2023-11-23 10:06:49,958:DEBUG:certbot._internal.main:certbot version: 1.6.0 2023-11-23 10:06:49,959:DEBUG:certbot._internal.main:Arguments: [] 2023-11-23 10:06:49,959:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2023-11-23 10:06:50,765:DEBUG:certbot._internal.log:Root logging level set at 20 2023-11-23 10:06:50,765:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2023-11-23 10:06:50,799:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2023-11-23 10:06:50,838:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-23 10:06:51,250:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-23 10:06:51,259:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is signed by the certificate's issuer. 2023-11-23 10:06:51,263:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is: OCSPCertStatus.GOOD 2023-11-23 10:06:51,270:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:23 UTC. 2023-11-23 10:06:51,271:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 10:06:51,271:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-23 10:06:51,277:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-23 10:06:51,277:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-23 10:06:51,277:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-23 10:06:51,283:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-23 10:06:51,284:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-23 10:06:51,286:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-23 10:06:51,736:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-23 10:06:51,737:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:06:50 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "VZy9k524e3E": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-23 10:06:51,738:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-23 10:06:56,037:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6999_key-certbot.pem 2023-11-23 10:06:59,957:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6997_csr-certbot.pem 2023-11-23 10:06:59,958:DEBUG:acme.client:Requesting fresh nonce 2023-11-23 10:06:59,958:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-23 10:07:00,109:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-23 10:07:00,109:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:06:59 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf86FQ3K7Xslx9fuckELGpIE43HisIpKrOa_XgXm8gga7s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-23 10:07:00,109:DEBUG:acme.client:Storing nonce: nbWKegf86FQ3K7Xslx9fuckELGpIE43HisIpKrOa_XgXm8gga7s 2023-11-23 10:07:00,110:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2023-11-23 10:07:00,115:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjg2RlEzSzdYc2x4OWZ1Y2tFTEdwSUU0M0hpc0lwS3JPYV9YZ1htOGdnYTdzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "t_N3IXfI6-igErfvEej-1r2KGTtNHI3idBya0de1fIFJgWq4kvsV1Ga0TMlxNmnaF3PsM-0BRJj3xmyH8YPMFfa6K6_n9rGC4x5_v8cPtvzsOT_DMhW75LeoEODrOwFIy2vkV8EZTSLl2XAoTqhxaz_AvpRCz2tJbkpzBTBdQYtazPU42EMNlBD2mPX5Z9l1lh0oRMYNVwFfCfWd4jux_XjzqRMHyJ43uQue_nOB2HHzgjbmrs5css0XtPy8pgnSG8dE30ENXJcrqIx4ctaZtHzlnA3UiEzDpdZvMlwp_ED_DWImxd_7tqcHtvfP2DVL5TY7Zcn9WH3kxIGvDrgQAg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-23 10:07:00,356:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2023-11-23 10:07:00,357:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 23 Nov 2023 09:06:59 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223795980256 Replay-Nonce: v0bMowfi_J1aODoVcUfpwuZtdp4L1XQevT8J_eNkkiRdvNxTHpc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:00Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066491486" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223795980256" } 2023-11-23 10:07:00,357:DEBUG:acme.client:Storing nonce: v0bMowfi_J1aODoVcUfpwuZtdp4L1XQevT8J_eNkkiRdvNxTHpc 2023-11-23 10:07:00,357:DEBUG:acme.client:JWS payload: b'' 2023-11-23 10:07:00,363:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066491486: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlfSjFhT0RvVmNVZnB3dVp0ZHA0TDFYUWV2VDhKX2VOa2tpUmR2TnhUSHBjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY0OTE0ODYifQ", "signature": "r-L9GWrVWjK_eYzBCg3M2GYHfPQBzPQMqjbZPlHYZBOE6bFV6sf66HiBNDSQ2skqUy0pRmZ_mRXmQqxJBK2-5IsRXrHW9N6aLCcr0SshWvPHY7dp72Gczw-eRjgY5qEOLx_rwpVOXbMXt0V669BxjG56mIYczIOLlo7f6-9JGwy2Gev5lTX7vvc4DN7x-vKG9vqHJv357FXJj4XGe4bl9EmHg6881QBT0pGg3SQuljVR4skG4z2PLmx50L98XnzagCeOfKYZTcS-Z-XAxCM1uKiXOXoXhau8d2-fRH2Z8P7mcstowGmVADZshSZ-UFplwr00c9fqxQor79Wh30aDuA", "payload": "" } 2023-11-23 10:07:00,511:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066491486 HTTP/1.1" 200 810 2023-11-23 10:07:00,512:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:06:59 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf87Jn6fUnbeS_lMNnC3Q8GAMxMtSJo9ZmB4oybAXK5BOA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:00Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066491486/iZpoTw", "token": "sb15n-zcYGZjmBEw4udDUXuX-BTwRrUMF--2J3EM_48" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066491486/hLn7qQ", "token": "sb15n-zcYGZjmBEw4udDUXuX-BTwRrUMF--2J3EM_48" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066491486/g8UZBg", "token": "sb15n-zcYGZjmBEw4udDUXuX-BTwRrUMF--2J3EM_48" } ] } 2023-11-23 10:07:00,512:DEBUG:acme.client:Storing nonce: nbWKegf87Jn6fUnbeS_lMNnC3Q8GAMxMtSJo9ZmB4oybAXK5BOA 2023-11-23 10:07:00,513:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-23 10:07:00,513:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2023-11-23 10:07:00,514:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-23 10:07:00,514:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-23 10:07:00,529:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 10:07:00,529:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-23 10:07:00,529:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-23 10:07:00,529:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-23 10:07:00,534:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 10:07:00,571:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-23 10:07:00,970:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-23 10:07:00,971:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-23 10:07:00,972:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-23 10:07:00,975:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:36 UTC. 2023-11-23 10:07:00,975:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 10:07:00,976:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-23 10:07:00,980:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-23 10:07:00,981:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-23 10:07:00,981:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-23 10:07:00,996:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-23 10:07:00,997:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-23 10:07:00,999:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-23 10:07:01,457:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-23 10:07:01,458:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:07:00 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "OA94Aigy31U": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-23 10:07:01,458:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-23 10:07:05,192:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7000_key-certbot.pem 2023-11-23 10:07:08,799:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6998_csr-certbot.pem 2023-11-23 10:07:08,799:DEBUG:acme.client:Requesting fresh nonce 2023-11-23 10:07:08,799:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-23 10:07:08,953:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-23 10:07:08,953:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:07:08 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8RvdapTQ0A1UUPAn-uVMzLlE7txtoRXsrbpzgeCGUwGI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-23 10:07:08,953:DEBUG:acme.client:Storing nonce: nbWKegf8RvdapTQ0A1UUPAn-uVMzLlE7txtoRXsrbpzgeCGUwGI 2023-11-23 10:07:08,953:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2023-11-23 10:07:08,960:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhSdmRhcFRRMEExVVVQQW4tdVZNekxsRTd0eHRvUlhzcmJwemdlQ0dVd0dJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "sVjn6RIOsA4wVfcpZoN-AbTRjuM3kqkokJMYUBe413nyaWy8kRBTFPIOltAX0tcHQKVCiEpk3DKOL29YAD0iyDACHyrCkbKup_TWVSnbsi6w_RpjZQyo-pWPP3vFnXg0IGxZVLC1jXO9jelkLPAdieXnDlXH_om1oDOAdY6rP9hXOniIjqmsa-5GoIUnMW-XAmISOjt4bJYkFeV57OPdalKL46C2_b_U1xMOoNciBD0t9aWqHLuDrynTkqes0d_Y8Cd1mxbYKFW-RsOVyumfpCSWykL6mYKbb_cVNOrOoQKaG5BX2-WDe5GiW3CqTMNlnD5humdSYRsO5eJ1E10_gQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-23 10:07:09,132:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2023-11-23 10:07:09,133:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 23 Nov 2023 09:07:08 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796010606 Replay-Nonce: v0bMowfic3hOVE3zNg__TmghvZf1ore71Ge6h3gNR1XzhuZk7bc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:09Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066531206" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796010606" } 2023-11-23 10:07:09,133:DEBUG:acme.client:Storing nonce: v0bMowfic3hOVE3zNg__TmghvZf1ore71Ge6h3gNR1XzhuZk7bc 2023-11-23 10:07:09,133:DEBUG:acme.client:JWS payload: b'' 2023-11-23 10:07:09,140:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066531206: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmljM2hPVkUzek5nX19UbWdodlpmMW9yZTcxR2U2aDNnTlIxWHpodVprN2JjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY1MzEyMDYifQ", "signature": "uLfNLvSpHFKUTps_MRye4kcBRT86nQNPE67zyIoghJ0GMEfHTHQzs3H7-nuimw5O2dpI7G67Bvgxqx_-DH3D81swzoMYjEbc8uE-Um9ba4phN7RHnz-3zM1g-X9WgR9ZjkPwg0IwAegWkQ_9Ier9SRUvEUvczD-TwCk3iCfisHzEsBtLhiwXnVm8HeL8oFXiJOQ_2eIvjPwJeJ4OJ-_UFJwodxayG3I0QLkpvMQzc3k907BQk_Z2SKFWo5f2mMT8xzclcggQNozqRodBRZB1JgKLVtEx2kTE5wt9V-1CkdzmFOqvlHwXbUpANsoZb5rLmeX5Hkunp5KoTu4ftamgjQ", "payload": "" } 2023-11-23 10:07:09,297:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066531206 HTTP/1.1" 200 804 2023-11-23 10:07:09,298:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:07:08 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8SVvzXcLsE19KuDtbczCoEL9eWUrdGhUuisCknb0qHUU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:09Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066531206/HwkKGg", "token": "XnSnBmyZRInRNHNise1p6HXmMUAmTdgzqO5hi25GzvI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066531206/RFhChg", "token": "XnSnBmyZRInRNHNise1p6HXmMUAmTdgzqO5hi25GzvI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066531206/Q06UlA", "token": "XnSnBmyZRInRNHNise1p6HXmMUAmTdgzqO5hi25GzvI" } ] } 2023-11-23 10:07:09,298:DEBUG:acme.client:Storing nonce: nbWKegf8SVvzXcLsE19KuDtbczCoEL9eWUrdGhUuisCknb0qHUU 2023-11-23 10:07:09,299:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-23 10:07:09,299:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2023-11-23 10:07:09,299:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-23 10:07:09,300:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-23 10:07:09,300:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 10:07:09,301:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-23 10:07:09,301:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-23 10:07:09,301:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-23 10:07:09,302:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 10:07:09,351:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-23 10:07:09,743:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-23 10:07:09,744:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-23 10:07:09,745:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-23 10:07:09,749:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:49 UTC. 2023-11-23 10:07:09,749:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 10:07:09,749:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-23 10:07:09,755:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-23 10:07:09,755:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-23 10:07:09,755:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-23 10:07:09,760:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-23 10:07:09,761:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-23 10:07:09,763:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-23 10:07:10,199:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-23 10:07:10,199:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:07:09 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "uXD1ldVN73U": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2023-11-23 10:07:10,200:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-23 10:07:14,180:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7001_key-certbot.pem 2023-11-23 10:07:17,757:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6999_csr-certbot.pem 2023-11-23 10:07:17,758:DEBUG:acme.client:Requesting fresh nonce 2023-11-23 10:07:17,758:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-23 10:07:17,903:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-23 10:07:17,904:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:07:17 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiVVna5bb4kZvsZw6XTuNgB0dNht2nrbtqo1lwBHfRyIA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-23 10:07:17,904:DEBUG:acme.client:Storing nonce: v0bMowfiVVna5bb4kZvsZw6XTuNgB0dNht2nrbtqo1lwBHfRyIA 2023-11-23 10:07:17,904:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2023-11-23 10:07:17,910:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlWVm5hNWJiNGtadnNadzZYVHVOZ0IwZE5odDJucmJ0cW8xbHdCSGZSeUlBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ZblbW-HgF7pUS1rfy0Pg2oQQsXvvxMTa86vEgH-FrBFkN5_YWP3397mbIi2hqAjlEfmRYlVqXUgdxUK6Db0nGx49AeAFlzqVBLR6wn-Eah1HSfa186lwnNTuCXTHCWQ_njaaZGkpe782sHiFEDxZ0g4hjuULymy0hw_ozyH_cvy7aR9oS5Pg8FB_VccH0x5wwBsyj0LUtgmqn_Kq24_56sgbFAMJh9bjXOOJ37bTCwuZI-NA6RUTQrlm3e22dzQiPUmBTQxNS1MwZDTEbJR8D2WDC7JQthWoxnHIcAa9UddPk247foB12ShoN8UQ8PoVnOl9O6GAGsp0_ZZwrZ6MHQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-23 10:07:18,080:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2023-11-23 10:07:18,080:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 23 Nov 2023 09:07:17 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796034066 Replay-Nonce: nbWKegf8wbcAlDSJs4vuBu37lWS2oTAWXMKlYna_C6jpZ3nGAoA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:17Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066566356" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796034066" } 2023-11-23 10:07:18,081:DEBUG:acme.client:Storing nonce: nbWKegf8wbcAlDSJs4vuBu37lWS2oTAWXMKlYna_C6jpZ3nGAoA 2023-11-23 10:07:18,081:DEBUG:acme.client:JWS payload: b'' 2023-11-23 10:07:18,087:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066566356: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjh3YmNBbERTSnM0dnVCdTM3bFdTMm9UQVdYTUtsWW5hX0M2anBaM25HQW9BIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY1NjYzNTYifQ", "signature": "uy3GCqug4w07lHOAK_DWn_j5LTEBecEiZx4YH7gjUIe9gbgyoFJ9Rq5ZPmIVk2HwPZT0CHjD-ITJ67UzBDCTKamZu4RGIR5cEvtHJV-Yo5KyeoZQGyBYET_Urd8c9f_k7vcxuuUzH-sXroGcvA5wdT9QTUKfEt4ni3yQRCZ_2UI6QYCwJC5wnTxLrGAm5TlzXWUCSxCNIEdHtqe-4Uh3knlkJWS-N74X7iMyfvCM7lyTesF7pEl27sXa8UdIQwIe_4WVwkZFWcmGTXurixZ2axdFbBkVEGKRpA_L6CVr3fVnCC_ebBF6ZBRPBNjVdIB_h3tmGdrEGkdgHvTwNJFxAA", "payload": "" } 2023-11-23 10:07:18,250:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066566356 HTTP/1.1" 200 807 2023-11-23 10:07:18,251:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:07:17 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiKS7nS5WDJFn6XkDBT3fjPZ1MY_HNP1GD7GvQPbxrVuU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:17Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066566356/Ahrirw", "token": "4G7MK_dXMu2C2sZjEzJh8AI0cmHBR_DIlPql7MrNzK0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066566356/5ji8UA", "token": "4G7MK_dXMu2C2sZjEzJh8AI0cmHBR_DIlPql7MrNzK0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066566356/9qmJcg", "token": "4G7MK_dXMu2C2sZjEzJh8AI0cmHBR_DIlPql7MrNzK0" } ] } 2023-11-23 10:07:18,252:DEBUG:acme.client:Storing nonce: v0bMowfiKS7nS5WDJFn6XkDBT3fjPZ1MY_HNP1GD7GvQPbxrVuU 2023-11-23 10:07:18,252:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-23 10:07:18,252:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2023-11-23 10:07:18,253:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-23 10:07:18,253:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-23 10:07:18,254:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 10:07:18,255:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-23 10:07:18,255:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-23 10:07:18,255:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-23 10:07:18,257:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 10:07:18,292:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-23 10:07:18,517:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-23 10:07:18,518:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-23 10:07:18,519:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-23 10:07:18,523:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:02 UTC. 2023-11-23 10:07:18,523:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 10:07:18,524:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-23 10:07:18,528:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-23 10:07:18,529:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-23 10:07:18,529:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-23 10:07:18,544:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-23 10:07:18,544:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-23 10:07:18,546:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-23 10:07:18,991:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-23 10:07:18,992:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:07:18 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "iHeEpMhhxj8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-23 10:07:18,993:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-23 10:07:22,610:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7002_key-certbot.pem 2023-11-23 10:07:26,103:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7000_csr-certbot.pem 2023-11-23 10:07:26,104:DEBUG:acme.client:Requesting fresh nonce 2023-11-23 10:07:26,104:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-23 10:07:26,253:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-23 10:07:26,254:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:07:25 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8hlv-Nh1xoT3fLClzjT1oPlnevpHXdXq8glfQTKlfBAc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-23 10:07:26,254:DEBUG:acme.client:Storing nonce: nbWKegf8hlv-Nh1xoT3fLClzjT1oPlnevpHXdXq8glfQTKlfBAc 2023-11-23 10:07:26,254:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2023-11-23 10:07:26,260:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhobHYtTmgxeG9UM2ZMQ2x6alQxb1BsbmV2cEhYZFhxOGdsZlFUS2xmQkFjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "SfqPD2Mpr29vjysaao1dScBKZBRU195eRTzEWQUhd_kPynqk-en4RNIvKuldJixc8ek5znaaRw-lf0VEPoZdYuYCHnHHKJewKmdrU2AVkrwrlnQNXzXKPtx_ydY2Dbmo86920ou-gizF3j-FG6RwnyMrOVW7JDSWeT-lpYAPgFvY6br7vef9BWnKMWBKURtT4PhK6gHmd-dxYrDYtcmRRumFqbntxK2GaBcL9gjS2cFBv-nbhaF8CHZaA_1U9vuHOjhHctuk6cRlClwOoyEY4NTZKCeWbEE7ct-nG2y8AnfPKydVJblvWtQ-xViRR6U3AyVtuz6xJMRDpm8EdOfoBw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-23 10:07:26,430:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2023-11-23 10:07:26,431:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 23 Nov 2023 09:07:25 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796055606 Replay-Nonce: nbWKegf8mglLy-hSO_MkUbRtZ_u0JXzXp_yREgYR12JnlGaQhLs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:26Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066598576" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796055606" } 2023-11-23 10:07:26,431:DEBUG:acme.client:Storing nonce: nbWKegf8mglLy-hSO_MkUbRtZ_u0JXzXp_yREgYR12JnlGaQhLs 2023-11-23 10:07:26,431:DEBUG:acme.client:JWS payload: b'' 2023-11-23 10:07:26,436:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066598576: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhtZ2xMeS1oU09fTWtVYlJ0Wl91MEpYelhwX3lSRWdZUjEySm5sR2FRaExzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY1OTg1NzYifQ", "signature": "q0mON4ez5Mael9wrpPK7awoViNSjkFGxSQuPl8gRC-pCQywujuFrK6SzZYUFy2m9KC_AwkFfbV5R9KgTd2uOQDBFMo9u-sJ0fTFWE_wQldoWSF8M-0lhaLuRqelGtSKYtPsawyPkpFTwovUejxZUmmohFuC9CnVGK2ZX2sCPLNB2FE7v353oOS3aTc-VlVP5WAOyTanH7vChNYd3RkvLC-AI7Edl0tWd71cslfquOTyu6IrhLcrkRm9nfmLhFPKoQeGq-klaf_NQ-4uIyF3XeKdHoD5EiCobeC2zy2okVusgipQVxUrVoSXbBhX-lsxVYP2FNmuT0ih8eLBBcvdpvg", "payload": "" } 2023-11-23 10:07:26,588:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066598576 HTTP/1.1" 200 801 2023-11-23 10:07:26,589:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:07:25 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8k5g4qtQEBtn-72VTfnyCTwYuRRwTjMPdFuHOz8yXnBc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:26Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066598576/f3URKA", "token": "J6ZL0EQU-jtK9avoLKda1DkzwcegKRZen1GsEEp4cxs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066598576/iDceBQ", "token": "J6ZL0EQU-jtK9avoLKda1DkzwcegKRZen1GsEEp4cxs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066598576/LT38xQ", "token": "J6ZL0EQU-jtK9avoLKda1DkzwcegKRZen1GsEEp4cxs" } ] } 2023-11-23 10:07:26,589:DEBUG:acme.client:Storing nonce: nbWKegf8k5g4qtQEBtn-72VTfnyCTwYuRRwTjMPdFuHOz8yXnBc 2023-11-23 10:07:26,590:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-23 10:07:26,590:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2023-11-23 10:07:26,590:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-23 10:07:26,591:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-23 10:07:26,591:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 10:07:26,592:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-23 10:07:26,592:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-23 10:07:26,592:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-23 10:07:26,593:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 10:07:26,640:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-23 10:07:27,028:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-23 10:07:27,029:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-23 10:07:27,029:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-23 10:07:27,034:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:14 UTC. 2023-11-23 10:07:27,034:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 10:07:27,034:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-23 10:07:27,040:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-23 10:07:27,040:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-23 10:07:27,040:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-23 10:07:27,044:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-23 10:07:27,044:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-23 10:07:27,046:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-23 10:07:27,509:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-23 10:07:27,509:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:07:26 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "R3an6BEYCX4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-23 10:07:27,510:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-23 10:07:31,285:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7003_key-certbot.pem 2023-11-23 10:07:34,756:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7001_csr-certbot.pem 2023-11-23 10:07:34,756:DEBUG:acme.client:Requesting fresh nonce 2023-11-23 10:07:34,757:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-23 10:07:34,909:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-23 10:07:34,910:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:07:34 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfia0a2QRlIz5-bnydkM7VpcsUvN9lSBh1WimnG4FJxkU8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-23 10:07:34,910:DEBUG:acme.client:Storing nonce: v0bMowfia0a2QRlIz5-bnydkM7VpcsUvN9lSBh1WimnG4FJxkU8 2023-11-23 10:07:34,910:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2023-11-23 10:07:34,916:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlhMGEyUVJsSXo1LWJueWRrTTdWcGNzVXZOOWxTQmgxV2ltbkc0Rkp4a1U4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "fpYcj71I3qqzV4V6bkBuIKuU0lHfIIu3yUFKxIsLhFtxKslLKbOFvyYG-OHWBB7QmOsofMd_2i576UDrv3OGBafhAZBLqCX0lENCa_PujxRZLlCZn4Op33jdPep4MWJ9O5QjApieXwNh-EwBhPPrFtKoD8gNjxwlbtEqXdcysFsvEnJIZO-hshoSFFKjSzWfNo0xzWEXFWE-OHkbsW8l5Irevj_iTfLTix91_BNw6AkdvtdSoaurAV46pR4NSFoHIqpg9Bwn9f1aLU6zJJ-Uy6-9T4ccgcThTZT3xCsLXjVQQTJl0Je5e85FG9zLSJzaNVG6ofmFL6apDVcAhFdb6g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-23 10:07:35,114:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-23 10:07:35,115:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 23 Nov 2023 09:07:34 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796073426 Replay-Nonce: nbWKegf853NAMvL4nrcB-Y5drYRrtr-RDWGE2t6Pmb4G-O8O4IU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:34Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066622126" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796073426" } 2023-11-23 10:07:35,115:DEBUG:acme.client:Storing nonce: nbWKegf853NAMvL4nrcB-Y5drYRrtr-RDWGE2t6Pmb4G-O8O4IU 2023-11-23 10:07:35,116:DEBUG:acme.client:JWS payload: b'' 2023-11-23 10:07:35,121:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066622126: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjg1M05BTXZMNG5yY0ItWTVkcllScnRyLVJEV0dFMnQ2UG1iNEctTzhPNElVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2MjIxMjYifQ", "signature": "UAIsKhyCN92dcXQ0b67ukPeEYmP8Kp1Ggszy2ZTsn2Dz3beQI11L_ewuxKXGNSW2ATlxMRmIfyGQ1RGCqGgnJmZcwexq9B3nMquNU3shQ8m-OYroSqC7Z3O8qFyhBoY2ltAIamQAHOKPM4GQxRInvRvFBxBVGtFyaqoZDCxVh-CGzvSlyV-Sc30khAy6cc5JJ8dq41t0R2v8zXa2BydZL-Lkead4Vyw1Sh1hzjvtD73I7ICvoRHdrW7etjN2-ItFFB6k-fTi7TlQtdO3b2OXpYFsM1SAWpO8pU5y-YSn7nHoJl-rZzyXs5sH00G-X_wcubyx3t31vCBOmGkGnBBJyw", "payload": "" } 2023-11-23 10:07:35,278:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066622126 HTTP/1.1" 200 805 2023-11-23 10:07:35,279:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:07:34 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiwbz8djdVXWLN5ijmDd4hMs3bSCPw85G1A8IKAZEqjxI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:34Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066622126/zRCxuQ", "token": "gv2fmd0seZNcl7Js9O_Y9lNTlUdsETbsewgxCi8k0AI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066622126/gv15MQ", "token": "gv2fmd0seZNcl7Js9O_Y9lNTlUdsETbsewgxCi8k0AI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066622126/tryPHA", "token": "gv2fmd0seZNcl7Js9O_Y9lNTlUdsETbsewgxCi8k0AI" } ] } 2023-11-23 10:07:35,279:DEBUG:acme.client:Storing nonce: v0bMowfiwbz8djdVXWLN5ijmDd4hMs3bSCPw85G1A8IKAZEqjxI 2023-11-23 10:07:35,279:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-23 10:07:35,280:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2023-11-23 10:07:35,280:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-23 10:07:35,280:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-23 10:07:35,281:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 10:07:35,281:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-23 10:07:35,281:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-23 10:07:35,282:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-23 10:07:35,284:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 10:07:35,332:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-23 10:07:35,717:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-23 10:07:35,718:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-23 10:07:35,719:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-23 10:07:35,723:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:27 UTC. 2023-11-23 10:07:35,723:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 10:07:35,723:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-23 10:07:35,728:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-23 10:07:35,729:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-23 10:07:35,729:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-23 10:07:35,733:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-23 10:07:35,734:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-23 10:07:35,736:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-23 10:07:36,185:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-23 10:07:36,185:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:07:35 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "pkgulOk43fY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-23 10:07:36,186:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-23 10:07:39,872:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7004_key-certbot.pem 2023-11-23 10:07:43,348:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7002_csr-certbot.pem 2023-11-23 10:07:43,349:DEBUG:acme.client:Requesting fresh nonce 2023-11-23 10:07:43,349:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-23 10:07:43,500:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-23 10:07:43,501:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:07:42 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfii1QS5vpD41jaMS5qk_IkKiJbI829F47fxWpjtRCxtsA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-23 10:07:43,501:DEBUG:acme.client:Storing nonce: v0bMowfii1QS5vpD41jaMS5qk_IkKiJbI829F47fxWpjtRCxtsA 2023-11-23 10:07:43,502:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2023-11-23 10:07:43,509:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlpMVFTNXZwRDQxamFNUzVxa19Ja0tpSmJJODI5RjQ3ZnhXcGp0UkN4dHNBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "A_aKlF1RZIT23u8cEUdoJCxqyqZ8njrUSESIW4Tt-rCX9D9fem3vFohYRiw7EUHIN5Hob_lwW1e6UQlxJRGhhfvOUSvLkwTyiQWan36tbWseplzcMMMdNGE--PotsF1CEspDdUf9ZaFLkkeFayDaf-4gBZI_Re0Hjp0-UmPexztaWHpJSUBL_xWPZYQbrBTKt2QUe1rJ_KPf6CS13ehEBtfA6AZnzStTI2QxPUjTX5WAWdrykKJieDX55CHi6vEHX888gYdhBo1P61jZQPPsT-UymDP-ON54pWSHh-9o7Oq_mM4AeI_oJK1dIyGrkge6m8BWizZLFOOWD8KFkPoKkQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-23 10:07:43,673:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2023-11-23 10:07:43,673:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 23 Nov 2023 09:07:42 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796091136 Replay-Nonce: v0bMowfilYu4j34r3SlLxP0GzCWnfLx0yjm7xZbZ3b2vFSY1Xog X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:43Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066646896" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796091136" } 2023-11-23 10:07:43,674:DEBUG:acme.client:Storing nonce: v0bMowfilYu4j34r3SlLxP0GzCWnfLx0yjm7xZbZ3b2vFSY1Xog 2023-11-23 10:07:43,674:DEBUG:acme.client:JWS payload: b'' 2023-11-23 10:07:43,679:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066646896: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlsWXU0ajM0cjNTbEx4UDBHekNXbmZMeDB5am03eFpiWjNiMnZGU1kxWG9nIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2NDY4OTYifQ", "signature": "CZP0As9d6bosJLOdl1BedmqMzLl0wx9lgjqzHPzYU5VKLz0cwtxjrAHxBSOj1tr5gc9bAEdQmgVR7TcM6o7gphRO55nDNtqbK0T45-ybg6PmoTugyiN5ySZK2NxN8cXpKBkQGFyUUWuNm28IaEqrSgJgaSXDhN34O0GomN09NuQLvynBdlRQGYalQCinLg_PeCFmkrsBTRuHMkhd-H2VJle7mc2eecz821tbJ8rpxXDklH6ectBVVf6q754SE18Y3CaSRdhypLdqDHXeVkQ0Sn39nWzJFpjTYKgUXPOV3v1RxCwEVGm9A6LTFmkYcNP8baj38gMOyiQ3j2-U5xINNA", "payload": "" } 2023-11-23 10:07:43,857:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066646896 HTTP/1.1" 200 809 2023-11-23 10:07:43,858:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:07:43 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiXf8AuSc6VhyV2wegkV-1jGRWFooNYK0a1xi1Eb5nNg8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:43Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066646896/juW_-A", "token": "CWWUm3uLuT3l53wpiS92M-Qv-NaCbupUBW732wE0vd8" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066646896/EWbN0Q", "token": "CWWUm3uLuT3l53wpiS92M-Qv-NaCbupUBW732wE0vd8" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066646896/0CyP5g", "token": "CWWUm3uLuT3l53wpiS92M-Qv-NaCbupUBW732wE0vd8" } ] } 2023-11-23 10:07:43,858:DEBUG:acme.client:Storing nonce: v0bMowfiXf8AuSc6VhyV2wegkV-1jGRWFooNYK0a1xi1Eb5nNg8 2023-11-23 10:07:43,859:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-23 10:07:43,859:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2023-11-23 10:07:43,860:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-23 10:07:43,860:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-23 10:07:43,860:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 10:07:43,861:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-23 10:07:43,861:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-23 10:07:43,861:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-23 10:07:43,862:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 10:07:43,899:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-23 10:07:44,133:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-23 10:07:44,134:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-23 10:07:44,135:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-23 10:07:44,139:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:41 UTC. 2023-11-23 10:07:44,139:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 10:07:44,140:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-23 10:07:44,144:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-23 10:07:44,144:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-23 10:07:44,144:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-23 10:07:44,148:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-23 10:07:44,149:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-23 10:07:44,151:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-23 10:07:44,601:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-23 10:07:44,602:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:07:43 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "725tmQB_-kM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-23 10:07:44,602:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-23 10:07:48,325:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7005_key-certbot.pem 2023-11-23 10:07:51,809:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7003_csr-certbot.pem 2023-11-23 10:07:51,810:DEBUG:acme.client:Requesting fresh nonce 2023-11-23 10:07:51,810:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-23 10:07:51,961:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-23 10:07:51,961:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:07:51 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfioWBegMNSHdHserAs-JGhVA8LN1h4XgL9Zv-du6HmCX0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-23 10:07:51,962:DEBUG:acme.client:Storing nonce: v0bMowfioWBegMNSHdHserAs-JGhVA8LN1h4XgL9Zv-du6HmCX0 2023-11-23 10:07:51,962:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2023-11-23 10:07:51,967:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlvV0JlZ01OU0hkSHNlckFzLUpHaFZBOExOMWg0WGdMOVp2LWR1NkhtQ1gwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Mu3100wgOjxndYZMJiPoni3CYWjjbxJLD89Yrf4bxmEs57SFlJC9tgGM_OpQBJxuhmZRl9K_6H_u8gRiAFncWOkkpP9cL3f83Py9NSm27wJ1K3EGS62zzywDCYBfoQga-APMsJhb9SGMNjOsNktAasGGy4hbAMuSZk-Nsc0hBglW89zLt2kezzBxYkuXzgGNUAbS5_BT1bdSLaIoC-6qQ2G-EJHSk0J_qlTYQUv6IL47LFOAJZ_xy2Q8Pm99agcZobuYc8sm6CAq7O1k_uZrzQiLFaKLUYlZI-b9jZMzu_5F7IAx05m-t_LEEyGI9_mixV7pesg5VYkZEonTx9i-KA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-23 10:07:52,209:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2023-11-23 10:07:52,210:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 23 Nov 2023 09:07:51 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796108646 Replay-Nonce: v0bMowfiPWv4zuNph6mkr1NDlAbJr1kpJfCys5Ys2skop_e8qHU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:52Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066669286" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796108646" } 2023-11-23 10:07:52,210:DEBUG:acme.client:Storing nonce: v0bMowfiPWv4zuNph6mkr1NDlAbJr1kpJfCys5Ys2skop_e8qHU 2023-11-23 10:07:52,210:DEBUG:acme.client:JWS payload: b'' 2023-11-23 10:07:52,216:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066669286: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlQV3Y0enVOcGg2bWtyMU5EbEFiSnIxa3BKZkN5czVZczJza29wX2U4cUhVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2NjkyODYifQ", "signature": "li29NZLM4RGT4EB3sX1indyZe_0Juz7iNSQzEq0Xp5l7ajScxwbnnxD9i7TdW7R6EM3LBj1mClppNpiKm07ud8G_2Jv9nIoH59skiLd0xQgU6tQauOLvpSfamXVDapIhzhH4DGEjxubhR1J0p1Nf4V8184PQpMTc6lfVIAdf_ch8m3D0tMoVMS8co9GvufMA1D0nfsCaz4iVCPII6qLkiYSSXe8dovlNCSKqVDtkP30mIvvpPn5TAO4EgZ1_oJg-RgVG5BUjoNKKHHLhx8QBIX_nNuLIYguO9kecIiu7G8m4MSi2iaGfBVmXN68u5fKoYGmu6uA-F4wefTP4nmLVcQ", "payload": "" } 2023-11-23 10:07:52,370:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066669286 HTTP/1.1" 200 806 2023-11-23 10:07:52,370:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:07:51 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiSuP_wulopZ95PKTXICmy5uGYGs3IkoFOTS1KjEyHqog X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:52Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066669286/DZCB_w", "token": "FOLQeQhM5d7jUf4G9Qq1v4w7kH45foXttXys0ZoHmyY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066669286/3LwN7g", "token": "FOLQeQhM5d7jUf4G9Qq1v4w7kH45foXttXys0ZoHmyY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066669286/N8DWOw", "token": "FOLQeQhM5d7jUf4G9Qq1v4w7kH45foXttXys0ZoHmyY" } ] } 2023-11-23 10:07:52,370:DEBUG:acme.client:Storing nonce: v0bMowfiSuP_wulopZ95PKTXICmy5uGYGs3IkoFOTS1KjEyHqog 2023-11-23 10:07:52,371:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-23 10:07:52,371:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2023-11-23 10:07:52,371:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-23 10:07:52,371:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-23 10:07:52,372:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 10:07:52,372:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-23 10:07:52,372:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-23 10:07:52,372:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-23 10:07:52,373:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 10:07:52,409:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2023-11-23 10:07:52,409:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 10:07:52,409:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2023-11-23 10:07:52,415:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2023-11-23 10:07:52,418:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2023-11-23 10:07:52,418:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2023-11-23 10:07:52,418:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2023-11-23 10:07:52,419:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2023-11-23 10:07:52,421:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2023-11-23 10:07:52,457:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-23 10:07:52,548:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-23 10:07:52,549:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-23 10:07:52,550:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-23 10:07:52,554:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:56 UTC. 2023-11-23 10:07:52,554:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 10:07:52,554:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-23 10:07:52,559:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-23 10:07:52,559:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-23 10:07:52,559:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-23 10:07:52,564:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-23 10:07:52,565:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-23 10:07:52,566:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-23 10:07:53,113:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-23 10:07:53,114:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:07:52 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "GW6et-XxLZ0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-23 10:07:53,114:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-23 10:07:56,809:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7006_key-certbot.pem 2023-11-23 10:08:00,261:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7004_csr-certbot.pem 2023-11-23 10:08:00,262:DEBUG:acme.client:Requesting fresh nonce 2023-11-23 10:08:00,262:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-23 10:08:00,439:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-23 10:08:00,440:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:07:59 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsn5QQJ3M6f1xfkG_8vagq240XJC_QPvIyF6RjSluIBUDw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-23 10:08:00,440:DEBUG:acme.client:Storing nonce: jXyutbsn5QQJ3M6f1xfkG_8vagq240XJC_QPvIyF6RjSluIBUDw 2023-11-23 10:08:00,441:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2023-11-23 10:08:00,449:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic241UVFKM002ZjF4ZmtHXzh2YWdxMjQwWEpDX1FQdkl5RjZSalNsdUlCVUR3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "DrlUfqoBfNz_d0zWzio-IukWmSwKKzEsf4ul6iQl8tQDNFg0fyyxVQc997zSLQL-PKjVPUsQEOE7yH4c8x97oBHM0F28rej23N2x2pa_-stKbGtLr1qQwxXuEivRai1iLlw20nDBbYmYpIkUsSgB9PNLAduZvwLXgG0L7SH7G15X1guVHK4ShCNJW9lW63tneP3iNdlgBrrJcgx7X9HuwpQErOv-kJfkILbd94xHisKAawKCLYzjUk6XoqrO-TOHy5sAb_84ZOUut50s6x-Y4iUpg_wULjxUajCSWDOcw4lqEE6lB7vw-eiLgH11cxSZ9EjlSkTBd5GfodcQW-ATrQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-23 10:08:00,642:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2023-11-23 10:08:00,643:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 23 Nov 2023 09:07:59 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796125916 Replay-Nonce: SFMYLIQje9n7zr1EEJDG24d7GfZUR5PN2BiwSpKG8U9KrbU17IE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:00Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066692866" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796125916" } 2023-11-23 10:08:00,643:DEBUG:acme.client:Storing nonce: SFMYLIQje9n7zr1EEJDG24d7GfZUR5PN2BiwSpKG8U9KrbU17IE 2023-11-23 10:08:00,643:DEBUG:acme.client:JWS payload: b'' 2023-11-23 10:08:00,649:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066692866: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWplOW43enIxRUVKREcyNGQ3R2ZaVVI1UE4yQml3U3BLRzhVOUtyYlUxN0lFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2OTI4NjYifQ", "signature": "a7mm7sH5tvtQRJClKK089nh7q6Unbdh4TAUelTitRtguAkMPmfsXSQ6AqxWjHQ9ilrP4SCPV72hdYz0HO4RkkCgAbsTmzKqFl3EG-roaPo57TmMUlJFHNN62gV0vKrx6yK1dDU4xuiGWFy0icfKjTA1MHYcVE1KhJrGup7uxak5PVTfEvPKMSrAtpgRVYk8n6_uxXpTL3TdL3RENDFMjFIFSN78CyjmYguuEYzF2vu79rPk1KusEEk6VOztkmrLEn0MFI_4ko_goCaEsE3G63ZHtDXL-zD-6RkNRAg6bgD8qdhpxIJ6apF3XY2QUWxE36gnwq8J8NmnYSxNJIgQ0vw", "payload": "" } 2023-11-23 10:08:00,830:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066692866 HTTP/1.1" 200 811 2023-11-23 10:08:00,831:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:07:59 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsn8kJ4bgaXoatTa17jAMtkJ6UM3FfvncTQInH-72_7VMw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:00Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066692866/TZHJ0A", "token": "otJKkgRT8z2VOaRDiAmAclIadkc79VXFNmsAESfM3y0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066692866/YBeUJQ", "token": "otJKkgRT8z2VOaRDiAmAclIadkc79VXFNmsAESfM3y0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066692866/i1p7PQ", "token": "otJKkgRT8z2VOaRDiAmAclIadkc79VXFNmsAESfM3y0" } ] } 2023-11-23 10:08:00,831:DEBUG:acme.client:Storing nonce: jXyutbsn8kJ4bgaXoatTa17jAMtkJ6UM3FfvncTQInH-72_7VMw 2023-11-23 10:08:00,831:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-23 10:08:00,832:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2023-11-23 10:08:00,832:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-23 10:08:00,833:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-23 10:08:00,833:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 10:08:00,833:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-23 10:08:00,834:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-23 10:08:00,834:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-23 10:08:00,835:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 10:08:00,883:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-23 10:08:01,286:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-23 10:08:01,287:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-23 10:08:01,288:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-23 10:08:01,293:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:09 UTC. 2023-11-23 10:08:01,293:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 10:08:01,293:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-23 10:08:01,298:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-23 10:08:01,298:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-23 10:08:01,298:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-23 10:08:01,303:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-23 10:08:01,303:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-23 10:08:01,305:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-23 10:08:01,845:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-23 10:08:01,846:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:08:00 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "WQCEBCeDHGE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-23 10:08:01,846:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-23 10:08:05,368:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7007_key-certbot.pem 2023-11-23 10:08:08,834:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7005_csr-certbot.pem 2023-11-23 10:08:08,834:DEBUG:acme.client:Requesting fresh nonce 2023-11-23 10:08:08,834:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-23 10:08:09,016:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-23 10:08:09,016:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:08:08 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnp65PwI31Arzq2h4_GKB2TPVC8EhKXIWFtqnonviRFB4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-23 10:08:09,016:DEBUG:acme.client:Storing nonce: jXyutbsnp65PwI31Arzq2h4_GKB2TPVC8EhKXIWFtqnonviRFB4 2023-11-23 10:08:09,017:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2023-11-23 10:08:09,023:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25wNjVQd0kzMUFyenEyaDRfR0tCMlRQVkM4RWhLWElXRnRxbm9udmlSRkI0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "BFAZtzA45a_w49kZE__X_UimnTY3wSUNA0qI0w2mTdpbHauS5RfYGoDQ3qY1yTw3TVV4nwxda3mwB2FZqOVK2gnf8qjbtoqFNoIkkefed6JxF1mMSGhrsw_jR2BB2WFE3Nj2wh-ciLCRAUqGi6czK7om3am4gFOEbXYXY7etQEfP77G_rO1pT6Xduq0ihdM35vZWMWNphT8RNLijd9b75HkDLC6wNQd5QcZDVwfbXeRU1umiR3ui63OyX20y61uw6-Yl7WGyt0lnmvpcxiOPrizICoNT5dNBRGzSNX545LnsS435LO9I2iObHTpZIux0v9vSi3plh1EtUBPMmOh9eg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-23 10:08:09,231:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2023-11-23 10:08:09,232:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 23 Nov 2023 09:08:08 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796165656 Replay-Nonce: SFMYLIQjKI27WRl9cDnq5uhbM1ux-bcGee2CCMaLdbdtTmFsF-c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:08Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066738016" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796165656" } 2023-11-23 10:08:09,232:DEBUG:acme.client:Storing nonce: SFMYLIQjKI27WRl9cDnq5uhbM1ux-bcGee2CCMaLdbdtTmFsF-c 2023-11-23 10:08:09,232:DEBUG:acme.client:JWS payload: b'' 2023-11-23 10:08:09,238:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066738016: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpLSTI3V1JsOWNEbnE1dWhiTTF1eC1iY0dlZTJDQ01hTGRiZHRUbUZzRi1jIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY3MzgwMTYifQ", "signature": "nJjU-ezgSLO_OIltJiik_2yFOEgxTIomP7UVa23hYEZ_GYOgLhlai5qkKacml1tfCSj9lH_hRs4m0ohd2HoPN-4iDcz9MkTMMljEfUDMZTMZqlznnQJK_0r8YjocLRPr6lkH0AWOlSmmPQMeP9Sqvs07MtzEAsE6ku1yDToG3_cxDqsHY5AXpL615SkHhXhTyAE_RucbgHeqkEaC25u4qm7hQnQ6C1AoM1t59onl6S4efUmOLKei_96fc05WvbfkhXL-Q-ohIfyMkQNX0BBhz9N_GgMuAA8Sr31CIakgJSpoEZnXZtUVlwMkQOtHogaTk_D7Yuv43yAdGEZXRy7eBw", "payload": "" } 2023-11-23 10:08:09,424:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066738016 HTTP/1.1" 200 810 2023-11-23 10:08:09,424:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:08:08 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnU3gk_gNoG5fBNDjuqBhGmZqVh5MJxEmb1th7JRIil2M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:08Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066738016/ypE5ag", "token": "6TDiXsqmeP1Jr6MAv3ggvn4O3hX5INT6PvOa_y3w6tM" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066738016/HUvErQ", "token": "6TDiXsqmeP1Jr6MAv3ggvn4O3hX5INT6PvOa_y3w6tM" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066738016/nzokTQ", "token": "6TDiXsqmeP1Jr6MAv3ggvn4O3hX5INT6PvOa_y3w6tM" } ] } 2023-11-23 10:08:09,424:DEBUG:acme.client:Storing nonce: jXyutbsnU3gk_gNoG5fBNDjuqBhGmZqVh5MJxEmb1th7JRIil2M 2023-11-23 10:08:09,425:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-23 10:08:09,425:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2023-11-23 10:08:09,426:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-23 10:08:09,426:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-23 10:08:09,427:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 10:08:09,427:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-23 10:08:09,427:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-23 10:08:09,427:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-23 10:08:09,428:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 10:08:09,474:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-23 10:08:09,706:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-23 10:08:09,707:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2023-11-23 10:08:09,707:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2023-11-23 10:08:09,711:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:22 UTC. 2023-11-23 10:08:09,711:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 10:08:09,711:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-23 10:08:09,716:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-23 10:08:09,716:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-23 10:08:09,716:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-23 10:08:09,721:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-23 10:08:09,722:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-23 10:08:09,724:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-23 10:08:10,180:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-23 10:08:10,181:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:08:09 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "NUT7eAr1Pw8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-23 10:08:10,182:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-23 10:08:13,819:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7008_key-certbot.pem 2023-11-23 10:08:17,289:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7006_csr-certbot.pem 2023-11-23 10:08:17,289:DEBUG:acme.client:Requesting fresh nonce 2023-11-23 10:08:17,290:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-23 10:08:17,442:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-23 10:08:17,443:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:08:16 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiw4GfLduRQvxeIVZC-Zw17Mu7ScYPDKhYF5EGpmHjN7U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-23 10:08:17,443:DEBUG:acme.client:Storing nonce: v0bMowfiw4GfLduRQvxeIVZC-Zw17Mu7ScYPDKhYF5EGpmHjN7U 2023-11-23 10:08:17,443:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2023-11-23 10:08:17,449:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93Zml3NEdmTGR1UlF2eGVJVlpDLVp3MTdNdTdTY1lQREtoWUY1RUdwbUhqTjdVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ZplIfDZSmsQmxYuk4tUZf62H0w2DGswqMZ53sBgns2-AooZHuJ_jvbviwRMPuHkUis98BrhpMwvQOhsNmSA5lXCQjEDFMtdHJxI-JUtxYdkowDyF_Nwx-8GQAjDsE7vbUBH7QvluKb03SXZjAb8u6yrYB-ur2LFZvNpT1_BrsBpj0vE1kzxJ7i0Rpm0j4geEbeNetIdBIcDxr443-11MzMVAuzSzNVkS-JybdA87AEOhKmMYw47hzCl39s04hDfQBvcDq_6bKnzlI3P1WxzL5B4ncOf0oy0hsb_mkm6W3ao51UW5tTezAJgN_5QftmaV0BduOe7FCAWraujL-NhZPg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-23 10:08:17,739:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2023-11-23 10:08:17,739:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 23 Nov 2023 09:08:16 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796190496 Replay-Nonce: v0bMowfiYzZcsRkwZ_LaTD7kPAtXVEr5kKkIMypGsswASxYMdDc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:17Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066771416" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796190496" } 2023-11-23 10:08:17,740:DEBUG:acme.client:Storing nonce: v0bMowfiYzZcsRkwZ_LaTD7kPAtXVEr5kKkIMypGsswASxYMdDc 2023-11-23 10:08:17,740:DEBUG:acme.client:JWS payload: b'' 2023-11-23 10:08:17,745:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066771416: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlZelpjc1Jrd1pfTGFURDdrUEF0WFZFcjVrS2tJTXlwR3Nzd0FTeFlNZERjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY3NzE0MTYifQ", "signature": "usR5D5QgNlNb6LBEH8GyUGlGFZpxfi2RdBBSTPd9YgU9piwN-X2GkkrsPHG1VqEVnvzesLmSZhB0-tt5nS9pGI80tlFPFiZgXKOZsnR61TyS9pN1kJyDu7hXT5wUsiIMCQ9HsaFplcN1CQhiZCpiY7PfESToOUAOAtKdEHmH8V4D_scSNmKVAQWZAS5Mp_PUQfzJ706ZQJgak_BscysJpfMpFcTc2zajPeYO2q8Wsv_HE51AuWdruZRKQPpgXZxNglwdaV4tc_AbZAhLPvTvzaFjiZoU7zVzSfKQuojdNRkuzEgViUiIlg1WL7ZESgt5DKmGwVV_9llxt5XNO26zvQ", "payload": "" } 2023-11-23 10:08:17,909:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066771416 HTTP/1.1" 200 809 2023-11-23 10:08:17,910:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:08:17 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfibw1Z6crcwBfyElibiyh36jtjND-rCr_GrgxuqD1Ih98 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:17Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066771416/1qhCuQ", "token": "cVVMxW9zwT-iEFrTBcAWPKCXYKiDFVXWvmhWDvf--Y4" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066771416/isn6Gw", "token": "cVVMxW9zwT-iEFrTBcAWPKCXYKiDFVXWvmhWDvf--Y4" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066771416/lLjJ0A", "token": "cVVMxW9zwT-iEFrTBcAWPKCXYKiDFVXWvmhWDvf--Y4" } ] } 2023-11-23 10:08:17,910:DEBUG:acme.client:Storing nonce: v0bMowfibw1Z6crcwBfyElibiyh36jtjND-rCr_GrgxuqD1Ih98 2023-11-23 10:08:17,910:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-23 10:08:17,911:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2023-11-23 10:08:17,911:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-23 10:08:17,912:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-23 10:08:17,913:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 10:08:17,913:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-23 10:08:17,913:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-23 10:08:17,914:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-23 10:08:17,915:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 10:08:17,953:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-23 10:08:18,371:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-23 10:08:18,372:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2023-11-23 10:08:18,373:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2023-11-23 10:08:18,377:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:34 UTC. 2023-11-23 10:08:18,377:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 10:08:18,378:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-23 10:08:18,384:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-23 10:08:18,384:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-23 10:08:18,384:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-23 10:08:18,388:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-23 10:08:18,389:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-23 10:08:18,391:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-23 10:08:18,839:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-23 10:08:18,840:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:08:17 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "55x8G9phquo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-23 10:08:18,840:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-23 10:08:22,582:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7009_key-certbot.pem 2023-11-23 10:08:26,058:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7007_csr-certbot.pem 2023-11-23 10:08:26,058:DEBUG:acme.client:Requesting fresh nonce 2023-11-23 10:08:26,058:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-23 10:08:26,208:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-23 10:08:26,209:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:08:25 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8_Qt7lWhd7YZX3XTlWaqdhK0fCn5Tqk1XC2HH868JrnM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-23 10:08:26,209:DEBUG:acme.client:Storing nonce: nbWKegf8_Qt7lWhd7YZX3XTlWaqdhK0fCn5Tqk1XC2HH868JrnM 2023-11-23 10:08:26,209:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2023-11-23 10:08:26,215:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhfUXQ3bFdoZDdZWlgzWFRsV2FxZGhLMGZDbjVUcWsxWEMySEg4NjhKcm5NIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "JWM_JgKwIyoSLlpNIbbRzswComlR0wjNnjQx_iK_vToXuxDrKvvsi1F6Fzz0mbeYX1FS9ofV_2k-c79QMqwo_x6UblNvL3Pdz_JQs1xIGLBH45g0jGswxV-bsvKFuxjcdJT_Azo6n-eG5zZmF1TpHu87FfttRzJIO0SHjUBhDVWjMlV2DttEKk4NWFkPw4M9RXqjee7tpfsW0USNdaGKCgh9bzHC-_Fd1UcgO3FJgmRshjQoshmFKXp6coBxHLBv1S0VTmO8Cr_iXzOmnD8y5z-Xq3FSj3UVFtb4Q-jD_3REBL76T4VNgaVD4GmgeX7H85lL0BUZXe4fPsVVZV5d7Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-23 10:08:26,388:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-23 10:08:26,389:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 23 Nov 2023 09:08:25 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796210686 Replay-Nonce: nbWKegf8psSzfUKmyIT2X1euPaGmOsg9jHyYUENX9cY3UUYyiQk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:25Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066800166" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796210686" } 2023-11-23 10:08:26,389:DEBUG:acme.client:Storing nonce: nbWKegf8psSzfUKmyIT2X1euPaGmOsg9jHyYUENX9cY3UUYyiQk 2023-11-23 10:08:26,389:DEBUG:acme.client:JWS payload: b'' 2023-11-23 10:08:26,394:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066800166: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhwc1N6ZlVLbXlJVDJYMWV1UGFHbU9zZzlqSHlZVUVOWDljWTNVVVl5aVFrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY4MDAxNjYifQ", "signature": "YOaHXCUFLRtcgwKQgeDAiL4uOXafhkuVEGpMTn_YKKHJ6fatPYIkysjWv93m0bTfLYLL2caViIj5Ov1fJrHBBsgObSCPyNUZPs5o67OIVCb9z6UAzrjoSIby9oRRgZ-NihiYd_0OaQfwL4Ts7xTMZMd-tfWlZT-4R2itr78a2Qgi_uetCt13DLoz9XQ2DLOXoMuxqD1UiQANkvMpRLs-RpAlEY7Mw0qqfpbEnr6bb3-o6iEpPIqEyt9ecFos8QJMtk6zN0ErEvuSSBGwi1Zls6Gyz24CQOmtQ11Qg8SotqeQ6rZv4E2BCPTo44evqbmKknaaB2Z_wxwmLyJWMNAVDg", "payload": "" } 2023-11-23 10:08:26,546:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066800166 HTTP/1.1" 200 805 2023-11-23 10:08:26,547:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:08:25 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfirvkALag3iBVaEb3PHx1q9K8DGnJXkfdJMMmkO7AvNkM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:25Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066800166/zXEJ0Q", "token": "chax4aVJRBAwxdLyEKOihE2bmz-XL8HJpzNL8ytpyn8" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066800166/b777tA", "token": "chax4aVJRBAwxdLyEKOihE2bmz-XL8HJpzNL8ytpyn8" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066800166/Gd6Xnw", "token": "chax4aVJRBAwxdLyEKOihE2bmz-XL8HJpzNL8ytpyn8" } ] } 2023-11-23 10:08:26,547:DEBUG:acme.client:Storing nonce: v0bMowfirvkALag3iBVaEb3PHx1q9K8DGnJXkfdJMMmkO7AvNkM 2023-11-23 10:08:26,548:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-23 10:08:26,549:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2023-11-23 10:08:26,549:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-23 10:08:26,550:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-23 10:08:26,550:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 10:08:26,551:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-23 10:08:26,551:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-23 10:08:26,551:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-23 10:08:26,553:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 10:08:26,602:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-23 10:08:27,010:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-23 10:08:27,011:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-23 10:08:27,012:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-23 10:08:27,018:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:48 UTC. 2023-11-23 10:08:27,018:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 10:08:27,019:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-23 10:08:27,023:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-23 10:08:27,024:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-23 10:08:27,024:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-23 10:08:27,028:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-23 10:08:27,029:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-23 10:08:27,031:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-23 10:08:27,562:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-23 10:08:27,563:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:08:26 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "CmR91OkA0UY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-23 10:08:27,563:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-23 10:08:31,178:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7010_key-certbot.pem 2023-11-23 10:08:34,648:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7008_csr-certbot.pem 2023-11-23 10:08:34,648:DEBUG:acme.client:Requesting fresh nonce 2023-11-23 10:08:34,648:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-23 10:08:34,826:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-23 10:08:34,827:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:08:33 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnlMva-o3rFobc5Dxqnjf0nlG4qCqySBwJeImlDFifG90 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-23 10:08:34,827:DEBUG:acme.client:Storing nonce: jXyutbsnlMva-o3rFobc5Dxqnjf0nlG4qCqySBwJeImlDFifG90 2023-11-23 10:08:34,827:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2023-11-23 10:08:34,834:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25sTXZhLW8zckZvYmM1RHhxbmpmMG5sRzRxQ3F5U0J3SmVJbWxERmlmRzkwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "oKOlTZtAgouV4R6ebYSvYYMnqUDaGzysDnDZB-gYUI7q9X_HTlgnqTY2CiUv5Pgd2gN03XSNCvxupzeh9-ExM8DxDqfBatsfwoInpQOPrDWyJcBaE8tAy4ahAKvVcqGLlZmE1fvzy4imVTa1hf584s93USzaEWp6NfCxYvcUoMzSJZYZcrpyf-aNj8j3b4x66waA6txp6jwkZcjoOTklDQN3wsgpZUf-sPQ07uHWtYkIVSoqDpMwCotvc7AeTKG_1-MGOwNWl_g10JaRPbTYW6RgUr_k-AMztubW8TFB3XDQiD6aYNLNRnDYwu7EB-g4zX0ugn7WVqrM1ImD0FnIlw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-23 10:08:35,031:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-23 10:08:35,032:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 23 Nov 2023 09:08:34 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796230126 Replay-Nonce: jXyutbsn5b49M1tKTHedmw6jSH0LPjqdsYy3QxgbI92Y-P8hLqg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:34Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066828686" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796230126" } 2023-11-23 10:08:35,032:DEBUG:acme.client:Storing nonce: jXyutbsn5b49M1tKTHedmw6jSH0LPjqdsYy3QxgbI92Y-P8hLqg 2023-11-23 10:08:35,032:DEBUG:acme.client:JWS payload: b'' 2023-11-23 10:08:35,037:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066828686: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic241YjQ5TTF0S1RIZWRtdzZqU0gwTFBqcWRzWXkzUXhnYkk5MlktUDhoTHFnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY4Mjg2ODYifQ", "signature": "P5NnbmGsThvxRa5TtOV1rRx8cmV-WPiv5zca27Ua8bDO5L2W-DOBrBm_tMAfcDOM35mfw5gq7SudHwlkwQj7t6KXZG9PLSYTrPP8M1zL9wWcciTlm470bW21aegvk-NuD0wvXP2si_6f2euky29AgHlr6iUz9PXynj798OPZH7WeLTLW8s1rKbwPlfZeLz3ToKFua4jEhhXo-PUBXOh3PP_mucHNuq6UTUsREns8orQ2Gq8FWZ6Qm789bYHhY7v573fGKnLQoE2_91Vnm5v3yrItwnuWXv-7MiTU5BnwoSJ3XThrP7NH4RdhOpKxAhfTj-suYtFcBTIEhP4RIQlqpw", "payload": "" } 2023-11-23 10:08:35,220:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066828686 HTTP/1.1" 200 805 2023-11-23 10:08:35,220:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:08:34 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnjCbsNgldq046Xx4B9xtH80mEL3p2-6Uu3dXY5r4AFKs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:34Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066828686/TFIwLw", "token": "kAlE0kR-pqo9F_UYGQCvSB7TRTjOLQiZBJq_dZ7iFHs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066828686/se4r1w", "token": "kAlE0kR-pqo9F_UYGQCvSB7TRTjOLQiZBJq_dZ7iFHs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066828686/Hc2_wQ", "token": "kAlE0kR-pqo9F_UYGQCvSB7TRTjOLQiZBJq_dZ7iFHs" } ] } 2023-11-23 10:08:35,221:DEBUG:acme.client:Storing nonce: jXyutbsnjCbsNgldq046Xx4B9xtH80mEL3p2-6Uu3dXY5r4AFKs 2023-11-23 10:08:35,221:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-23 10:08:35,221:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2023-11-23 10:08:35,222:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-23 10:08:35,222:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-23 10:08:35,223:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 10:08:35,223:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-23 10:08:35,223:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-23 10:08:35,224:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-23 10:08:35,225:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 10:08:35,271:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-23 10:08:35,511:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-23 10:08:35,513:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-23 10:08:35,513:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-23 10:08:35,517:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:31:01 UTC. 2023-11-23 10:08:35,518:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-23 10:08:35,518:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-23 10:08:35,522:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-23 10:08:35,523:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-23 10:08:35,523:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-23 10:08:35,527:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-23 10:08:35,528:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-23 10:08:35,530:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-23 10:08:35,978:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-23 10:08:35,978:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:08:35 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "rMKKsHzC-RY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-23 10:08:35,978:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-23 10:08:39,870:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\7011_key-certbot.pem 2023-11-23 10:08:43,411:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\7009_csr-certbot.pem 2023-11-23 10:08:43,412:DEBUG:acme.client:Requesting fresh nonce 2023-11-23 10:08:43,412:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-23 10:08:43,561:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-23 10:08:43,562:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:08:42 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiJy_wszqv1v09E56eOk6onqpJul_XplE6by2q9Dd2MJo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-23 10:08:43,562:DEBUG:acme.client:Storing nonce: v0bMowfiJy_wszqv1v09E56eOk6onqpJul_XplE6by2q9Dd2MJo 2023-11-23 10:08:43,562:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2023-11-23 10:08:43,568:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlKeV93c3pxdjF2MDlFNTZlT2s2b25xcEp1bF9YcGxFNmJ5MnE5RGQyTUpvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "fJCWYYUOsSSVTXjdwu_rhp_Ta9ysW7NWjRbKwr5X9LrYstdyqo0YfBAN44yAOE6g6Pig6HkQkhKcd8kqNWhcnSEyG11qjDjLEBqJdyEuoTItIBqfRCpX_JCmlB_-Rcf270hz9YHFaPI4nMDAcF4swcel8TJ1fgYRsHIOFJ8paZNsKSd_IQjzEflCDt7Fh3byVM2wmsaz3463vQIaP76r1VJPVS8NBLJFx8aAuLz0F0g5BREaQQXYwBWL9rZZK-G4UNf_5Caa3c3emTM3BaSkvnApuQVdcM3_sa9SnTSdWTwCANqsJ1jPTuJnR-Wo02kZibYuS-SWvbY6mKQ0qwlTdg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-23 10:08:43,810:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-23 10:08:43,811:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Thu, 23 Nov 2023 09:08:42 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796249816 Replay-Nonce: v0bMowfiW_7RAot-DN0Bfc7i8pJwA4qnVHb3HfVIp5TW8DwHJgY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:42Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066858576" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796249816" } 2023-11-23 10:08:43,811:DEBUG:acme.client:Storing nonce: v0bMowfiW_7RAot-DN0Bfc7i8pJwA4qnVHb3HfVIp5TW8DwHJgY 2023-11-23 10:08:43,812:DEBUG:acme.client:JWS payload: b'' 2023-11-23 10:08:43,817:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066858576: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlXXzdSQW90LUROMEJmYzdpOHBKd0E0cW5WSGIzSGZWSXA1VFc4RHdISmdZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY4NTg1NzYifQ", "signature": "ScrapTtr8f9xa51qMrgCt2yuCmqUMCxped_Irsxfsgp_kdQh6-PJfWXbZjUKKmCpPDlr5LgdPlMVnZklTEtZgkPVdsQWdqxwVGwS4tRw6odr2ool_Qce4IOEp1M6AZCZH7rKjtX7k3EHq6YRVNvKONE7UNlx7Nec44sFOuIQSINTGNjA2aNd9h6stwe7H1pz_29-okHXWcvoxIpWGFYatCIewlue2qGSA_mnEq8btn5YwR-7PqWQncbcCkqYazdWeQoHHgl06JdA_CkTY4vdWoPLn1zkcJOZ-WehqJYg6LSDSkJvqPE3uLyrC31WqthyZi5mLHfXjcknaWmzLSv7UA", "payload": "" } 2023-11-23 10:08:43,975:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066858576 HTTP/1.1" 200 805 2023-11-23 10:08:43,975:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Thu, 23 Nov 2023 09:08:43 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiGY_fGVTR3TFnD4OSX_3wsxGOMYdqaJi_Wi54wTsYB3s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:42Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066858576/p5HniQ", "token": "vgTEYICaF9gMErZyGxBr6V0KD9ZEoeesWVIQ8h9Ks48" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066858576/JwX8uw", "token": "vgTEYICaF9gMErZyGxBr6V0KD9ZEoeesWVIQ8h9Ks48" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066858576/_ogaVA", "token": "vgTEYICaF9gMErZyGxBr6V0KD9ZEoeesWVIQ8h9Ks48" } ] } 2023-11-23 10:08:43,975:DEBUG:acme.client:Storing nonce: v0bMowfiGY_fGVTR3TFnD4OSX_3wsxGOMYdqaJi_Wi54wTsYB3s 2023-11-23 10:08:43,975:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-23 10:08:43,975:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2023-11-23 10:08:43,976:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-23 10:08:43,976:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-23 10:08:43,977:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 10:08:43,977:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-23 10:08:43,977:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-23 10:08:43,977:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-23 10:08:43,978:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-23 10:08:43,978:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2023-11-23 10:08:43,979:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2023-11-23 10:08:44,004:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2023-11-23 10:08:44,006:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)