38xQ", "token": "J6ZL0EQU-jtK9avoLKda1DkzwcegKRZen1GsEEp4cxs" } ] } 2023-11-23 20:46:20,150:DEBUG:acme.client:Storing nonce: SFMYLIQj0WJuwF4sEH9Kx31R_HZwvI_ff4eOjRAHZF_C96YOFMA 2023-11-23 20:46:20,151:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-23 20:46:20,151:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2023-11-23 20:46:20,152:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-23 20:46:20,152:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-23 20:46:20,153:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 20:46:20,153:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-23 20:46:20,153:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-23 20:46:20,153:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-23 20:46:20,154:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 20:46:20,211:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-23 20:46:20,445:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-23 20:46:20,446:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-23 20:46:20,447:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-23 20:46:20,452:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:14 UTC. 2023-11-23 20:46:20,452:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 20:46:20,452:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-23 20:46:20,457:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-23 20:46:20,457:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-23 20:46:20,458:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-23 20:46:20,473:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-23 20:46:20,474:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-23 20:46:20,476:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-23 20:46:21,008:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-23 20:46:21,008:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:46:19 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "4A86wOxxbMk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-23 20:46:21,009:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-23 20:46:25,838:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7016_key-certbot.pem 2023-11-23 20:46:30,168:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7014_csr-certbot.pem 2023-11-23 20:46:30,168:DEBUG:acme.client:Requesting fresh nonce 2023-11-23 20:46:30,169:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-23 20:46:30,346:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-23 20:46:30,347:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:46:29 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnOcjoyBj7zjOO6OZFHJvLE-2CcTPavEtbeKyZdnlimKM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-23 20:46:30,347:DEBUG:acme.client:Storing nonce: jXyutbsnOcjoyBj7zjOO6OZFHJvLE-2CcTPavEtbeKyZdnlimKM 2023-11-23 20:46:30,347:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2023-11-23 20:46:30,353:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25PY2pveUJqN3pqT082T1pGSEp2TEUtMkNjVFBhdkV0YmVLeVpkbmxpbUtNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "OB8RYSUBmMi_-_6cdJADSwyffseSfGkmS1-MLl08hSaLbG4CCH-0BXj2JgxUhCj8ql-cJM5c1BW2ZqQ6Y_8Z9x4b-1TK2WFo8kQJef19s-c85C8sSyzgJoWwq0Az1SRvyRAC49SksVph7gY5AjVyr3eeY5-QoZO8jbsULus2YitPgOms7HDVHowYCeFxvhcesVII5F7pkA6sDzs0ylWMFEOsOGxVkWdi1oR8ELrO7FWCJmpoV1pP6Z-2Wl6g5CEMjqgOStvnRIYqiti-XRzKuGQR_xUCHz7DL5mwpqk4FuGbZFLcK_YuLm0PHGVnaci446cUz20pEPaFeQQqXXhVyw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-23 20:46:30,552:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-23 20:46:30,553:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 23 Nov 2023 19:46:29 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796073426 Replay-Nonce: jXyutbsnXEYRfCkDfE_4RIMTwpXaxk_u0KgoIaprNMf-hL1yhfQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:34Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066622126" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796073426" } 2023-11-23 20:46:30,553:DEBUG:acme.client:Storing nonce: jXyutbsnXEYRfCkDfE_4RIMTwpXaxk_u0KgoIaprNMf-hL1yhfQ 2023-11-23 20:46:30,553:DEBUG:acme.client:JWS payload: b'' 2023-11-23 20:46:30,559:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066622126: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25YRVlSZkNrRGZFXzRSSU1Ud3BYYXhrX3UwS2dvSWFwck5NZi1oTDF5aGZRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2MjIxMjYifQ", "signature": "ARp0tL0iEyKXMp81G3FT8wcLBKGCCISiS7FdiQZxjt4XTDGuEQWK6ktDCXtwRrvRf9e9mW58w6vDvauGs9t6cwjBtiJzymdpUan9TPlqvZTHZFONRmORvUVq13sA2a57uveueEOm_x-i8iJHgHM-pejrf1adibwmuBdqvTr8WsK_ZqrgnO5Mixsa8syicCTZU7aIc9QSUu92rf4RN4h6QooGXpoHJwYAMYPyc2zQ7sIJRmB59OtS3MFrLz67ngw3IO_tkCMipYNSxEboV0YoAo6fSKr8653f6cekOynFXfMcS-b38uy0Eml4GHOVNpLVAhw6nFhfRacSPkEimD-W-A", "payload": "" } 2023-11-23 20:46:30,741:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066622126 HTTP/1.1" 200 805 2023-11-23 20:46:30,741:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:46:29 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsn-xtyAgC68q9WaqHtolIa9bUC17HSdK9tmK-aGKqmAgM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:34Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066622126/zRCxuQ", "token": "gv2fmd0seZNcl7Js9O_Y9lNTlUdsETbsewgxCi8k0AI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066622126/gv15MQ", "token": "gv2fmd0seZNcl7Js9O_Y9lNTlUdsETbsewgxCi8k0AI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066622126/tryPHA", "token": "gv2fmd0seZNcl7Js9O_Y9lNTlUdsETbsewgxCi8k0AI" } ] } 2023-11-23 20:46:30,742:DEBUG:acme.client:Storing nonce: jXyutbsn-xtyAgC68q9WaqHtolIa9bUC17HSdK9tmK-aGKqmAgM 2023-11-23 20:46:30,742:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-23 20:46:30,743:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2023-11-23 20:46:30,743:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-23 20:46:30,743:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-23 20:46:30,744:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 20:46:30,744:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-23 20:46:30,745:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-23 20:46:30,745:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-23 20:46:30,746:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 20:46:30,795:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-23 20:46:31,045:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-23 20:46:31,046:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-23 20:46:31,047:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-23 20:46:31,051:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:27 UTC. 2023-11-23 20:46:31,052:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 20:46:31,052:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-23 20:46:31,057:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-23 20:46:31,057:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-23 20:46:31,057:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-23 20:46:31,073:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-23 20:46:31,074:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-23 20:46:31,076:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-23 20:46:31,648:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-23 20:46:31,648:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:46:30 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "FfwBBi07haY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-23 20:46:31,649:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-23 20:46:36,048:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7017_key-certbot.pem 2023-11-23 20:46:40,469:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7015_csr-certbot.pem 2023-11-23 20:46:40,469:DEBUG:acme.client:Requesting fresh nonce 2023-11-23 20:46:40,470:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-23 20:46:40,648:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-23 20:46:40,648:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:46:39 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsn8xXgrtB2TnGPbb9oU4wUnNp6YFWzVR_pgva8ImMIPvI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-23 20:46:40,648:DEBUG:acme.client:Storing nonce: jXyutbsn8xXgrtB2TnGPbb9oU4wUnNp6YFWzVR_pgva8ImMIPvI 2023-11-23 20:46:40,648:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2023-11-23 20:46:40,654:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic244eFhncnRCMlRuR1BiYjlvVTR3VW5OcDZZRld6VlJfcGd2YThJbU1JUHZJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "lHGAL7JrJY7Jg66T3K8zfumH-Uum0fCbAObkkL-zBbUqBxAOOnXuXp2-7LyhzWAEzkP-_y4Z-Gk1wdG9CnMJqEKePtd2iUXFDimtnd9Z7vPgXcrmlQfgrppqHd6XAOE66RdpYuulNidf3eqOIdIlE_QkYnoizAUH8hiF4ChiA1rQYHWzQXinBYZ-1-UJb1VIPkoMVuW77KgEtnn4Lqp6C9nTix7yho16xzvTd4MQVJd6QMazAJ3SCs0Mgowa1UKkcY2Ajyt8UQ2b8wVFokjwQSRMcwAjP16q7O95KQw415VgtC8O9WjMoHFWDKYEyultK9q6E_zDaPnuGIlyYvQpkw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-23 20:46:40,858:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2023-11-23 20:46:40,858:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 23 Nov 2023 19:46:39 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796091136 Replay-Nonce: jXyutbsnMOC2JuDK4_0pqQhTuNPTD_0Gug_W1EzjsSqnFBxS8Kg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:43Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066646896" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796091136" } 2023-11-23 20:46:40,858:DEBUG:acme.client:Storing nonce: jXyutbsnMOC2JuDK4_0pqQhTuNPTD_0Gug_W1EzjsSqnFBxS8Kg 2023-11-23 20:46:40,859:DEBUG:acme.client:JWS payload: b'' 2023-11-23 20:46:40,865:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066646896: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25NT0MySnVESzRfMHBxUWhUdU5QVERfMEd1Z19XMUV6anNTcW5GQnhTOEtnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2NDY4OTYifQ", "signature": "ChtiYrzwazh1PWDM-jH6mc6zKnCpJ7ac3p_yJuIa2xYW6J62fn5DN-lK15MHD89YcrxvTyAncNE2LGm_zY3bS5j9NOI0pir7O4P25Ajn7htciob-UaU_LiXRYuveYnLgtzjzf1UhCPsjrk-LAEBvtV_FLbA4Vks0JT7zcgyQpjy8mBkdPAS9annGbz5dh_3MpXXP1LJnMchMGLAhhm5A-ruEIb4fqdFaQXstMMx8yKtZmXt_cWK-CX-w3VzVQ7QHJJaPRGhXT6aXlWBKP_HUIb_L-QZZz-WMs9oC0M63O79ODay9DacBajU-0Ra2h0LH2N1iOy5842K0AP1a6Ya0Hg", "payload": "" } 2023-11-23 20:46:41,045:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066646896 HTTP/1.1" 200 809 2023-11-23 20:46:41,046:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:46:39 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQj9EypqeCGbUIhxE8DMSA1a1Mkh9uqLkOTRW-rsk-V8rQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:43Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066646896/juW_-A", "token": "CWWUm3uLuT3l53wpiS92M-Qv-NaCbupUBW732wE0vd8" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066646896/EWbN0Q", "token": "CWWUm3uLuT3l53wpiS92M-Qv-NaCbupUBW732wE0vd8" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066646896/0CyP5g", "token": "CWWUm3uLuT3l53wpiS92M-Qv-NaCbupUBW732wE0vd8" } ] } 2023-11-23 20:46:41,046:DEBUG:acme.client:Storing nonce: SFMYLIQj9EypqeCGbUIhxE8DMSA1a1Mkh9uqLkOTRW-rsk-V8rQ 2023-11-23 20:46:41,047:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-23 20:46:41,047:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2023-11-23 20:46:41,048:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-23 20:46:41,048:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-23 20:46:41,049:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 20:46:41,049:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-23 20:46:41,049:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-23 20:46:41,049:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-23 20:46:41,050:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 20:46:41,088:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-23 20:46:41,496:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-23 20:46:41,497:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-23 20:46:41,498:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-23 20:46:41,502:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:41 UTC. 2023-11-23 20:46:41,503:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 20:46:41,503:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-23 20:46:41,508:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-23 20:46:41,509:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-23 20:46:41,509:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-23 20:46:41,514:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-23 20:46:41,515:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-23 20:46:41,517:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-23 20:46:42,048:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-23 20:46:42,049:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:46:40 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "X9bCMRxMnNo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-23 20:46:42,049:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-23 20:46:46,505:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7018_key-certbot.pem 2023-11-23 20:46:50,911:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7016_csr-certbot.pem 2023-11-23 20:46:50,911:DEBUG:acme.client:Requesting fresh nonce 2023-11-23 20:46:50,912:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-23 20:46:51,089:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-23 20:46:51,090:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:46:49 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjiqlDRBiCzFG-7M1ob3Z6dBJhlNna8Bv-NruGVr-UaA4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-23 20:46:51,090:DEBUG:acme.client:Storing nonce: SFMYLIQjiqlDRBiCzFG-7M1ob3Z6dBJhlNna8Bv-NruGVr-UaA4 2023-11-23 20:46:51,090:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2023-11-23 20:46:51,096:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWppcWxEUkJpQ3pGRy03TTFvYjNaNmRCSmhsTm5hOEJ2LU5ydUdWci1VYUE0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "HIWZX5yGigjxMa5fGZd1O7GBNvdnrHKrxH3ovut2E5AfPayEqMYHGZke9yR11Ia-pctNhwZQDvbyO3SOEHrWpzuOZKIjsUF2fa160XiFX4p3fO8qmkuOiOJa7UD6UWA5jG7f5x7wkgpfXWaIQ-3AyD1ZcXj0D620icm0Uw9T3KqagDJtaNBXlpkA4llGU-JqVTgDJ-YUa58kSkQKWTny_F6VdiL1XhO9I7sT8UtmKXMzKu05sRr26PpWpJtdyckfCB7NnnWcxtvPwGuK4gsYqlB0fcOIjpEKeQOuDXD6gEt-gygHaVbdib_BcZ2yDX0zm7PgGp209SZK1DDEndWs-A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-23 20:46:51,297:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2023-11-23 20:46:51,298:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 23 Nov 2023 19:46:50 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796108646 Replay-Nonce: SFMYLIQj0aYiSAKfTIswkANJnpxMz3PT_Pbhx4Lj_vZj_iGCZow X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:52Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066669286" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796108646" } 2023-11-23 20:46:51,298:DEBUG:acme.client:Storing nonce: SFMYLIQj0aYiSAKfTIswkANJnpxMz3PT_Pbhx4Lj_vZj_iGCZow 2023-11-23 20:46:51,298:DEBUG:acme.client:JWS payload: b'' 2023-11-23 20:46:51,304:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066669286: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWowYVlpU0FLZlRJc3drQU5KbnB4TXozUFRfUGJoeDRMal92WmpfaUdDWm93IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2NjkyODYifQ", "signature": "XqTFro2JMET9H7rqC4lcwixISrFgts0zXPwSd_Hn9yfxHTWzEsasCF18EGyqwGp6U1GhcFpKmctlZ48hjb6TulFuTsozxSVPacPtOcECXuv06VxXUC7oPyx_YXp3H8YkokVCcINcdiENJJ6FximNV0g-jEqXmqyI5L8qCgqMRJ7xs9r31U8ZLjTXAR-W2YAXrjEHBH2pnYZrrmIU6ih2xxElUkEOpI-MHDXFXWYeL0dlLUCNzPcx_Ux5ugKpWD4MY9iPtvAOVmPijZvnN6sYbZQhx_c_AQRqLu4dp_h9Yu0ZVt5ZjpBPJtZEzIe0c-e4DlWGCSIl_eSCuRK_C7oZOQ", "payload": "" } 2023-11-23 20:46:51,485:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066669286 HTTP/1.1" 200 806 2023-11-23 20:46:51,486:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:46:50 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjgOUyPLg6f6axs32zIRM_T3Oy3DoNg4wIlXDNVxsmwjI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:52Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066669286/DZCB_w", "token": "FOLQeQhM5d7jUf4G9Qq1v4w7kH45foXttXys0ZoHmyY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066669286/3LwN7g", "token": "FOLQeQhM5d7jUf4G9Qq1v4w7kH45foXttXys0ZoHmyY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066669286/N8DWOw", "token": "FOLQeQhM5d7jUf4G9Qq1v4w7kH45foXttXys0ZoHmyY" } ] } 2023-11-23 20:46:51,486:DEBUG:acme.client:Storing nonce: SFMYLIQjgOUyPLg6f6axs32zIRM_T3Oy3DoNg4wIlXDNVxsmwjI 2023-11-23 20:46:51,487:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-23 20:46:51,487:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2023-11-23 20:46:51,488:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-23 20:46:51,488:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-23 20:46:51,489:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 20:46:51,489:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-23 20:46:51,489:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-23 20:46:51,489:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-23 20:46:51,490:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 20:46:51,543:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2023-11-23 20:46:51,544:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 20:46:51,544:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2023-11-23 20:46:51,552:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2023-11-23 20:46:51,555:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2023-11-23 20:46:51,555:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2023-11-23 20:46:51,555:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2023-11-23 20:46:51,556:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2023-11-23 20:46:51,558:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2023-11-23 20:46:51,599:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-23 20:46:51,843:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-23 20:46:51,846:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-23 20:46:51,847:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-23 20:46:51,852:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:56 UTC. 2023-11-23 20:46:51,852:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 20:46:51,852:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-23 20:46:51,857:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-23 20:46:51,858:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-23 20:46:51,858:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-23 20:46:51,863:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-23 20:46:51,863:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-23 20:46:51,865:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-23 20:46:52,388:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-23 20:46:52,389:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:46:51 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "e-nna1AcOW0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-23 20:46:52,389:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-23 20:46:57,122:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7019_key-certbot.pem 2023-11-23 20:47:01,484:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7017_csr-certbot.pem 2023-11-23 20:47:01,484:DEBUG:acme.client:Requesting fresh nonce 2023-11-23 20:47:01,484:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-23 20:47:01,658:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-23 20:47:01,659:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:47:00 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjhXgAWbAmtvz2pfC-3Y0h8m2kFYLNBAjHBOnqW3Ue5Pg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-23 20:47:01,659:DEBUG:acme.client:Storing nonce: SFMYLIQjhXgAWbAmtvz2pfC-3Y0h8m2kFYLNBAjHBOnqW3Ue5Pg 2023-11-23 20:47:01,659:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2023-11-23 20:47:01,665:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpoWGdBV2JBbXR2ejJwZkMtM1kwaDhtMmtGWUxOQkFqSEJPbnFXM1VlNVBnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "qSB_YBylN9pFWNIWlhU2UBkWY9VmIPFMdOV9GIhvmGFryqqL3kOVMWUamN3SNC5Ga71LzN3TpFWpb406rDxuoWBG-7BIP6KQOd87IHyXqATIc-RYammwcwUeRr9gzbmnXLSH4ilHzGIIznmSXjyhV_vVYyUwi0zlSIwAQGPhi0N5EQUUsm5Bu9tzoy3G3rc_zpbg8aq98aSrkIh4dkthUqaT-9St86JVC8KyhTbJOJjgBPnLVYOkx8cwL-z1BkATyb6fe_W0TtTxxgZbSpzijndNUuRZcuz6AjUn21X9amSKJbbWJnqkKOlme3QKaEvZJMMkbfddkCRiEwaerQcoKA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-23 20:47:01,876:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2023-11-23 20:47:01,877:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 23 Nov 2023 19:47:00 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796125916 Replay-Nonce: jXyutbsnkcYHFtFF0EgcOIDXJWvFJcOKblmDx_xluaRLKGufqsI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:00Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066692866" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796125916" } 2023-11-23 20:47:01,877:DEBUG:acme.client:Storing nonce: jXyutbsnkcYHFtFF0EgcOIDXJWvFJcOKblmDx_xluaRLKGufqsI 2023-11-23 20:47:01,877:DEBUG:acme.client:JWS payload: b'' 2023-11-23 20:47:01,883:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066692866: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25rY1lIRnRGRjBFZ2NPSURYSld2RkpjT0tibG1EeF94bHVhUkxLR3VmcXNJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2OTI4NjYifQ", "signature": "S-K63uk-VQNLSBVBG--hGqBWdIGR4W7Ubhsp2_QrPiiDTvhdTNtVHs83G7H33Er8gyHTGHqXIYOCB955iS3dbrAzI09gdN2_Mb8Hs_u1kRlZWZ8m5uFrqpqDRjC-3XmtXFUgdKND14FZP14Rv2RbcpFTeORbYf8zAfogB6eNqPKBRERH4x8YrzRaBKf92lhIkEJE9Juy_2-Dl14YVJa1Z8Oe63yMh38X8D6wn75pkDUNP3vkPvU3opTZh4hj0H764w38XuCEh83BX4NsrUxdwbMcQCwJZ_ZbPCaceWcrZ52uKqIuEhqRjM0WfWX8ZAuMjfHC19Nn3rhkCmq81zT5Gg", "payload": "" } 2023-11-23 20:47:02,059:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066692866 HTTP/1.1" 200 811 2023-11-23 20:47:02,060:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:47:00 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjxJod1t-NE3TFa2aWbvf4RfGkCBXWdP1pAfhQwos9sSc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:00Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066692866/TZHJ0A", "token": "otJKkgRT8z2VOaRDiAmAclIadkc79VXFNmsAESfM3y0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066692866/YBeUJQ", "token": "otJKkgRT8z2VOaRDiAmAclIadkc79VXFNmsAESfM3y0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066692866/i1p7PQ", "token": "otJKkgRT8z2VOaRDiAmAclIadkc79VXFNmsAESfM3y0" } ] } 2023-11-23 20:47:02,060:DEBUG:acme.client:Storing nonce: SFMYLIQjxJod1t-NE3TFa2aWbvf4RfGkCBXWdP1pAfhQwos9sSc 2023-11-23 20:47:02,061:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-23 20:47:02,061:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2023-11-23 20:47:02,062:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-23 20:47:02,062:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-23 20:47:02,063:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 20:47:02,063:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-23 20:47:02,063:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-23 20:47:02,064:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-23 20:47:02,065:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 20:47:02,117:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-23 20:47:02,525:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-23 20:47:02,526:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-23 20:47:02,527:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-23 20:47:02,532:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:09 UTC. 2023-11-23 20:47:02,532:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 20:47:02,532:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-23 20:47:02,537:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-23 20:47:02,537:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-23 20:47:02,537:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-23 20:47:02,543:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-23 20:47:02,544:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-23 20:47:02,546:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-23 20:47:03,076:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-23 20:47:03,077:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:47:01 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "1PNi36-_A4M": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-23 20:47:03,077:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-23 20:47:07,886:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7020_key-certbot.pem 2023-11-23 20:47:12,237:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7018_csr-certbot.pem 2023-11-23 20:47:12,238:DEBUG:acme.client:Requesting fresh nonce 2023-11-23 20:47:12,238:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-23 20:47:12,416:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-23 20:47:12,417:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:47:11 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnG-rIGUfxQ_hRL2jGVWj1vom7IjsxXfMOSacLtxHhu7s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-23 20:47:12,417:DEBUG:acme.client:Storing nonce: jXyutbsnG-rIGUfxQ_hRL2jGVWj1vom7IjsxXfMOSacLtxHhu7s 2023-11-23 20:47:12,419:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2023-11-23 20:47:12,425:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25HLXJJR1VmeFFfaFJMMmpHVldqMXZvbTdJanN4WGZNT1NhY0x0eEhodTdzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "B_f9zw-JXOJnqc4jgkGUoQVWGH1dcvjs9a5kyUfKW1zefDqAZ1LDRD13bY9tVb00vnsEP_c6RlM--CLwPs2h_h6_TGbEMfnMf-AvPkwBgDLbhq_DAWRCMqE4-dqY9nexHma_IcbdmD-sH3EUGvwBInNzpaQ0TZ-ZQmx077Yu8IrLu6_bfujAzL5o7tsRnqLA3qPg-lUwo733ozVSV7I3Jk-54eAeuc6b2pUWeCNVIbWmjUrOo-UeiUKBRM509xTALwFmtc1OnvXB2Z7gQF2pJ092UFQv5LmLSYE5kxMCOw8PNmfkSFthkFxuFZMJPsq38HMm17u2ddXHkJwUqEbswA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-23 20:47:12,618:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2023-11-23 20:47:12,619:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 23 Nov 2023 19:47:11 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796165656 Replay-Nonce: SFMYLIQjbVvxggOfsYYPiceWrDRqz3m-FNyrDIup1_GloCXZ4bE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:08Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066738016" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796165656" } 2023-11-23 20:47:12,619:DEBUG:acme.client:Storing nonce: SFMYLIQjbVvxggOfsYYPiceWrDRqz3m-FNyrDIup1_GloCXZ4bE 2023-11-23 20:47:12,620:DEBUG:acme.client:JWS payload: b'' 2023-11-23 20:47:12,625:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066738016: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpiVnZ4Z2dPZnNZWVBpY2VXckRScXozbS1GTnlyREl1cDFfR2xvQ1haNGJFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY3MzgwMTYifQ", "signature": "NeQh_APkkSgHwTva95BbNjWB5jrCMfDxARcrTaLi_O4dgTAKFsyly5KavAxsmqOgGgh0KFhUsyOIzZepVzYFiXEiaEfIq-0qk-25Cni1yF2bXUpC-GB-TfBoS-VrPnR9cgkvN8e2qjSQbTiXJ8_-THFl5ib1s-bTp73v3PlocscnMth9aM2tObcrUkouTvQX1IuqMN347CU19o3uyalTZpmmVdApi93pmFV9WOZ4V0OsHPGtNeVqqt00eLHHvqX36Dz7hqTpe5d6m9iVH6Yt-iiEPuNP_MMCXnW4Lhh9Y6_4rF9Hj6YkQdunBwO44L4iH0sBY5U8rkAeH22DVAdzyA", "payload": "" } 2023-11-23 20:47:12,817:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066738016 HTTP/1.1" 200 810 2023-11-23 20:47:12,818:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:47:11 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjBTSv69HgyyzaaftJx_5Q1j212AEd-m291czud7qdnBw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:08Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066738016/ypE5ag", "token": "6TDiXsqmeP1Jr6MAv3ggvn4O3hX5INT6PvOa_y3w6tM" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066738016/HUvErQ", "token": "6TDiXsqmeP1Jr6MAv3ggvn4O3hX5INT6PvOa_y3w6tM" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066738016/nzokTQ", "token": "6TDiXsqmeP1Jr6MAv3ggvn4O3hX5INT6PvOa_y3w6tM" } ] } 2023-11-23 20:47:12,818:DEBUG:acme.client:Storing nonce: SFMYLIQjBTSv69HgyyzaaftJx_5Q1j212AEd-m291czud7qdnBw 2023-11-23 20:47:12,819:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-23 20:47:12,819:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2023-11-23 20:47:12,820:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-23 20:47:12,820:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-23 20:47:12,821:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 20:47:12,821:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-23 20:47:12,821:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-23 20:47:12,821:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-23 20:47:12,823:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 20:47:12,865:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-23 20:47:13,283:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-23 20:47:13,284:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2023-11-23 20:47:13,285:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2023-11-23 20:47:13,289:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:22 UTC. 2023-11-23 20:47:13,290:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 20:47:13,290:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-23 20:47:13,297:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-23 20:47:13,298:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-23 20:47:13,298:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-23 20:47:13,314:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-23 20:47:13,315:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-23 20:47:13,317:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-23 20:47:13,849:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-23 20:47:13,850:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:47:12 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "nbQsHg8xq6I": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-23 20:47:13,850:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-23 20:47:18,472:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7021_key-certbot.pem 2023-11-23 20:47:22,760:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7019_csr-certbot.pem 2023-11-23 20:47:22,761:DEBUG:acme.client:Requesting fresh nonce 2023-11-23 20:47:22,761:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-23 20:47:22,939:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-23 20:47:22,940:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:47:21 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnkWcli5-CgJoFh82JK9l6v47nTviNuRzaJebH1qgqRcE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-23 20:47:22,940:DEBUG:acme.client:Storing nonce: jXyutbsnkWcli5-CgJoFh82JK9l6v47nTviNuRzaJebH1qgqRcE 2023-11-23 20:47:22,940:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2023-11-23 20:47:22,946:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25rV2NsaTUtQ2dKb0ZoODJKSzlsNnY0N25UdmlOdVJ6YUplYkgxcWdxUmNFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Eey7d_Nlobfurce0eOBXRcH547JWgAWmSM_cGzukjRfbhC7yeJhVoTX95b2KSmYjqj-tEe4_I9TEgxKT0FM8gJacc_BSjDPU4d-BS7YJ9OclyJVMVmPLS-IXJQULWblHnhpCDdN-CoTuheXRdvgHJCnVo8dD33mCKym6nbL50wtg7k2kdYOKLoeul2nITiQkrSubNTX_BFFNr4ki8o07PWAH6GSUXIw8nId2KzLvn4hqNPsJh21DKn34GtHKUzPwljDs000FmZrl5MlGB3UPv3E5FT3olEDlR7F7eI_W9Bpe91obP1yEwLQPGf-G89LmuED8OxiIu5uO97p_rpzoxg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-23 20:47:23,143:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2023-11-23 20:47:23,143:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 23 Nov 2023 19:47:21 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796190496 Replay-Nonce: jXyutbsnLMqqqb6kqb_Lk4TxAweZspMABkw9EFkz8xVtIdl4UTE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:17Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066771416" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796190496" } 2023-11-23 20:47:23,144:DEBUG:acme.client:Storing nonce: jXyutbsnLMqqqb6kqb_Lk4TxAweZspMABkw9EFkz8xVtIdl4UTE 2023-11-23 20:47:23,144:DEBUG:acme.client:JWS payload: b'' 2023-11-23 20:47:23,150:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066771416: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25MTXFxcWI2a3FiX0xrNFR4QXdlWnNwTUFCa3c5RUZrejh4VnRJZGw0VVRFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY3NzE0MTYifQ", "signature": "M-oXL-NPj4MwYaV6o6ZI9A11UA-WtR7MQjEmcqIR0pkvxfPpkK8fp7qHQ-WlndFrF1hu3UlORxZnUOnDQaXuy2Qnrv4bXukHjLhrBjAdcjCt-R-DuoSasD11bS2VKtAwJeMcKrZhwYwihctat4fTATkUpHDC-985NFPmkfFOsacp9W5Zb7oY7UeFc97BZMYjkLIqqcjfplQtZNWOGDhQv3398xElpz_jV1lArLcTCkzY2S0hyYjbfpXoraxPJBCxf6qh8ofiT7jEhhWZg3uyyDnySX9jDFE3IDpSUABumiaKVdBH0brvPVddxFQ_1ZYnyplOVepxJc6azNCcekc_ew", "payload": "" } 2023-11-23 20:47:23,331:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066771416 HTTP/1.1" 200 809 2023-11-23 20:47:23,331:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:47:22 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnq5cC4sF0SJR5woFnxEgVZNJVDrRZiLCqd1em4nY_E68 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:17Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066771416/1qhCuQ", "token": "cVVMxW9zwT-iEFrTBcAWPKCXYKiDFVXWvmhWDvf--Y4" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066771416/isn6Gw", "token": "cVVMxW9zwT-iEFrTBcAWPKCXYKiDFVXWvmhWDvf--Y4" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066771416/lLjJ0A", "token": "cVVMxW9zwT-iEFrTBcAWPKCXYKiDFVXWvmhWDvf--Y4" } ] } 2023-11-23 20:47:23,331:DEBUG:acme.client:Storing nonce: jXyutbsnq5cC4sF0SJR5woFnxEgVZNJVDrRZiLCqd1em4nY_E68 2023-11-23 20:47:23,331:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-23 20:47:23,332:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2023-11-23 20:47:23,332:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-23 20:47:23,332:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-23 20:47:23,333:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 20:47:23,333:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-23 20:47:23,333:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-23 20:47:23,334:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-23 20:47:23,335:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 20:47:23,378:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-23 20:47:23,790:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-23 20:47:23,791:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2023-11-23 20:47:23,792:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2023-11-23 20:47:23,796:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:34 UTC. 2023-11-23 20:47:23,796:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 20:47:23,797:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-23 20:47:23,802:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-23 20:47:23,802:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-23 20:47:23,802:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-23 20:47:23,807:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-23 20:47:23,808:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-23 20:47:23,811:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-23 20:47:24,342:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-23 20:47:24,343:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:47:23 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "1g0v48VmNX4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-23 20:47:24,344:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-23 20:47:28,844:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7022_key-certbot.pem 2023-11-23 20:47:33,131:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7020_csr-certbot.pem 2023-11-23 20:47:33,131:DEBUG:acme.client:Requesting fresh nonce 2023-11-23 20:47:33,131:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-23 20:47:33,310:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-23 20:47:33,311:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:47:32 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnApA7LgL7Aa2lj68KPiHVIAhJyOzzhJvOw92X5TRmXNU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-23 20:47:33,311:DEBUG:acme.client:Storing nonce: jXyutbsnApA7LgL7Aa2lj68KPiHVIAhJyOzzhJvOw92X5TRmXNU 2023-11-23 20:47:33,311:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2023-11-23 20:47:33,317:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25BcEE3TGdMN0FhMmxqNjhLUGlIVklBaEp5T3p6aEp2T3c5Mlg1VFJtWE5VIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "MMNndEgPRbXl16ga4eAifck2f6I_l4ftDdvfHzSecqsAzhukfLeun5Nc_9oa_ieN2o3iEypRjRAma3v8uln20GxajK1cXOvOx3UJZucX5vX9SLSn-Fd0ZOLViSNquJvywSktlMQRexfMS3w18XxV9PnbbI7pV0nRzINFCmuZ8njgOYscFq_gTkd9Pj5CzxAF8mnquqcs3mLDHIjvmoc1NyMez-p3DtNFvyH2_INuBxuFvef_lcqikrFEOSPQ5i5SCm_qhd89nUSaZ42W4plVMjm48eZI1fAExaAMKIOBFRKlXoTaQ9i7X-fF5H5jjNFzremP4qzt2MoF0Y9nV6y9zw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-23 20:47:33,516:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-23 20:47:33,518:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 23 Nov 2023 19:47:32 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796210686 Replay-Nonce: SFMYLIQj5a8y5CoP2-8iyanaaFEbxgHyudCZwaOsBFWPUUELcTU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:25Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066800166" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796210686" } 2023-11-23 20:47:33,518:DEBUG:acme.client:Storing nonce: SFMYLIQj5a8y5CoP2-8iyanaaFEbxgHyudCZwaOsBFWPUUELcTU 2023-11-23 20:47:33,518:DEBUG:acme.client:JWS payload: b'' 2023-11-23 20:47:33,524:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066800166: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWo1YTh5NUNvUDItOGl5YW5hYUZFYnhnSHl1ZENad2FPc0JGV1BVVUVMY1RVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY4MDAxNjYifQ", "signature": "KfcDpJldSamfCYUoO0KGHZqb2JYcfWusDmPp4tFJM6wGqQkMJaqQdw2OHBtrQHMi7wbi4Dh2HJz7pAw4hbd5F84DjwWT4GusoHlq080A83v4OX3BrFgpWtuw7-B4HxWTlHQFgI-2vNlsThd27crDT2Y5lv4AeNUv0HRL-I4nRt8uQAhNHppOWVRUoMNU0OZaEChLPU-ggGu4lO1NernkxBwrpw5Kv3LNkR_3BUIvls9PsFbRQm6lF-L-_9kTYRbQKiNILTM42K3ZbEbe47xDfd6NTldVj6scvOt3T3KXmelW1q7TUsJIopybz0bwymcesocNKP_HntVQ5nIQl0jMng", "payload": "" } 2023-11-23 20:47:33,705:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066800166 HTTP/1.1" 200 805 2023-11-23 20:47:33,706:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:47:32 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnak_RkdKO434dG0TU55c5Pr7KlB_Rq2LWnjgv85PfxOs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:25Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066800166/zXEJ0Q", "token": "chax4aVJRBAwxdLyEKOihE2bmz-XL8HJpzNL8ytpyn8" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066800166/b777tA", "token": "chax4aVJRBAwxdLyEKOihE2bmz-XL8HJpzNL8ytpyn8" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066800166/Gd6Xnw", "token": "chax4aVJRBAwxdLyEKOihE2bmz-XL8HJpzNL8ytpyn8" } ] } 2023-11-23 20:47:33,706:DEBUG:acme.client:Storing nonce: jXyutbsnak_RkdKO434dG0TU55c5Pr7KlB_Rq2LWnjgv85PfxOs 2023-11-23 20:47:33,706:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-23 20:47:33,707:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2023-11-23 20:47:33,708:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-23 20:47:33,708:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-23 20:47:33,709:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 20:47:33,710:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-23 20:47:33,710:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-23 20:47:33,711:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-23 20:47:33,712:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 20:47:33,763:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-23 20:47:33,998:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-23 20:47:33,999:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-23 20:47:34,000:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-23 20:47:34,004:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:48 UTC. 2023-11-23 20:47:34,004:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 20:47:34,005:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-23 20:47:34,010:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-23 20:47:34,010:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-23 20:47:34,010:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-23 20:47:34,025:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-23 20:47:34,026:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-23 20:47:34,028:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-23 20:47:34,558:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-23 20:47:34,559:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:47:33 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "0C-HXeGD5kI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-23 20:47:34,560:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-23 20:47:39,524:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7023_key-certbot.pem 2023-11-23 20:47:43,848:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7021_csr-certbot.pem 2023-11-23 20:47:43,849:DEBUG:acme.client:Requesting fresh nonce 2023-11-23 20:47:43,849:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-23 20:47:44,024:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-23 20:47:44,025:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:47:42 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjrFhQ4jl44bgdpO7EoQeWIaUuEdbTEOXGhIKj_Ey12tI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-23 20:47:44,025:DEBUG:acme.client:Storing nonce: SFMYLIQjrFhQ4jl44bgdpO7EoQeWIaUuEdbTEOXGhIKj_Ey12tI 2023-11-23 20:47:44,026:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2023-11-23 20:47:44,033:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpyRmhRNGpsNDRiZ2RwTzdFb1FlV0lhVXVFZGJURU9YR2hJS2pfRXkxMnRJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "NBtpHbaL1yiXq_q2LXQq70vSUSa5NGTI7zuI4P4SPZpd2MpRuAQmSo9vtleSdggR3GxBbTxuQCYR9whP4AxyXqHdtN09I9nNasGBJt2TBqJwwBePALytBOQNIRXJmQ4e-oDjylXOwdYKuYFA2lyimQoP_zprWwTxx92FGiuf5S-bk1GrQTJ4L0GERtbekyUFEJHOCr0U6OxwRbOJU0ONngtezyHhfg6m_wVouwIOJ2jIehEQ_FJg3-_JFnAUrMqQzuSb7xzQAcaoL75R1gIy23f031bF_1s-_Uk4e2m8izlYa8ajwyi7yXZ-mf7bktvNEzPTNgXi_h1GRY9PiLJB7A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-23 20:47:44,229:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-23 20:47:44,230:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 23 Nov 2023 19:47:42 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796230126 Replay-Nonce: SFMYLIQjqQuOIwildx8fzYB4Kx9bBkSqihVvWLCIN8wbP0G4nos X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:34Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066828686" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796230126" } 2023-11-23 20:47:44,230:DEBUG:acme.client:Storing nonce: SFMYLIQjqQuOIwildx8fzYB4Kx9bBkSqihVvWLCIN8wbP0G4nos 2023-11-23 20:47:44,230:DEBUG:acme.client:JWS payload: b'' 2023-11-23 20:47:44,236:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066828686: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpxUXVPSXdpbGR4OGZ6WUI0S3g5YkJrU3FpaFZ2V0xDSU44d2JQMEc0bm9zIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY4Mjg2ODYifQ", "signature": "pxI7x10D2yfoEIqFI3ka-kwYKt1kVIy1VJoMDF0HToOTYoijclKZvA-SdZ8khXxxMXzO2A2G3S9oODMRQMfTsNgbvR_YIIgcfX5fHM08bTqo7QSLtSwSayUvjTjQpVDcDdEzv5KeUpUwoLX6nlzSNRB-nqaYXN4ALusozK7R5J_Rd9q8KBAe8EKkMTbkZQcvL5kd0F4hCA3kRb88yhXQt79MMWMGqifuHFGdoXnxeLxcKmZdCdyOTTqS2mw-dp1TBjXS61b9-aiUYIrFlU1GMZF5p-tAPCPmIBSnsGF0yNRpQGihQP_uzRd4drVQPLPHUiSeqHHTK8BHcvRBiFXnMg", "payload": "" } 2023-11-23 20:47:44,415:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066828686 HTTP/1.1" 200 805 2023-11-23 20:47:44,416:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:47:43 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjVtsG8INDVDOEPgLfd4JNvcrTQy6KmUmBivXHWG23U6U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:34Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066828686/TFIwLw", "token": "kAlE0kR-pqo9F_UYGQCvSB7TRTjOLQiZBJq_dZ7iFHs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066828686/se4r1w", "token": "kAlE0kR-pqo9F_UYGQCvSB7TRTjOLQiZBJq_dZ7iFHs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066828686/Hc2_wQ", "token": "kAlE0kR-pqo9F_UYGQCvSB7TRTjOLQiZBJq_dZ7iFHs" } ] } 2023-11-23 20:47:44,416:DEBUG:acme.client:Storing nonce: SFMYLIQjVtsG8INDVDOEPgLfd4JNvcrTQy6KmUmBivXHWG23U6U 2023-11-23 20:47:44,417:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-23 20:47:44,417:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2023-11-23 20:47:44,418:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-23 20:47:44,418:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-23 20:47:44,418:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 20:47:44,419:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-23 20:47:44,419:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-23 20:47:44,419:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-23 20:47:44,420:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 20:47:44,472:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-23 20:47:44,727:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-23 20:47:44,728:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-23 20:47:44,729:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-23 20:47:44,733:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:31:01 UTC. 2023-11-23 20:47:44,733:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 20:47:44,734:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-23 20:47:44,738:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-23 20:47:44,738:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-23 20:47:44,739:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-23 20:47:44,754:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-23 20:47:44,755:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-23 20:47:44,757:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-23 20:47:45,204:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-23 20:47:45,204:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:47:43 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "2fdTEQYEKUc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-23 20:47:45,205:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-23 20:47:49,865:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7024_key-certbot.pem 2023-11-23 20:47:54,153:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7022_csr-certbot.pem 2023-11-23 20:47:54,154:DEBUG:acme.client:Requesting fresh nonce 2023-11-23 20:47:54,154:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-23 20:47:54,303:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-23 20:47:54,303:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:47:53 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf863NfjQ-yN4xEVAFlq6zL1B879_nYc_vVAZq8LpvNlOU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-23 20:47:54,304:DEBUG:acme.client:Storing nonce: nbWKegf863NfjQ-yN4xEVAFlq6zL1B879_nYc_vVAZq8LpvNlOU 2023-11-23 20:47:54,304:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2023-11-23 20:47:54,310:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjg2M05malEteU40eEVWQUZscTZ6TDFCODc5X25ZY192VkFacThMcHZObE9VIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "KICtHUYNhvJ-hHvUAZFtBP3ZMGj_gIAnxpuRJebWbweWk8nsbR2vOJl8cafr5eoXHTjmRbrna4DjSxShEeZjnlQmMgmKaSBdLNakK8tPhiVI2ankFeBpU-dwqET9FtV7jAo7str0ESpEKPc_oBjw2i-cVfi_g6MRHd2d4gUzAxvII5pawGKiiRvRc6FMDcS0-QCfZ-rCBR_hKqOrwSaMFQ310aI7SqNRzEXQc8ULt5r93H5aoQ63kYhAAPP1kfZJ8uK6jiSQwgJPMcods1Cp1VuByCWxzVztkiyra2Dxkn_WmnproKLGNHVYChwTADqFjiXLR7wm8NkEjxOCtddcDQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-23 20:47:54,479:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-23 20:47:54,480:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 23 Nov 2023 19:47:53 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796249816 Replay-Nonce: v0bMowfiBxlvfU5jXyt6nU_w6zZAzXtoU9tqqQZ8n7G9D29yKHQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:42Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066858576" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796249816" } 2023-11-23 20:47:54,480:DEBUG:acme.client:Storing nonce: v0bMowfiBxlvfU5jXyt6nU_w6zZAzXtoU9tqqQZ8n7G9D29yKHQ 2023-11-23 20:47:54,480:DEBUG:acme.client:JWS payload: b'' 2023-11-23 20:47:54,486:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066858576: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlCeGx2ZlU1alh5dDZuVV93NnpaQXpYdG9VOXRxcVFaOG43RzlEMjl5S0hRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY4NTg1NzYifQ", "signature": "fb7fG52wtJa7CdWL9KMZt4c7JOW7Xxw_IRPbMe_BK29Yw0YfThjqvId61Z4SWnqUrhzRJXFMvtTjxrwA5SF3RPWXLwmCv-QXrequP-AGq6FC3_e9UKFwDJ8bxYvHDAdF0Kc4Dg47bY3FO50OVcGI_I6lPBK9Jby_EXcc3gobOSs3iAuUNK6ujopfzlNXwTsw_JLxbEMTt75jrAgx-8gf-8jhD7FVanInlWUmGPrIfRvUtesGx5vCGQrwm6GIZ9-LhPCATu0sOoR3njcBxcO7zv46vI5gSei9quqFOVa3E0nfhMBjs2i1Vx4_6E3rRm7srtyUpORr8lGwWUUIkRmghw", "payload": "" } 2023-11-23 20:47:54,640:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066858576 HTTP/1.1" 200 805 2023-11-23 20:47:54,641:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 19:47:53 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8hFy2QxwV5MfkfJPI-oz2sigJOsEEBzYY-k_6tPaum1E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:42Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066858576/p5HniQ", "token": "vgTEYICaF9gMErZyGxBr6V0KD9ZEoeesWVIQ8h9Ks48" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066858576/JwX8uw", "token": "vgTEYICaF9gMErZyGxBr6V0KD9ZEoeesWVIQ8h9Ks48" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066858576/_ogaVA", "token": "vgTEYICaF9gMErZyGxBr6V0KD9ZEoeesWVIQ8h9Ks48" } ] } 2023-11-23 20:47:54,641:DEBUG:acme.client:Storing nonce: nbWKegf8hFy2QxwV5MfkfJPI-oz2sigJOsEEBzYY-k_6tPaum1E 2023-11-23 20:47:54,642:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-23 20:47:54,642:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2023-11-23 20:47:54,643:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-23 20:47:54,643:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-23 20:47:54,644:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 20:47:54,644:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-23 20:47:54,644:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-23 20:47:54,645:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-23 20:47:54,646:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 20:47:54,646:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2023-11-23 20:47:54,646:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2023-11-23 20:47:54,647:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2023-11-23 20:47:54,649:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)