2025-01-25 08:24:05,248:DEBUG:certbot._internal.main:certbot version: 1.6.0 2025-01-25 08:24:05,249:DEBUG:certbot._internal.main:Arguments: [] 2025-01-25 08:24:05,249:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2025-01-25 08:24:05,902:DEBUG:certbot._internal.log:Root logging level set at 20 2025-01-25 08:24:05,903:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2025-01-25 08:24:05,940:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2025-01-25 08:24:05,979:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-25 08:24:06,180:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 08:24:06,181:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is signed by the certificate's issuer. 2025-01-25 08:24:06,185:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert14.pem is: OCSPCertStatus.GOOD 2025-01-25 08:24:06,194:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-25 08:24:06,198:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 08:24:06,241:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-25 08:24:06,430:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 08:24:06,431:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is signed by the certificate's issuer. 2025-01-25 08:24:06,432:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD 2025-01-25 08:24:06,436:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-25 08:24:06,440:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 08:24:06,487:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-25 08:24:06,658:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 08:24:06,659:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is signed by the certificate's issuer. 2025-01-25 08:24:06,660:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert20.pem is: OCSPCertStatus.GOOD 2025-01-25 08:24:06,664:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-25 08:24:06,668:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 08:24:06,703:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-25 08:24:06,980:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 08:24:06,981:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is signed by the certificate's issuer. 2025-01-25 08:24:06,982:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\auth.daisuke-design.pl\cert3.pem is: OCSPCertStatus.GOOD 2025-01-25 08:24:06,985:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-25 08:24:06,988:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 08:24:07,027:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-25 08:24:07,192:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 08:24:07,193:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert22.pem is signed by the certificate's issuer. 2025-01-25 08:24:07,194:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert22.pem is: OCSPCertStatus.GOOD 2025-01-25 08:24:07,200:INFO:certbot._internal.renewal:Cert not yet due for renewal 2025-01-25 08:24:07,204:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 08:24:07,240:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-25 08:24:07,428:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 08:24:07,430:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-25 08:24:07,431:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-25 08:24:07,437:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:13:49 UTC. 2025-01-25 08:24:07,437:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-25 08:24:07,437:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 08:24:07,443:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-25 08:24:07,444:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-25 08:24:07,444:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-25 08:24:07,450:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-25 08:24:07,451:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-25 08:24:07,453:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-25 08:24:07,894:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-25 08:24:07,894:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:24:09 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "jC0w0ZzBnoY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-25 08:24:07,895:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-25 08:24:14,822:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8893_key-certbot.pem 2025-01-25 08:24:21,584:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8891_csr-certbot.pem 2025-01-25 08:24:21,585:DEBUG:acme.client:Requesting fresh nonce 2025-01-25 08:24:21,585:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-25 08:24:21,731:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-25 08:24:21,732:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:24:23 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: KY2mD_AjnbrSpXJ23Q3mheufBtNzK71qftEqGlYtMLq3tFAeD58 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-25 08:24:21,732:DEBUG:acme.client:Storing nonce: KY2mD_AjnbrSpXJ23Q3mheufBtNzK71qftEqGlYtMLq3tFAeD58 2025-01-25 08:24:21,732:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2025-01-25 08:24:21,739:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWpuYnJTcFhKMjNRM21oZXVmQnROeks3MXFmdEVxR2xZdE1McTN0RkFlRDU4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "R7fko_Y9iU47Yt9qCP7kST6jBSELqDBMG760mDP-a5g-zfJRMeeHapPo-sWwAYHEjJ3S4kylJciJkQ3_lLUJ84L_NyuLXtjKRXtOgQBEylZG1ur-tusTu4nnffwJiwhs6ii8G4Akbunuq3yF65iBw-u0Yx4GeeaxPseQ7-FM8zQXcYYaREL3FI437j92-_SDg8Dp_ckrYiIoMhssv_saMLEo5tI4HAfHjU8p_xQM_Osaq7Bpj5_riEH_WawsNBdaVAiI7oofiHY1JgLIerxEFsSCPfrkRgiV6l_QP8tZu-fZe9JBAanVoui3aJOkaduahnKSPW-0AVxsqPxUsTv3jQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-25 08:24:21,905:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-25 08:24:21,906:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Jan 2025 07:24:23 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140171795 Replay-Nonce: KY2mD_AjOKs0ZjV1ASODN1cl0I4-gnnNSkDPWnff0_jcVJbCiIY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:50:04Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464853999535" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140171795" } 2025-01-25 08:24:21,906:DEBUG:acme.client:Storing nonce: KY2mD_AjOKs0ZjV1ASODN1cl0I4-gnnNSkDPWnff0_jcVJbCiIY 2025-01-25 08:24:21,907:DEBUG:acme.client:JWS payload: b'' 2025-01-25 08:24:21,913:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464853999535: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWpPS3MwWmpWMUFTT0ROMWNsMEk0LWdubk5Ta0RQV25mZjBfamNWSmJDaUlZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTM5OTk1MzUifQ", "signature": "BRajG_bT_gfmlb_CmnnPPQs_9SfBIYfarUtDLdX7L14y88zFsdUpTxz2ZYMw6TW1eajo6F6TFsHhNeoH6G5VMHRw0xIRYIseBZGXLI5ul7tBdAm7wxdbaitpRT5SG2II7uRcz6eU0s8zNNwX5bscXwUzpK_RI3ZqT-asRGlBXIBfPS5g9pq-0diOxoDqjTa4falzxQ5GsQDfwXB6db0Z-3SFzKJVu2ugU2qby3iS2F5CMa5E_GWyKScRvJ9HVtOPCorc94yRGpgOCGwmIQF6r0VX0yw8TPXIGiQcm05mgVY5SsNTPUaEcM6b5yE6oLjUimnPMQI0DQz5PNc3Zl99qQ", "payload": "" } 2025-01-25 08:24:22,063:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464853999535 HTTP/1.1" 200 823 2025-01-25 08:24:22,064:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:24:23 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Z6auUXuudu7SON8PJrtsWBSQIi8EP8Pv7_hnuaPlFO94fSnmh8s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:50:04Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464853999535/PVUjPA", "status": "pending", "token": "LhsM0YxGT1dL4stq2Tmlq4O2ZKuaujacf5ySryXsyhQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464853999535/_gvNVQ", "status": "pending", "token": "LhsM0YxGT1dL4stq2Tmlq4O2ZKuaujacf5ySryXsyhQ" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464853999535/Gzz9fw", "status": "pending", "token": "LhsM0YxGT1dL4stq2Tmlq4O2ZKuaujacf5ySryXsyhQ" } ] } 2025-01-25 08:24:22,064:DEBUG:acme.client:Storing nonce: Z6auUXuudu7SON8PJrtsWBSQIi8EP8Pv7_hnuaPlFO94fSnmh8s 2025-01-25 08:24:22,065:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-25 08:24:22,065:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2025-01-25 08:24:22,076:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-25 08:24:22,076:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-25 08:24:22,086:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 08:24:22,087:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-25 08:24:22,087:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-25 08:24:22,087:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-25 08:24:22,099:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 08:24:22,136:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-25 08:24:22,306:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 08:24:22,307:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2025-01-25 08:24:22,308:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2025-01-25 08:24:22,312:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:20 UTC. 2025-01-25 08:24:22,312:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-25 08:24:22,312:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 08:24:22,317:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-25 08:24:22,318:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-25 08:24:22,318:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-25 08:24:22,323:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-25 08:24:22,324:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-25 08:24:22,326:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-25 08:24:22,836:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-25 08:24:22,837:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:24:24 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "ac3PrCjhy5Y": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-25 08:24:22,838:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-25 08:24:29,373:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8894_key-certbot.pem 2025-01-25 08:24:35,722:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8892_csr-certbot.pem 2025-01-25 08:24:35,723:DEBUG:acme.client:Requesting fresh nonce 2025-01-25 08:24:35,723:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-25 08:24:35,894:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-25 08:24:35,895:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:24:37 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5m-m03bO_LvTbTCFxYdNi1WO5Mg2OzNsr5DCRlzAeZVcEAWit6g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-25 08:24:35,895:DEBUG:acme.client:Storing nonce: 5m-m03bO_LvTbTCFxYdNi1WO5Mg2OzNsr5DCRlzAeZVcEAWit6g 2025-01-25 08:24:35,895:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2025-01-25 08:24:35,901:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk9fTHZUYlRDRnhZZE5pMVdPNU1nMk96TnNyNURDUmx6QWVaVmNFQVdpdDZnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "wQu-5HZq7QmkhjjZ-1uUeOPPZUFct6eDPw58xr9WketGjXk-HEy2Je-V8G260M_LTs2eg5PZW_ycAYL436-6rFdBbZ99S6uX7bcmH1JG-Flbq_wGI_WaIY-kC5C6JVFst5NzLrr--lEE9D-eVv2wFroKa_gBkS1s8jT2JEiMJzMUDVzvBfjNUw5md42AwkEzSceEI6OLFhe6NaW545o10MWshjiyA6Icjz_3wX0VPlAHNQjK-GpbqqT9qQiy67RlBKLI19S-xytIqqjroxgJIrGH1HFHz5bF3cVYojqZ14YnjHr2MbzWCeZtGBhq0V3IzV_LOaS493uXUUKsEFSvcg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-01-25 08:24:36,100:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2025-01-25 08:24:36,100:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Jan 2025 07:24:37 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140234075 Replay-Nonce: qx2pCBNf_XVE2XsR4lBHimHIKM7hXdWhsFeA2BDNXcGLFcUUIIU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:50:18Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854097235" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140234075" } 2025-01-25 08:24:36,101:DEBUG:acme.client:Storing nonce: qx2pCBNf_XVE2XsR4lBHimHIKM7hXdWhsFeA2BDNXcGLFcUUIIU 2025-01-25 08:24:36,101:DEBUG:acme.client:JWS payload: b'' 2025-01-25 08:24:36,108:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854097235: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZfWFZFMlhzUjRsQkhpbUhJS003aFhkV2hzRmVBMkJETlhjR0xGY1VVSUlVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQwOTcyMzUifQ", "signature": "Ofqah9I8-BPR3kt7k4b8-D3PIy-ksRvISZUI4E7h3547vRm3NzwAuUAZGBf_mD7zIL7vJtk2ZYPwRPsZV1UXdFKiK5z9wbwoezi3S0AllBFaamld7EqVvqA0pDYc7eJKdt_-iMqwnhOjkgwosO0hxuHJ2BWdb-xjIJkJPBR5Gg_bZx7CQKO1mHWTjhIRj6I603Ufbw1jI9sKfgVTyCRS8qdGUdRYcNQeHAoNrMussA0xETfNix6b4ki4-kMJxsmnvqv76qvxjzx6KvEBXFjXtliCOR9gcZ5_bbLoTFqRUEgYVenK94Qp7jUpOGM8DlteH1AN7o43a07ZthFl09tMTw", "payload": "" } 2025-01-25 08:24:36,283:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854097235 HTTP/1.1" 200 827 2025-01-25 08:24:36,284:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:24:37 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNf1Qe_1Dv0R7-ikRwV0PI7cluj1yJRB3D9zMno0C5iJP0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:50:18Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854097235/UjHR1g", "status": "pending", "token": "KjkQOpKsGE0kd7AjKRO2O9xwhV7ModKF2YJR0KYB0eQ" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854097235/V5AJ-w", "status": "pending", "token": "KjkQOpKsGE0kd7AjKRO2O9xwhV7ModKF2YJR0KYB0eQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854097235/UT_D8g", "status": "pending", "token": "KjkQOpKsGE0kd7AjKRO2O9xwhV7ModKF2YJR0KYB0eQ" } ] } 2025-01-25 08:24:36,284:DEBUG:acme.client:Storing nonce: qx2pCBNf1Qe_1Dv0R7-ikRwV0PI7cluj1yJRB3D9zMno0C5iJP0 2025-01-25 08:24:36,285:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-25 08:24:36,285:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2025-01-25 08:24:36,286:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-25 08:24:36,286:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-25 08:24:36,287:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 08:24:36,287:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-25 08:24:36,287:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-25 08:24:36,287:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-25 08:24:36,288:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 08:24:36,323:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-25 08:24:36,507:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 08:24:36,509:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is signed by the certificate's issuer. 2025-01-25 08:24:36,509:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert4.pem is: OCSPCertStatus.GOOD 2025-01-25 08:24:36,513:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:14:51 UTC. 2025-01-25 08:24:36,513:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-25 08:24:36,513:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 08:24:36,519:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-25 08:24:36,519:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-25 08:24:36,520:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-25 08:24:36,533:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-25 08:24:36,534:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-25 08:24:36,535:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-25 08:24:37,036:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-25 08:24:37,037:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:24:38 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "wPpbw4xy1pk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2025-01-25 08:24:37,037:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-25 08:24:43,616:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8895_key-certbot.pem 2025-01-25 08:24:49,936:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8893_csr-certbot.pem 2025-01-25 08:24:49,936:DEBUG:acme.client:Requesting fresh nonce 2025-01-25 08:24:49,936:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-25 08:24:50,104:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-25 08:24:50,105:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:24:51 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNfHx0bJvf28nxjdTgyFnPJNJZhrig7dfhDRtt0kPV5uE4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-25 08:24:50,105:DEBUG:acme.client:Storing nonce: qx2pCBNfHx0bJvf28nxjdTgyFnPJNJZhrig7dfhDRtt0kPV5uE4 2025-01-25 08:24:50,105:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "helix.daisuke-design.pl"\n }\n ]\n}' 2025-01-25 08:24:50,110:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZIeDBiSnZmMjhueGpkVGd5Rm5QSk5KWmhyaWc3ZGZoRFJ0dDBrUFY1dUU0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "m9cPK_f2AHNMUzQ5BEDxJLGsimnMK8_1mcmULoPvnuPT94p9zVhGWWurDcxAgtyxoo-CQGIjZbjPWyGj7K0fty86uwNdy_3X3yEv-Q9Uk4zHPZtsA_JYRVstQD08caDLU4PGVx6KuChGLsUfISEkBYaMq9ckGdJVAiXQZowYKgfE6s2FA7T87rKlJPUa8QQczxSO_M3aCRXJ1yzk6TYDoHcnwQOcLoawqfE5s-6hHJkUnIbh38pTAw1SmvwKYsNzgd0VlfniJxLW4xzoHWUanqJQyxleoWJ9kh3avkQhnTtCqjIjoNeHc5LNDYM50D2Nwytfo8jrbPAnLg-H2Lscrw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImhlbGl4LmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2025-01-25 08:24:50,311:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 353 2025-01-25 08:24:50,312:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Jan 2025 07:24:51 GMT Content-Type: application/json Content-Length: 353 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140287525 Replay-Nonce: qx2pCBNfg7wqh46aA5adbEeW9qd4dP7S_d8F3MACjF5f8eIchrs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:50:33Z", "identifiers": [ { "type": "dns", "value": "helix.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854177205" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140287525" } 2025-01-25 08:24:50,312:DEBUG:acme.client:Storing nonce: qx2pCBNfg7wqh46aA5adbEeW9qd4dP7S_d8F3MACjF5f8eIchrs 2025-01-25 08:24:50,312:DEBUG:acme.client:JWS payload: b'' 2025-01-25 08:24:50,318:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854177205: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZnN3dxaDQ2YUE1YWRiRWVXOXFkNGRQN1NfZDhGM01BQ2pGNWY4ZUljaHJzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQxNzcyMDUifQ", "signature": "ZVCG8bT36Jfs079MKWBtZvbJIvhrcoGDQkOGxXM1V1EbVOESPH41Ame968O8ptJEBeN1CAn8PVCCiYcxqF8KOjevq1W9vVMseXATrWvDRyDjmdCJSakzpiq38ddTjqQvmjlqI7Tj36DnEuEuhFq3n4gNFtvQSAjFf_RON7Amp_ukiACqYG1Tqr1Bq2-olN_FZJ3-mE_kvzTMvcJU1vgGQUkFohOLFu0poiYXRfUvvZgVOzmXiV59xhb55aZKMd145-IAg-U71SAldBSPq8oos7Q2Xv_VI5HZbCVO0fnQvRX8x64bWPS3xcn0lP6A15GHLRhXtt26js41LVxWOhrIdw", "payload": "" } 2025-01-25 08:24:50,488:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854177205 HTTP/1.1" 200 825 2025-01-25 08:24:50,490:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:24:52 GMT Content-Type: application/json Content-Length: 825 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNfmfN47nyijMUKHtIeQcBGvi0oZUgEufeWjsCmWZO1A40 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "helix.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:50:33Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854177205/kFR0rA", "status": "pending", "token": "H8dHt8qoQ8VNCmFdaH8TCH_B1Jp6zw16C-lKKxCESW0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854177205/kg1xTg", "status": "pending", "token": "H8dHt8qoQ8VNCmFdaH8TCH_B1Jp6zw16C-lKKxCESW0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854177205/rxXYJw", "status": "pending", "token": "H8dHt8qoQ8VNCmFdaH8TCH_B1Jp6zw16C-lKKxCESW0" } ] } 2025-01-25 08:24:50,490:DEBUG:acme.client:Storing nonce: qx2pCBNfmfN47nyijMUKHtIeQcBGvi0oZUgEufeWjsCmWZO1A40 2025-01-25 08:24:50,491:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-25 08:24:50,491:INFO:certbot._internal.auth_handler:http-01 challenge for helix.daisuke-design.pl 2025-01-25 08:24:50,492:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-25 08:24:50,492:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-25 08:24:50,493:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 08:24:50,493:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-25 08:24:50,493:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-25 08:24:50,494:WARNING:certbot._internal.renewal:Attempting to renew cert (helix.daisuke-design.pl) from C:\Certbot\renewal\helix.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-25 08:24:50,495:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 08:24:50,539:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-25 08:24:50,733:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 08:24:50,734:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-25 08:24:50,735:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-25 08:24:50,739:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:13 UTC. 2025-01-25 08:24:50,740:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-25 08:24:50,740:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 08:24:50,745:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-25 08:24:50,745:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-25 08:24:50,746:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-25 08:24:50,751:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-25 08:24:50,751:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-25 08:24:50,754:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-25 08:24:51,205:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-25 08:24:51,206:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:24:52 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "MtPFFknN_TU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-25 08:24:51,206:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-25 08:24:58,131:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8896_key-certbot.pem 2025-01-25 08:25:04,492:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8894_csr-certbot.pem 2025-01-25 08:25:04,493:DEBUG:acme.client:Requesting fresh nonce 2025-01-25 08:25:04,493:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-25 08:25:04,643:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-25 08:25:04,644:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:25:06 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: KY2mD_AjFmY7X2krAPL6gWJh-TBX_ho0iw-_1LZGstqDAtn2oaw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-25 08:25:04,644:DEBUG:acme.client:Storing nonce: KY2mD_AjFmY7X2krAPL6gWJh-TBX_ho0iw-_1LZGstqDAtn2oaw 2025-01-25 08:25:04,644:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2025-01-25 08:25:04,650:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWpGbVk3WDJrckFQTDZnV0poLVRCWF9obzBpdy1fMUxaR3N0cURBdG4yb2F3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "QQCQPeW5JLB19qI4nDC7uIIKz4Qel9sazjgD8Z15ECQFk2iPyy3VLiyFgXITaGNYcQ8OZdxZuGtPKyxIeC5UsIhysSXBA7HjaN1llPO0DfBRE3DhJc_SWl4X_G1_71BWsQyLn1yRCrHV_cjWsiKPGjahwVMMzDk_7GtvDtCxKucIzfRBgDjiIXHqEIlJXjp_OmyWo-22O91y9mya8axer00ISO_BsHe2DeC07DlxU80phtzHB-xvv1gsuMeH8pqrHEZv8R0Dvp2kCLMwbmX0j1bGLth2ovjW8auHfqS3ldm633-kLjpBgl2YnFuDBTBcq_eCct_3d7ph2p8sNxf7FQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-01-25 08:25:04,833:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 352 2025-01-25 08:25:04,833:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Jan 2025 07:25:06 GMT Content-Type: application/json Content-Length: 352 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140337675 Replay-Nonce: KY2mD_Aj7YtLkicPTBQiiiKiLJjphah92Gfsxh13ig2en10RcOI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:50:47Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854251985" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140337675" } 2025-01-25 08:25:04,834:DEBUG:acme.client:Storing nonce: KY2mD_Aj7YtLkicPTBQiiiKiLJjphah92Gfsxh13ig2en10RcOI 2025-01-25 08:25:04,834:DEBUG:acme.client:JWS payload: b'' 2025-01-25 08:25:04,840:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854251985: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWo3WXRMa2ljUFRCUWlpaUtpTEpqcGhhaDkyR2ZzeGgxM2lnMmVuMTBSY09JIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQyNTE5ODUifQ", "signature": "srVbdMv378yLMT3_aGu4n-M2FOZyy-w03wYuWpbCJzfJhH2WOLTghBC5_9kbzKQJZ3qHF7jQt6oIFModJBEW_dfmE0mWkKOLl2hnBfqNatPkavIu8m1hWuAC1TzEcY_wihEmnJSGbbe2TVrBNyWtp_UKUMgMd3cCMdAv6FNTbucrQfGQFZ1uNgFIL8t782J2zn4ZbBFKSOOYJSPjknxjPHS1hl81iY6Y0lEQsxDLH96auAB_OaJakByE-9A-A9DXBDAh2AQNKYSJEk43L4TGfl7Xvhh9mSHHkOQ0TjAyKs0IYGanl20CZ5R-33MM3CUE7RSm-cah4P8OEaxtQvlQ5w", "payload": "" } 2025-01-25 08:25:04,997:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854251985 HTTP/1.1" 200 824 2025-01-25 08:25:04,997:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:25:06 GMT Content-Type: application/json Content-Length: 824 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Z6auUXuuaMuaTW3u_vxx5Clv4XjMDcLWGB4e15zsB7mra9A5FB0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:50:47Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854251985/5c2Euw", "status": "pending", "token": "6G2w1CurrpHij2hITHkq2tRG08iPbRRnVO6r0-K3hiU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854251985/BXlLPQ", "status": "pending", "token": "6G2w1CurrpHij2hITHkq2tRG08iPbRRnVO6r0-K3hiU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854251985/0MCU7A", "status": "pending", "token": "6G2w1CurrpHij2hITHkq2tRG08iPbRRnVO6r0-K3hiU" } ] } 2025-01-25 08:25:04,998:DEBUG:acme.client:Storing nonce: Z6auUXuuaMuaTW3u_vxx5Clv4XjMDcLWGB4e15zsB7mra9A5FB0 2025-01-25 08:25:05,000:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-25 08:25:05,000:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2025-01-25 08:25:05,001:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-25 08:25:05,001:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-25 08:25:05,001:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 08:25:05,002:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-25 08:25:05,002:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-25 08:25:05,002:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-25 08:25:05,003:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 08:25:05,049:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2025-01-25 08:25:05,050:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-25 08:25:05,050:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2025-01-25 08:25:05,057:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2025-01-25 08:25:05,063:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2025-01-25 08:25:05,063:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2025-01-25 08:25:05,064:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2025-01-25 08:25:05,064:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2025-01-25 08:25:05,068:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2025-01-25 08:25:05,108:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-25 08:25:05,271:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 08:25:05,273:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-25 08:25:05,274:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-25 08:25:05,279:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:15:35 UTC. 2025-01-25 08:25:05,279:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-25 08:25:05,279:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 08:25:05,284:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-25 08:25:05,285:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-25 08:25:05,285:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-25 08:25:05,290:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-25 08:25:05,291:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-25 08:25:05,293:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-25 08:25:05,745:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-25 08:25:05,746:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:25:07 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "ZgY6TyLhscM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-25 08:25:05,746:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-25 08:25:12,611:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8897_key-certbot.pem 2025-01-25 08:25:19,288:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8895_csr-certbot.pem 2025-01-25 08:25:19,288:DEBUG:acme.client:Requesting fresh nonce 2025-01-25 08:25:19,288:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-25 08:25:19,438:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-25 08:25:19,439:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:25:21 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: KY2mD_Aj9b5oeCt8EB53q6G8XAI6hNVAisDdu1mok5sokngXUjg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-25 08:25:19,439:DEBUG:acme.client:Storing nonce: KY2mD_Aj9b5oeCt8EB53q6G8XAI6hNVAisDdu1mok5sokngXUjg 2025-01-25 08:25:19,439:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2025-01-25 08:25:19,445:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWo5YjVvZUN0OEVCNTNxNkc4WEFJNmhOVkFpc0RkdTFtb2s1c29rbmdYVWpnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "R52V1bNl7JeQxlCtkUQaePHIS-E_aiqkKRk39UtIj-UWBt2MhcNWEx-w3SGefYE0NvZN-NmLcEoN1i4pDqPMTBVCRJu_nhtghwBZtLuWa2EYBSj-iJxGjuWUA47XJxp4TrbtTfR1NmhkDGK4ARq73M9gSMf82CLP40b8V3Kqj2YI5efTatjfmEYC5PUqADJkbNDAu3h2QQOfA4ALyFC6_WkLEmU_W4ZMh3C0tQMReDQfjdB6JVnZtX79Rz8k8TgBWxvWBu4_5MSGcANjCz0hEs-alOPabFwl4Q5nbx84-2XifmmBlu3mxCvJbqNAcbwyIb5WH8gMfIV2SXD_AIMyZg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-25 08:25:19,621:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 357 2025-01-25 08:25:19,622:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Jan 2025 07:25:21 GMT Content-Type: application/json Content-Length: 357 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140387985 Replay-Nonce: Z6auUXuujGl_fAql8A92HmnNV-C6YB34l4NZGo9xNZjI_-aAwcc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:51:01Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854328725" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140387985" } 2025-01-25 08:25:19,622:DEBUG:acme.client:Storing nonce: Z6auUXuujGl_fAql8A92HmnNV-C6YB34l4NZGo9xNZjI_-aAwcc 2025-01-25 08:25:19,622:DEBUG:acme.client:JWS payload: b'' 2025-01-25 08:25:19,629:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854328725: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVqR2xfZkFxbDhBOTJIbW5OVi1DNllCMzRsNE5aR285eE5aaklfLWFBd2NjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQzMjg3MjUifQ", "signature": "ISrsSxiiOC-zH7hXwanO-_nJEU4xVsz3pvc6wT7Lg6aJ1TsKJTSHNbDveVABihozjAGdLfiPd_Xv2OfBVpJjR_VXDs6TGVY1x2QxWO0XZS2FaTvXiom5CUyuAUL1vmQB5WwoMKZpYx65P7ZmrzAh7A31p2KBUrdpjjwI38XLBiDh_aGlAsq1RdOg87Z0YQ7st6XHkX63_0rZ9rqahjAc3x-Po4hRwjbCjHDAnoGZs5blQ6Uy0Jby6iqDvjiYYSrvcp97x6HGoljVctAq_GgkAJ1hvftCz_X4jwMeujAvlhahLfdbfrFZyoE43fMxbkyUKBRRxmrjaTHqSyDB-doz3w", "payload": "" } 2025-01-25 08:25:19,784:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854328725 HTTP/1.1" 200 829 2025-01-25 08:25:19,785:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:25:21 GMT Content-Type: application/json Content-Length: 829 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: KY2mD_AjNX5n7itcYQoCF02_m8gUMkcbJV90rfj3Pa-pdy7a4S8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:51:01Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854328725/VqO_UQ", "status": "pending", "token": "YkklgBeK2o9V4mrDoqb54xIn-8JMHXfG6sfufSWxePI" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854328725/HpD31A", "status": "pending", "token": "YkklgBeK2o9V4mrDoqb54xIn-8JMHXfG6sfufSWxePI" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854328725/F1PGXg", "status": "pending", "token": "YkklgBeK2o9V4mrDoqb54xIn-8JMHXfG6sfufSWxePI" } ] } 2025-01-25 08:25:19,785:DEBUG:acme.client:Storing nonce: KY2mD_AjNX5n7itcYQoCF02_m8gUMkcbJV90rfj3Pa-pdy7a4S8 2025-01-25 08:25:19,786:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-25 08:25:19,786:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2025-01-25 08:25:19,787:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-25 08:25:19,787:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-25 08:25:19,788:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 08:25:19,788:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-25 08:25:19,788:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-25 08:25:19,789:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-25 08:25:19,790:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 08:25:19,827:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-25 08:25:20,015:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 08:25:20,016:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-25 08:25:20,017:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-25 08:25:20,021:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:05 UTC. 2025-01-25 08:25:20,021:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-25 08:25:20,021:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 08:25:20,026:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-25 08:25:20,027:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-25 08:25:20,027:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-25 08:25:20,032:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-25 08:25:20,033:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-25 08:25:20,036:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-25 08:25:20,535:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-25 08:25:20,536:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:25:22 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "L5RAOAsMayM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-25 08:25:20,536:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-25 08:25:27,653:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8898_key-certbot.pem 2025-01-25 08:25:34,029:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8896_csr-certbot.pem 2025-01-25 08:25:34,030:DEBUG:acme.client:Requesting fresh nonce 2025-01-25 08:25:34,030:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-25 08:25:34,196:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-25 08:25:34,196:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:25:35 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5m-m03bO2RTB7hpCQpZHnk_Psc1XIAJJrjBQoCQ1NXqVHynj6sM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-25 08:25:34,196:DEBUG:acme.client:Storing nonce: 5m-m03bO2RTB7hpCQpZHnk_Psc1XIAJJrjBQoCQ1NXqVHynj6sM 2025-01-25 08:25:34,197:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2025-01-25 08:25:34,203:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk8yUlRCN2hwQ1FwWkhua19Qc2MxWElBSkpyakJRb0NRMU5YcVZIeW5qNnNNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Zgh_4dV1m4MSrnolwAZVUlQvHCHvl1DuayA_hu70Ao5OvFROGSiI-bzzHvRaqfJDoJ_EYTGxulwyqr8Q1O6NfZ35fYOy5zBR95UsTkvZsMYzClzzIvCqx6pRUOdqbxzm0Q_UmTfAsH0SB4uV5M_PjbCRejiOuORFyMwtmd8JZXQ2xDL3N8rMFppgWE0YyriEWbM6uXnGrkrvYqLjSWDBkEXgzslp4uT-kkeTgyGanHSuEr3cW-5OP8mDiow2SVr1xoGoklqakGbL7VxfoyVCGw8niA48fuYJU-nRlqKJ8_vawfJylevX-O_Y2FKgrWJeMX6NbJ3NCi6RxB_pvIJ8Dg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2025-01-25 08:25:34,399:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356 2025-01-25 08:25:34,400:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Jan 2025 07:25:36 GMT Content-Type: application/json Content-Length: 356 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140450885 Replay-Nonce: 5m-m03bOZF79ymXPZ0My89m2Aa6RtIIxFWAglD3wFWkV96JSu5I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:51:16Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854428445" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140450885" } 2025-01-25 08:25:34,400:DEBUG:acme.client:Storing nonce: 5m-m03bOZF79ymXPZ0My89m2Aa6RtIIxFWAglD3wFWkV96JSu5I 2025-01-25 08:25:34,400:DEBUG:acme.client:JWS payload: b'' 2025-01-25 08:25:34,405:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854428445: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk9aRjc5eW1YUFowTXk4OW0yQWE2UnRJSXhGV0FnbEQzd0ZXa1Y5NkpTdTVJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ0Mjg0NDUifQ", "signature": "gS5375TqhKlPawAo2EUdyn8lQRdk58Hf2AYET2jCHzA7g9gUFX8SyOxU4I2s-bWCKzgi5MyzpV-6ea8wMaFzx7m-P3faiDsY8pu7UM-q5UXrqR7QnuWEm54434C-oUVyQY3Xy8Uqmjd9ZHlMshu1iCA5UzT4HPjSx1hiFzVNjnFEb1sBTqmXL5Eb7iu72iJp9XAxI1MFyhrwtoAr5C6HzHNqBNxNWoumNlHNjm0gOG92flHw0hvEQebTz7UYTbtC1sExD3BUbOYspIo7UOrM7iRDOTdmdhze0rgWEs-6zFv2rBumr3MGfOnc84Mm-1D18dN_DrZBYVy-PluG1Dvl-w", "payload": "" } 2025-01-25 08:25:34,577:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854428445 HTTP/1.1" 200 828 2025-01-25 08:25:34,578:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:25:36 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5m-m03bOGVXb3JIPsmWXg-nxt-YJZ2MzCr3hfNX7xWqnX0kgX-E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:51:16Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854428445/Ra9g4Q", "status": "pending", "token": "kR-nkArfvAb4RqjGdmf_0sc2lDYeXub72wgxP10lapo" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854428445/HO9jNQ", "status": "pending", "token": "kR-nkArfvAb4RqjGdmf_0sc2lDYeXub72wgxP10lapo" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854428445/tA2UdQ", "status": "pending", "token": "kR-nkArfvAb4RqjGdmf_0sc2lDYeXub72wgxP10lapo" } ] } 2025-01-25 08:25:34,578:DEBUG:acme.client:Storing nonce: 5m-m03bOGVXb3JIPsmWXg-nxt-YJZ2MzCr3hfNX7xWqnX0kgX-E 2025-01-25 08:25:34,579:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-25 08:25:34,579:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2025-01-25 08:25:34,580:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-25 08:25:34,580:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-25 08:25:34,581:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 08:25:34,581:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-25 08:25:34,582:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-25 08:25:34,582:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-25 08:25:34,583:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 08:25:34,620:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-25 08:25:34,792:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 08:25:34,793:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2025-01-25 08:25:34,794:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2025-01-25 08:25:34,798:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:33 UTC. 2025-01-25 08:25:34,798:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-25 08:25:34,799:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 08:25:34,804:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-25 08:25:34,804:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-25 08:25:34,804:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-25 08:25:34,809:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-25 08:25:34,810:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-25 08:25:34,812:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-25 08:25:35,245:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-25 08:25:35,246:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:25:36 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Iyrvluwl8Fs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-25 08:25:35,246:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-25 08:25:41,817:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8899_key-certbot.pem 2025-01-25 08:25:48,183:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8897_csr-certbot.pem 2025-01-25 08:25:48,183:DEBUG:acme.client:Requesting fresh nonce 2025-01-25 08:25:48,184:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-25 08:25:48,331:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-25 08:25:48,332:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:25:49 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: KY2mD_Aj6bRQd8juugLFtmRGLi7AM_8OfNpl_iRgfrXTxi38ZME X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-25 08:25:48,332:DEBUG:acme.client:Storing nonce: KY2mD_Aj6bRQd8juugLFtmRGLi7AM_8OfNpl_iRgfrXTxi38ZME 2025-01-25 08:25:48,332:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2025-01-25 08:25:48,340:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWo2YlJRZDhqdXVnTEZ0bVJHTGk3QU1fOE9mTnBsX2lSZ2ZyWFR4aTM4Wk1FIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "k7D489cqs1NY6rGILNHoKRuVD7uhIC6JLA1BF6sAsa83Zcugh9D-sgGRbUr0VRqzjzzr3sybcVvkfGs09pncJ-2_zK7tmOdHaULH1ps1oKbz-47GE1exJ2X2_AcwaA2qZQajJeBAU-5LVFavryVB-_nBOdAFstzF5OVpr9OpauSlT7MVgBp72CHx5Y_ZufAOBH9fj-bzBrlBRu4KS0M6K2UOiJwcMgwJ_P7tIpIkS1J7QFWdzbBEgcHXAPtoSBSI6gPNYklCEoQJBpeD3zFFmPKlXksxf6CUGE_0rTJ1wxszo4RtfoNLaqEHvVZPGLo0izR2x9pqiBnW2oJWJBrNdw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2025-01-25 08:25:48,520:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2025-01-25 08:25:48,521:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Jan 2025 07:25:50 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140503565 Replay-Nonce: KY2mD_Aj4_p0aTDBVJmk2BAQZoT33XiMTUsgZ7zLaGC9isX6Wxk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:51:31Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854513645" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140503565" } 2025-01-25 08:25:48,521:DEBUG:acme.client:Storing nonce: KY2mD_Aj4_p0aTDBVJmk2BAQZoT33XiMTUsgZ7zLaGC9isX6Wxk 2025-01-25 08:25:48,522:DEBUG:acme.client:JWS payload: b'' 2025-01-25 08:25:48,528:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854513645: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiS1kybURfQWo0X3AwYVREQlZKbWsyQkFRWm9UMzNYaU1UVXNnWjd6TGFHQzlpc1g2V3hrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ1MTM2NDUifQ", "signature": "X8b0iYR5bGUL4if1XamniiQk6U9WyF_f8w-yop_QSyx3R1Km6CI3YRsw7iMBc9HUFIqCXmZZoS8t7CrL4T2lvCAUplwsSLypIhtkf_CzElqHwXwXmLvRwF3zFKEUMLGMkXtp-V3nBhrYpthvk9xD_UqW06T-6n5uITiF2cX1eMpnqjYQNX6qCjf_IK5KoW5tTYFD5rHHQ_WFx7qaFIevDPau7yP4SJLEeVHQispTEDXQXw8ONno1dmY_IIDVYtwhmr0TJclkH6_VSUkfUu0NxJc4_jIUYN4mMjiH2K3htP6Eb_gpyasy91OwSTpjjhaOHMXByFJmP_v9ZHIiYtjHhA", "payload": "" } 2025-01-25 08:25:48,678:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854513645 HTTP/1.1" 200 827 2025-01-25 08:25:48,679:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:25:50 GMT Content-Type: application/json Content-Length: 827 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Z6auUXuubPt_C0J0TTwSZ_kcsE3nfDZj_dYVrppLt9Zb_Mj2JXo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:51:31Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854513645/IJYfNQ", "status": "pending", "token": "s0IZH-lt4CcoWX89FYesqwmuLxn1XQ-WV9fmxwfzdJ0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854513645/YCt_0g", "status": "pending", "token": "s0IZH-lt4CcoWX89FYesqwmuLxn1XQ-WV9fmxwfzdJ0" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854513645/2DTePg", "status": "pending", "token": "s0IZH-lt4CcoWX89FYesqwmuLxn1XQ-WV9fmxwfzdJ0" } ] } 2025-01-25 08:25:48,679:DEBUG:acme.client:Storing nonce: Z6auUXuubPt_C0J0TTwSZ_kcsE3nfDZj_dYVrppLt9Zb_Mj2JXo 2025-01-25 08:25:48,680:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-25 08:25:48,680:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2025-01-25 08:25:48,681:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-25 08:25:48,681:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-25 08:25:48,682:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 08:25:48,682:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-25 08:25:48,682:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-25 08:25:48,682:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-25 08:25:48,684:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 08:25:48,723:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-25 08:25:48,896:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 08:25:48,897:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2025-01-25 08:25:48,898:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2025-01-25 08:25:48,903:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:16:54 UTC. 2025-01-25 08:25:48,903:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-25 08:25:48,904:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 08:25:48,909:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-25 08:25:48,909:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-25 08:25:48,910:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-25 08:25:48,914:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-25 08:25:48,915:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-25 08:25:48,917:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-25 08:25:49,389:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-25 08:25:49,389:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:25:51 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "6nlSh5llVck": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-25 08:25:49,390:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-25 08:25:56,347:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8900_key-certbot.pem 2025-01-25 08:26:02,800:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8898_csr-certbot.pem 2025-01-25 08:26:02,801:DEBUG:acme.client:Requesting fresh nonce 2025-01-25 08:26:02,801:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-25 08:26:02,958:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-25 08:26:02,958:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:26:04 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5m-m03bOV1YnbpK7tt_GS2uJUUb6regg0mvlTN5Z0Y4l-g6TrLo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-25 08:26:02,959:DEBUG:acme.client:Storing nonce: 5m-m03bOV1YnbpK7tt_GS2uJUUb6regg0mvlTN5Z0Y4l-g6TrLo 2025-01-25 08:26:02,959:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2025-01-25 08:26:02,965:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk9WMVluYnBLN3R0X0dTMnVKVVViNnJlZ2cwbXZsVE41WjBZNGwtZzZUckxvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "YwWqQUf-4QJ0MBATeqvDphaWpxa2qqCfVRycPiQPkjFjSjPssY72bXTwQ3yveaOoKLYn0TiyNaK6dN9Bbk35Dbm7vpLB7VVBVNy1t46LPS3LjQ6P_dOLOmYuMAcb3OCQVZ-lRC-0UHGrQbGj3AgqxhMKo2BQLEzhYBpY38JZ7h-K34vi4QjW_P_njVV0nmT3cBKdF9kMid2EO6xmOVOmOzbNzVSvfKKjSTLsHeVQ-oPAqE1Z2lvaKyTHZ4ojms7YBqKt-B5P6NMquBCIgzP_A-78QddNGzJ4uy6TlmYPzjY6AuCUPabdIkw8EHrEUqTH0yKsmV37tYn0oXDdS6tM6Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-25 08:26:03,213:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-25 08:26:03,213:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Jan 2025 07:26:04 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140552425 Replay-Nonce: qx2pCBNfVvF8ZRGlzPcGNEpl5hZvifh55FoodYq8NuhmlBBddsk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:51:46Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854589515" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140552425" } 2025-01-25 08:26:03,214:DEBUG:acme.client:Storing nonce: qx2pCBNfVvF8ZRGlzPcGNEpl5hZvifh55FoodYq8NuhmlBBddsk 2025-01-25 08:26:03,214:DEBUG:acme.client:JWS payload: b'' 2025-01-25 08:26:03,220:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854589515: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXgycENCTmZWdkY4WlJHbHpQY0dORXBsNWhadmlmaDU1Rm9vZFlxOE51aG1sQkJkZHNrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ1ODk1MTUifQ", "signature": "d53HA5atZQN0hA388KIu6F8E6DAgmcA2d30gJfd4UR7hhmp07MQPO9A4pBGnELJs8Y_mXVovVem2XFRIf4vI-vUg6xDbzmVOs6Vvi8Y3aTFsOG1Q5icCDVin55kmWFE9ELZQ21p2j9o4hjlRstFYcy2ZytKC97cfMYCaIiFwCsz7mgyJhp3OwgOIs7ZHbpLAz8e_RigPUp00BxlYGvo4iGKB2dF7SPX7HM6vXMoDw2-RkhoWcvdMZZO6QiRdH7URKQ3s577dJkvgVKuyW28Qy4mUzbBKlMgQxr8D2sZyLB6h_XnxKG6r7GVdBXxew7iwIPI8I3fCc0Yv8Kibn2TdhA", "payload": "" } 2025-01-25 08:26:03,380:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854589515 HTTP/1.1" 200 823 2025-01-25 08:26:03,381:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:26:05 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: qx2pCBNfaOah14Ajmze2rLbp8rjPg1mQA8egOLL4WaonNh1AXC0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:51:46Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854589515/qQ_GAQ", "status": "pending", "token": "vgzC_qBhQwpwOiNo_CvLkC_XDVMlXhOW2G1auAvN-v8" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854589515/0ytQ9g", "status": "pending", "token": "vgzC_qBhQwpwOiNo_CvLkC_XDVMlXhOW2G1auAvN-v8" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854589515/MXV7zQ", "status": "pending", "token": "vgzC_qBhQwpwOiNo_CvLkC_XDVMlXhOW2G1auAvN-v8" } ] } 2025-01-25 08:26:03,381:DEBUG:acme.client:Storing nonce: qx2pCBNfaOah14Ajmze2rLbp8rjPg1mQA8egOLL4WaonNh1AXC0 2025-01-25 08:26:03,382:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-25 08:26:03,382:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2025-01-25 08:26:03,383:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-25 08:26:03,383:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-25 08:26:03,384:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 08:26:03,384:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-25 08:26:03,384:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-25 08:26:03,385:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-25 08:26:03,386:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 08:26:03,425:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r11.o.lencr.org:80 2025-01-25 08:26:03,624:DEBUG:urllib3.connectionpool:http://r11.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 08:26:03,625:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is signed by the certificate's issuer. 2025-01-25 08:26:03,626:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert21.pem is: OCSPCertStatus.GOOD 2025-01-25 08:26:03,630:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:15 UTC. 2025-01-25 08:26:03,630:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-25 08:26:03,631:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 08:26:03,636:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-25 08:26:03,636:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-25 08:26:03,636:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-25 08:26:03,652:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-25 08:26:03,653:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-25 08:26:03,655:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-25 08:26:04,124:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-25 08:26:04,124:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:26:05 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "QxiAmwjOybs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-25 08:26:04,125:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-25 08:26:10,572:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8901_key-certbot.pem 2025-01-25 08:26:16,943:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8899_csr-certbot.pem 2025-01-25 08:26:16,943:DEBUG:acme.client:Requesting fresh nonce 2025-01-25 08:26:16,944:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-25 08:26:17,101:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-25 08:26:17,101:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:26:18 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5m-m03bOvKIWEY3Z5E-RaIupBNBaUZ2Um1IdITLnE0vRW1ajJjg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-25 08:26:17,101:DEBUG:acme.client:Storing nonce: 5m-m03bOvKIWEY3Z5E-RaIupBNBaUZ2Um1IdITLnE0vRW1ajJjg 2025-01-25 08:26:17,102:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2025-01-25 08:26:17,109:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk92S0lXRVkzWjVFLVJhSXVwQk5CYVVaMlVtMUlkSVRMbkUwdlJXMWFqSmpnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "aqfaCSunwnoUgNR57l2vFdUQX6gvcnGYgwsnhtOef6TnVum1UQ2_KNOniPaJkg-EcyFspRx4w9X0nlsVlndTpPjTFg5PIqxf1m8NWmYg47RRtupxknpk-CrSQ17rIH4hBY_-osxQQRHCaR3fL3dB5TZOMOCnGVLuYTRShsZstzVU_VSi7CZL5k_4B_n6xGliP6sxoVLTnZhreChlrX4asr348axaspmVSJ0qjxXUyzDpQvYdlOQLSAMWIUESD6qK2ccwloirFu32VxLdw-7WRHnpJSvbXHPSYjl6oem8OsR82NK5F3GRWOrU2MhtOEHfewNnhw45KCVAux3ta2Degg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-25 08:26:17,294:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-25 08:26:17,295:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Jan 2025 07:26:18 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140602055 Replay-Nonce: 5m-m03bOA4B8ZjzwHFlnDrhH4WK0ZwdIcfXltCjWIqqKQwacQvI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:52:00Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854665835" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140602055" } 2025-01-25 08:26:17,295:DEBUG:acme.client:Storing nonce: 5m-m03bOA4B8ZjzwHFlnDrhH4WK0ZwdIcfXltCjWIqqKQwacQvI 2025-01-25 08:26:17,296:DEBUG:acme.client:JWS payload: b'' 2025-01-25 08:26:17,301:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854665835: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNW0tbTAzYk9BNEI4Wmp6d0hGbG5EcmhINFdLMFp3ZEljZlhsdENqV0lxcUtRd2FjUXZJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ2NjU4MzUifQ", "signature": "rwf2Z5tIKAZupBsFe8Hil6stMq_YHQxt0o8a-NcJKc_IJ_XW0HPp6lufxH1DnTi8tMxTuA-YHiodm0cLubEz3PHV36x3-S-kWUB5FwUh_OCsziKVqIZofTFM2N38riYQDRocmHCbnRatZDB5vOKn1Poc_1pdNOGBQ7daFWRpdgIah5V703fnEexrGj89dCZpERuykbrQd2_yBhhSnfFV4TOZg-5hSIo4uraPATMqH-NnqnmcvduL1sck-k1bp4JKNhL8Iwf8-A-kP5ampRyFVBv3p6RdpRgOHphWCVp2lxDIIapnASsVh55e0MHsqu5EZOhd5DLPoZgGqY8t3dqAvQ", "payload": "" } 2025-01-25 08:26:17,462:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854665835 HTTP/1.1" 200 823 2025-01-25 08:26:17,463:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:26:19 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 5m-m03bONoby50GDUc3X7r3sQ59FBzsTQqeRkGJm5MR6zAPa1G4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:52:00Z", "challenges": [ { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854665835/VSa2Qg", "status": "pending", "token": "IQq7H-CrjRngbvlfBYyq4TC9BGO3mQb9XFlUCm-xOp8" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854665835/A7xmXA", "status": "pending", "token": "IQq7H-CrjRngbvlfBYyq4TC9BGO3mQb9XFlUCm-xOp8" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854665835/hkfxMA", "status": "pending", "token": "IQq7H-CrjRngbvlfBYyq4TC9BGO3mQb9XFlUCm-xOp8" } ] } 2025-01-25 08:26:17,463:DEBUG:acme.client:Storing nonce: 5m-m03bONoby50GDUc3X7r3sQ59FBzsTQqeRkGJm5MR6zAPa1G4 2025-01-25 08:26:17,463:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-25 08:26:17,464:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2025-01-25 08:26:17,464:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-25 08:26:17,465:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-25 08:26:17,465:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 08:26:17,465:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-25 08:26:17,466:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-25 08:26:17,466:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-25 08:26:17,467:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 08:26:17,514:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r10.o.lencr.org:80 2025-01-25 08:26:17,703:DEBUG:urllib3.connectionpool:http://r10.o.lencr.org:80 "POST / HTTP/1.1" 200 504 2025-01-25 08:26:17,704:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is signed by the certificate's issuer. 2025-01-25 08:26:17,705:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert19.pem is: OCSPCertStatus.GOOD 2025-01-25 08:26:17,710:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2025-02-21 19:17:38 UTC. 2025-01-25 08:26:17,710:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2025-01-25 08:26:17,710:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2025-01-25 08:26:17,716:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2025-01-25 08:26:17,716:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-25 08:26:17,716:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2025-01-25 08:26:17,720:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2025-01-25 08:26:17,721:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-25 08:26:17,723:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-25 08:26:18,170:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-25 08:26:18,170:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:26:19 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "gAIWR0J_UGo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-25 08:26:18,171:INFO:certbot._internal.main:Renewing an existing certificate 2025-01-25 08:26:24,657:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8902_key-certbot.pem 2025-01-25 08:26:31,015:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8900_csr-certbot.pem 2025-01-25 08:26:31,016:DEBUG:acme.client:Requesting fresh nonce 2025-01-25 08:26:31,016:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-25 08:26:31,167:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-25 08:26:31,168:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:26:32 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Z6auUXuuBf34xw_Whk3Fbc_QQRtNxRN3BJPBkRuCi5aah65jwiU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-25 08:26:31,168:DEBUG:acme.client:Storing nonce: Z6auUXuuBf34xw_Whk3Fbc_QQRtNxRN3BJPBkRuCi5aah65jwiU 2025-01-25 08:26:31,168:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2025-01-25 08:26:31,174:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVCZjM0eHdfV2hrM0ZiY19RUVJ0TnhSTjNCSlBCa1J1Q2k1YWFoNjVqd2lVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "CYm5a3x5TJILh0sFaCqsiLsK_2UA6nRWnM_eKnfV3ltL4k3r_bJZ9jxhj04d1EmmTQlIr2nS6l95_9UdfSBHfvNqkHFMl4_JIZZ93iPAQoDijIM9Tq0awPTMVxOs7J0hTohyltrxEk3WXq3gXRSAaqOHs3bpy3MlkfL0zMkNcFzoskQGKfo4WR0mMybZAQ5dB72ztdQwAbDiMQC6ywKblwh6-iO1soBD_SSrp5rCCBWbLsRGy42qkewcIr5GU9NG4jB2f2l8sPH338Odhzusk2OLUGPIv0n6C5OzY26hgpedjZwC24vLLcmJ257-cJRlxuzS0ylmVkWgKmTLHU9JoQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2025-01-25 08:26:31,403:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2025-01-25 08:26:31,403:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 25 Jan 2025 07:26:33 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/347140669395 Replay-Nonce: Z6auUXuuOhlVbw0k4S23T2Tx_AlAxwPAKP7JssfT98f6GDOg4gY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-01-30T04:52:15Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854767445" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/347140669395" } 2025-01-25 08:26:31,403:DEBUG:acme.client:Storing nonce: Z6auUXuuOhlVbw0k4S23T2Tx_AlAxwPAKP7JssfT98f6GDOg4gY 2025-01-25 08:26:31,404:DEBUG:acme.client:JWS payload: b'' 2025-01-25 08:26:31,410:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/92790611/464854767445: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiWjZhdVVYdXVPaGxWYncwazRTMjNUMlR4X0FsQXh3UEFLUDdKc3NmVDk4ZjZHRE9nNGdZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei85Mjc5MDYxMS80NjQ4NTQ3Njc0NDUifQ", "signature": "iSH-fdNUV0sN6SLabqzBnxG4-uLBbV41ZJl9ibuqBWxU8HW6Q0_LfOs8limja0KLPluEv9iCwEq0UX-Vwat7YFsYDnD3nVskWXkEFEU_JNnyBOmSY5GfhpR7N6gDfAV6_sP_ulBnZs4E27aXIlhWWLF1Bg7LD-epVybSQPTzWuyMwJf4lCWhWkaFhumbfrL_vMa6t_XBnOQz6Y08K7EeZg9dbpkIgh-2xdDpocBriRDjwmV_9boibljTzPuMDZntpT-YIz6yiKOHYBkjtR-6LcG_kDXOr59BW52U2sKrqUtmgHaQSRzB_yULCu-shBZy5WiWQvwDzkSctknKWQ-TKA", "payload": "" } 2025-01-25 08:26:31,563:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/92790611/464854767445 HTTP/1.1" 200 823 2025-01-25 08:26:31,564:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 25 Jan 2025 07:26:33 GMT Content-Type: application/json Content-Length: 823 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: KY2mD_AjxiSO3fFad9YNP_FI57-C8-vMI4JbjeQC7VqA0SMoqYM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2025-01-30T04:52:15Z", "challenges": [ { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854767445/9iBbmQ", "status": "pending", "token": "Z2FjGy5YI24p9E9ApXNQZTvas2Cq6xGIBczpA5STm0k" }, { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854767445/I_YfaQ", "status": "pending", "token": "Z2FjGy5YI24p9E9ApXNQZTvas2Cq6xGIBczpA5STm0k" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/92790611/464854767445/KFIdlQ", "status": "pending", "token": "Z2FjGy5YI24p9E9ApXNQZTvas2Cq6xGIBczpA5STm0k" } ] } 2025-01-25 08:26:31,564:DEBUG:acme.client:Storing nonce: KY2mD_AjxiSO3fFad9YNP_FI57-C8-vMI4JbjeQC7VqA0SMoqYM 2025-01-25 08:26:31,565:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-25 08:26:31,565:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2025-01-25 08:26:31,566:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2025-01-25 08:26:31,566:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2025-01-25 08:26:31,567:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 08:26:31,567:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-25 08:26:31,567:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-25 08:26:31,567:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2025-01-25 08:26:31,569:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2025-01-25 08:26:31,569:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2025-01-25 08:26:31,569:ERROR:certbot._internal.renewal: C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\helix.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2025-01-25 08:26:31,570:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 11 renew failure(s), 0 parse failure(s) 2025-01-25 08:26:31,574:ERROR:certbot._internal.log:11 renew failure(s), 0 parse failure(s)