2023-11-22 20:06:47,979:DEBUG:certbot._internal.main:certbot version: 1.6.0 2023-11-22 20:06:47,980:DEBUG:certbot._internal.main:Arguments: [] 2023-11-22 20:06:47,980:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2023-11-22 20:06:48,882:DEBUG:certbot._internal.log:Root logging level set at 20 2023-11-22 20:06:48,882:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2023-11-22 20:06:48,919:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2023-11-22 20:06:48,959:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-22 20:06:49,393:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-22 20:06:49,395:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is signed by the certificate's issuer. 2023-11-22 20:06:49,399:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is: OCSPCertStatus.GOOD 2023-11-22 20:06:49,406:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:23 UTC. 2023-11-22 20:06:49,406:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-22 20:06:49,407:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-22 20:06:49,411:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-22 20:06:49,411:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-22 20:06:49,412:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-22 20:06:49,418:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-22 20:06:49,419:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-22 20:06:49,421:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-22 20:06:49,961:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-22 20:06:49,961:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:06:49 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "VeMncIOx8iI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-22 20:06:49,962:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-22 20:06:54,618:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6986_key-certbot.pem 2023-11-22 20:06:59,021:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6984_csr-certbot.pem 2023-11-22 20:06:59,022:DEBUG:acme.client:Requesting fresh nonce 2023-11-22 20:06:59,022:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-22 20:06:59,197:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-22 20:06:59,198:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:06:58 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnP-zWSwS_zsU4eMDheaREgVC3aFOTr0gkRRpKa6X2zGk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-22 20:06:59,198:DEBUG:acme.client:Storing nonce: jXyutbsnP-zWSwS_zsU4eMDheaREgVC3aFOTr0gkRRpKa6X2zGk 2023-11-22 20:06:59,199:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2023-11-22 20:06:59,204:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25QLXpXU3dTX3pzVTRlTURoZWFSRWdWQzNhRk9UcjBna1JScEthNlgyekdrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "mtCcu1UnZkoEyyu5O8dJe671LaCSmbYV2XnTglMBt67gPNx7R-ICaq3SAXhtNPp3-nHiFKf-bdv-q84nKjgM2zwK7ps0AWS240QLQ0zPN_k1dQy-Ybflu5EOX4ltU3vUsMseyqHsrbXn5MtKZ-Gef1fdsaPcjxeYCGVegrdVa0oIxMelbWDYWY7JYtjfnxqkT9NP8KgNrL0Gzo-L_raiS8N92Bvv5gw7Mpxsg2kvYiVip1KsFifLMRWMZWNxJagEgqbl8jKoD-uz2Lfu0PRKkevkn0PqUBz7nKQa1cMiA1jEPdIW4ckdvRKVf6e1CQLl_st0HpwPSjNGmohJlXYLxA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-22 20:06:59,402:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2023-11-22 20:06:59,403:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 22 Nov 2023 19:06:59 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223795980256 Replay-Nonce: jXyutbsn2eamzfog_bo0Xmg-HMS-UQ9-ttQ3T7nFjOYIpskMMAM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:00Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066491486" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223795980256" } 2023-11-22 20:06:59,403:DEBUG:acme.client:Storing nonce: jXyutbsn2eamzfog_bo0Xmg-HMS-UQ9-ttQ3T7nFjOYIpskMMAM 2023-11-22 20:06:59,403:DEBUG:acme.client:JWS payload: b'' 2023-11-22 20:06:59,409:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066491486: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic24yZWFtemZvZ19ibzBYbWctSE1TLVVROS10dFEzVDduRmpPWUlwc2tNTUFNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY0OTE0ODYifQ", "signature": "ol-Dz-0iwdu8imsqjTeyV2JNuYrpT9pp1lSVT8WJTIEXnymqBrsdGBJZ0Y_X9bndPhkU1LCSvDjYZd8R3WnqvLrcnQaoqt44oFFq7gJmIW3DR6yuBeacxOtHLgV1cDRp-MMyhQAVoUk1EgVTmNUyZUldlu9AKbx_UaR3TDNNQeKVQaN3OExuXL7sY4uzEtYaVl5B2Kzun3ndUonkKc_UY-AQ933qBck7WVRWnFjNZWDA43SbMVwylJlw8VH0v_GxgxR-Ymd9hbDZE42szr5Mu_y_6lLj3O0PMUfn_3EkgkLFKUoRdnoLQGxCOkyxUwlY8joT8hMnmfPX3TA-2VaapA", "payload": "" } 2023-11-22 20:06:59,588:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066491486 HTTP/1.1" 200 810 2023-11-22 20:06:59,588:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:06:59 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnHy1UpTzeqVZHNp4QN7G58o0dvxC6iXmnWUJdRXcAesA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:00Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066491486/iZpoTw", "token": "sb15n-zcYGZjmBEw4udDUXuX-BTwRrUMF--2J3EM_48" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066491486/hLn7qQ", "token": "sb15n-zcYGZjmBEw4udDUXuX-BTwRrUMF--2J3EM_48" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066491486/g8UZBg", "token": "sb15n-zcYGZjmBEw4udDUXuX-BTwRrUMF--2J3EM_48" } ] } 2023-11-22 20:06:59,589:DEBUG:acme.client:Storing nonce: jXyutbsnHy1UpTzeqVZHNp4QN7G58o0dvxC6iXmnWUJdRXcAesA 2023-11-22 20:06:59,589:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-22 20:06:59,589:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2023-11-22 20:06:59,589:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-22 20:06:59,589:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-22 20:06:59,604:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-22 20:06:59,604:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-22 20:06:59,604:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-22 20:06:59,605:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-22 20:06:59,610:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-22 20:06:59,647:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-22 20:07:00,062:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-22 20:07:00,063:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-22 20:07:00,064:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-22 20:07:00,068:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:36 UTC. 2023-11-22 20:07:00,068:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-22 20:07:00,069:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-22 20:07:00,075:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-22 20:07:00,075:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-22 20:07:00,075:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-22 20:07:00,080:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-22 20:07:00,080:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-22 20:07:00,082:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-22 20:07:00,516:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-22 20:07:00,516:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:07:00 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Cshv8g8dw5I": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-22 20:07:00,517:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-22 20:07:04,804:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6987_key-certbot.pem 2023-11-22 20:07:08,966:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6985_csr-certbot.pem 2023-11-22 20:07:08,967:DEBUG:acme.client:Requesting fresh nonce 2023-11-22 20:07:08,967:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-22 20:07:09,111:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-22 20:07:09,112:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:07:08 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfibuYa7_JmmBOLYKUrV4VZNud7zPrhU2gg9t2htuYtVfg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-22 20:07:09,112:DEBUG:acme.client:Storing nonce: v0bMowfibuYa7_JmmBOLYKUrV4VZNud7zPrhU2gg9t2htuYtVfg 2023-11-22 20:07:09,112:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2023-11-22 20:07:09,118:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlidVlhN19KbW1CT0xZS1VyVjRWWk51ZDd6UHJoVTJnZzl0Mmh0dVl0VmZnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "XHMP-9TUKnvZ7Bs8dYSo-zc390pnppUiYCWowNDMXuUOZiFIB7Th0k68dN5bdgx4116jZPVT2M1nF0tlZdZ67afAj62mNI9Ox9qgy0Ig6eqNjqkkl3LGfzwXtAFPA0SmP4tXWCILI4adTVCFsKT-nHPv3yj_l2O6Kg6YnD61GA28M738pmqDolnjtxrAdYXMdNcjMJCn2k671LDkNhwD0tbJPUnuk_ttOIj4kv-wr8oKs-LLZzZ9z4ASmdgSyiklI2_spattXr5LabmOI7kQOH6mouULGLgC2lHXwAsF48s2VkvKvXUI0TosWTMNeRwAm7jjGxN9izRJ6m-izwVKRQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-22 20:07:09,295:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2023-11-22 20:07:09,296:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 22 Nov 2023 19:07:08 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796010606 Replay-Nonce: v0bMowfie9vao_U6Eeb9c6Xij6qzgM5LuJf6ZpuPJWkh2TJolaU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:09Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066531206" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796010606" } 2023-11-22 20:07:09,296:DEBUG:acme.client:Storing nonce: v0bMowfie9vao_U6Eeb9c6Xij6qzgM5LuJf6ZpuPJWkh2TJolaU 2023-11-22 20:07:09,296:DEBUG:acme.client:JWS payload: b'' 2023-11-22 20:07:09,302:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066531206: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmllOXZhb19VNkVlYjljNlhpajZxemdNNUx1SmY2WnB1UEpXa2gyVEpvbGFVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY1MzEyMDYifQ", "signature": "q1UB0gpn0AZ_mbotDNYtekR4XLCSq5zNkVmx2Dxyn_7JNZSL_sQnZvyaGnSMHwROaQhrA8gZIeC-9bIC5EEZ5wEz-rfX0UNi3UTNVazkj6yJMHpIbEAs_7M6AfJ2SATwgewWTdmjQEo9fb6lax6hVvRvADVPnLrjw3Y7gdt974X9k_ky40DDLCKasJsfdZzAHyBtMQuhfDMa_ohQlaAKmLg07yydtVySwbHSXp08IvCTveFTDUDPWrS5NBRCbZGewZ_ZjDSayqDFHEvZcRGAki52iOammt-DT3ujk0HZI0dfqp4Ng8miLOpsKr6LFyjUc_nQAVEkUoZpAzM0zc-x5A", "payload": "" } 2023-11-22 20:07:09,461:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066531206 HTTP/1.1" 200 804 2023-11-22 20:07:09,462:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:07:09 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8O7t-EbkhRRlkWd3-4tt-auBpHbE3lLU1baW63Ux7JnY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:09Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066531206/HwkKGg", "token": "XnSnBmyZRInRNHNise1p6HXmMUAmTdgzqO5hi25GzvI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066531206/RFhChg", "token": "XnSnBmyZRInRNHNise1p6HXmMUAmTdgzqO5hi25GzvI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066531206/Q06UlA", "token": "XnSnBmyZRInRNHNise1p6HXmMUAmTdgzqO5hi25GzvI" } ] } 2023-11-22 20:07:09,462:DEBUG:acme.client:Storing nonce: nbWKegf8O7t-EbkhRRlkWd3-4tt-auBpHbE3lLU1baW63Ux7JnY 2023-11-22 20:07:09,462:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-22 20:07:09,463:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2023-11-22 20:07:09,463:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-22 20:07:09,464:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-22 20:07:09,464:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-22 20:07:09,465:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-22 20:07:09,465:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-22 20:07:09,465:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-22 20:07:09,466:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-22 20:07:09,506:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-22 20:07:09,960:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-22 20:07:09,961:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-22 20:07:09,962:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-22 20:07:09,966:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:49 UTC. 2023-11-22 20:07:09,966:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-22 20:07:09,967:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-22 20:07:09,971:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-22 20:07:09,971:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-22 20:07:09,972:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-22 20:07:09,987:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-22 20:07:09,988:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-22 20:07:09,990:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-22 20:07:10,493:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-22 20:07:10,493:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:07:10 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "FONkvRrZUw8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-22 20:07:10,494:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-22 20:07:14,586:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6988_key-certbot.pem 2023-11-22 20:07:18,636:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6986_csr-certbot.pem 2023-11-22 20:07:18,636:DEBUG:acme.client:Requesting fresh nonce 2023-11-22 20:07:18,637:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-22 20:07:18,804:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-22 20:07:18,805:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:07:18 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQj9ZqSEj5XIOUKEiN6p73EAG71JLWvTd5YG8pmmCMJctk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-22 20:07:18,805:DEBUG:acme.client:Storing nonce: SFMYLIQj9ZqSEj5XIOUKEiN6p73EAG71JLWvTd5YG8pmmCMJctk 2023-11-22 20:07:18,805:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2023-11-22 20:07:18,811:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWo5WnFTRWo1WElPVUtFaU42cDczRUFHNzFKTFd2VGQ1WUc4cG1tQ01KY3RrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ewtziXW5Gm3UWLDTPiLLH2k5DKLdtP-oMocm1Kouxcxyv-Gv6Sq25hCnzmDTAAy7of0OhJhI8F7nme83WWaQVN1GjOaDVEWMBkuW0XKOCRLxJBdB0gfV9qSJIudwroKW4bd-eyKTJWrNA-z0BUsBv2KqUmY7K-piyb_oExHAxOmxm3RCNbssJtjIPUvjiU0sERUu3C7OuNT7AmkpxCUSsE7UDih9Yd8cJmGzkVyl3O0Rioz0_x2HnxHKP2La7l5SWX3kyYX7vJwCzWsUQ3q7MG0cE889fALwcP5qW57RqrnL03k-NqFc8TVyhVgRwl7XIi4mbH7DeUhJAAU_x2WTjw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-22 20:07:19,001:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2023-11-22 20:07:19,002:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 22 Nov 2023 19:07:18 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796034066 Replay-Nonce: SFMYLIQjeGFGmYtWE7b1HITffXGAp7RYUzYcOJWRKC7lUQ-UO1U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:17Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066566356" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796034066" } 2023-11-22 20:07:19,002:DEBUG:acme.client:Storing nonce: SFMYLIQjeGFGmYtWE7b1HITffXGAp7RYUzYcOJWRKC7lUQ-UO1U 2023-11-22 20:07:19,002:DEBUG:acme.client:JWS payload: b'' 2023-11-22 20:07:19,008:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066566356: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWplR0ZHbVl0V0U3YjFISVRmZlhHQXA3UllVelljT0pXUktDN2xVUS1VTzFVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY1NjYzNTYifQ", "signature": "B5hNbJ7HpOyyNMYFdXYLAJH5Ig6bxeNg_ZoPR521K-8N9_wdJjAWn_AaaJJK_SWcKNy5NmUEJja8WFUUfvfs8YyC48q63xLqPB1vL-wBQQjHLjgTwJqGFlVJ0JoMdK9NaLUFuQP8nta5IO-FUd-2q09J5yhBIr2g7aSJ_q45HPpC3ImypnaR7JhmiUevL24iIJRiZSbN1WOySSEwmPIXkrqVW6r5ePvs5xjgHPiMpBKhDUUxRx6lBxxkyiljvt2rSA72Ybz9JTKnpx8knehpbUwsevXaCKyIcY4MxE9acr8iaziHn3BVE-cQJn3iJXXi98i-ZXjCXz7SHor8C6bmMA", "payload": "" } 2023-11-22 20:07:19,181:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066566356 HTTP/1.1" 200 807 2023-11-22 20:07:19,182:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:07:18 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjfq_4SNkqpjfQ4GhJ8Y2mAWPw7nR5FheGro9UlJE5F54 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:17Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066566356/Ahrirw", "token": "4G7MK_dXMu2C2sZjEzJh8AI0cmHBR_DIlPql7MrNzK0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066566356/5ji8UA", "token": "4G7MK_dXMu2C2sZjEzJh8AI0cmHBR_DIlPql7MrNzK0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066566356/9qmJcg", "token": "4G7MK_dXMu2C2sZjEzJh8AI0cmHBR_DIlPql7MrNzK0" } ] } 2023-11-22 20:07:19,182:DEBUG:acme.client:Storing nonce: SFMYLIQjfq_4SNkqpjfQ4GhJ8Y2mAWPw7nR5FheGro9UlJE5F54 2023-11-22 20:07:19,182:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-22 20:07:19,183:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2023-11-22 20:07:19,183:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-22 20:07:19,184:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-22 20:07:19,184:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-22 20:07:19,185:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-22 20:07:19,185:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-22 20:07:19,185:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-22 20:07:19,186:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-22 20:07:19,242:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-22 20:07:19,279:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-22 20:07:19,280:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-22 20:07:19,281:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-22 20:07:19,285:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:02 UTC. 2023-11-22 20:07:19,286:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-22 20:07:19,286:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-22 20:07:19,291:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-22 20:07:19,291:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-22 20:07:19,291:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-22 20:07:19,296:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-22 20:07:19,297:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-22 20:07:19,299:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-22 20:07:19,812:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-22 20:07:19,812:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:07:19 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "N5PWbQmmQks": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-22 20:07:19,812:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-22 20:07:24,126:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6989_key-certbot.pem 2023-11-22 20:07:28,096:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6987_csr-certbot.pem 2023-11-22 20:07:28,097:DEBUG:acme.client:Requesting fresh nonce 2023-11-22 20:07:28,097:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-22 20:07:28,268:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-22 20:07:28,269:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:07:27 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjq0-Q_-y1YCVNsFzjIJ68-9Oh4Mk3oaaExWuy-P_OR_U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-22 20:07:28,269:DEBUG:acme.client:Storing nonce: SFMYLIQjq0-Q_-y1YCVNsFzjIJ68-9Oh4Mk3oaaExWuy-P_OR_U 2023-11-22 20:07:28,269:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2023-11-22 20:07:28,275:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpxMC1RXy15MVlDVk5zRnpqSUo2OC05T2g0TWszb2FhRXhXdXktUF9PUl9VIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "GUs8EHQR9OIL_-sXM4wcZgxU7Sf66ue6TXOsjuv5vJXQlQu45XTZ5t8yPADnmFpWzwXsYRQN_ZqSELJFvRME2EhBD4QD2Hiws-2JlRATKwlRnypdL_V7-DV-7PBkL2DFYi4Q3TLDdgXJNrAAgTWZWt7YmPe_hP0ey3KDIzugdPsMNVu7g4QEcLPCUZBy_MZlgn1P4kGzQ6dwobWN4ibCIctzwCQj_hA7-N_wYOtEVx3gKH64d33jNVNvZmBfkjOgH2phCTEsAoIPgwub7iIzpGNhU1B-cTg7b1lVnkya4qa6Wqbe1Nd5LpycrZla3J6hpLcCMvjq-fVC4EdBTb_uYA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-22 20:07:28,463:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2023-11-22 20:07:28,463:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 22 Nov 2023 19:07:28 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796055606 Replay-Nonce: jXyutbsnNKOUmyxFufrKIr4VESf4mzmNvMXeYsa_0PET-GKI6OQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:26Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066598576" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796055606" } 2023-11-22 20:07:28,464:DEBUG:acme.client:Storing nonce: jXyutbsnNKOUmyxFufrKIr4VESf4mzmNvMXeYsa_0PET-GKI6OQ 2023-11-22 20:07:28,464:DEBUG:acme.client:JWS payload: b'' 2023-11-22 20:07:28,472:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066598576: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25OS09VbXl4RnVmcktJcjRWRVNmNG16bU52TVhlWXNhXzBQRVQtR0tJNk9RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY1OTg1NzYifQ", "signature": "InCgJSPwZurnJUgEvn24ns2Z3_AiasS-o7GljdydrJ-d04aBOu1WkyOE-ApKtTdKV1jPiJ9xWFf4qs6OwLMmFggoXA0di-V79d5OWgfKkIOHg3pSw3XaiqF8AV8xapvD9a4INS-RFIgA5jHTeYzQlAp1eJJEd7cDwD_rgB9vlotpZvFtIkALZTzwfWTy-vQF8EZAsgYoYogHM6z_FXD0TCRVsH9U6zs96n3JzOTs8GVehEtbQIUiHcgggUTJ0cj0iXltsEieAXsC3ntZ0IAd8G5J5LWIiVZIIemCiGZZuApzuhLq8S1EeI23nc_2XhMLzfchAn8TzzP2iVU4C1KUzQ", "payload": "" } 2023-11-22 20:07:28,645:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066598576 HTTP/1.1" 200 801 2023-11-22 20:07:28,646:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:07:28 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnEu6hInlrgOX3HIgVK3-JkJbVhIVfPRrikggRkE_UJtc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:26Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066598576/f3URKA", "token": "J6ZL0EQU-jtK9avoLKda1DkzwcegKRZen1GsEEp4cxs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066598576/iDceBQ", "token": "J6ZL0EQU-jtK9avoLKda1DkzwcegKRZen1GsEEp4cxs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066598576/LT38xQ", "token": "J6ZL0EQU-jtK9avoLKda1DkzwcegKRZen1GsEEp4cxs" } ] } 2023-11-22 20:07:28,646:DEBUG:acme.client:Storing nonce: jXyutbsnEu6hInlrgOX3HIgVK3-JkJbVhIVfPRrikggRkE_UJtc 2023-11-22 20:07:28,646:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-22 20:07:28,647:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2023-11-22 20:07:28,647:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-22 20:07:28,648:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-22 20:07:28,648:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-22 20:07:28,649:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-22 20:07:28,649:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-22 20:07:28,649:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-22 20:07:28,650:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-22 20:07:28,689:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-22 20:07:29,071:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-22 20:07:29,072:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-22 20:07:29,073:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-22 20:07:29,077:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:14 UTC. 2023-11-22 20:07:29,077:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-22 20:07:29,078:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-22 20:07:29,082:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-22 20:07:29,083:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-22 20:07:29,083:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-22 20:07:29,098:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-22 20:07:29,099:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-22 20:07:29,101:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-22 20:07:29,531:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-22 20:07:29,531:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:07:29 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "sYXZ5-zlcpg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2023-11-22 20:07:29,531:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-22 20:07:33,674:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6990_key-certbot.pem 2023-11-22 20:07:37,667:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6988_csr-certbot.pem 2023-11-22 20:07:37,668:DEBUG:acme.client:Requesting fresh nonce 2023-11-22 20:07:37,668:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-22 20:07:37,814:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-22 20:07:37,815:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:07:37 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfi8pgMbQZl4fEvqedBCfzmWyvIpGF7H7kUqRoi-lAGeaA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-22 20:07:37,815:DEBUG:acme.client:Storing nonce: v0bMowfi8pgMbQZl4fEvqedBCfzmWyvIpGF7H7kUqRoi-lAGeaA 2023-11-22 20:07:37,815:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2023-11-22 20:07:37,821:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93Zmk4cGdNYlFabDRmRXZxZWRCQ2Z6bVd5dklwR0Y3SDdrVXFSb2ktbEFHZWFBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "j-Ys9aPtU8s8qoktnkUE4MCvXpFZfR8rdRJ89LalA-KuelkObcqtoJZ3XirG9OPdCHlUlAw7H40CdIVO-8bL4GUpdMqrCRR4FZqLCXWgmwKQ-pJ_XeQeyckEgCJrtnm7Y2uHYn1K2_VaA3AlwiKkq5ZU1t-DynNPnB_jQg3tzaNntzZt8ur5w1FFtggyRXuOGIDxYLT0z1qpkWcw4zyZaAgV4JSVFNtcpPugogSzuuIFpxySgWf1tAc9JgczP2TvZgHWS572rn6hbzevIk2KlYJzHI2eszBVwVxJ9W7YBkl6KdtCMXp5AhT2vly9LKx5Mk_bN3IRDqBcDV28tpLmhQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-22 20:07:37,985:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-22 20:07:37,986:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 22 Nov 2023 19:07:37 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796073426 Replay-Nonce: nbWKegf8G0QV6xpnl1IB5O-tuC46my0vr2IcGnUaQbmbDx66Ozk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:34Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066622126" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796073426" } 2023-11-22 20:07:37,986:DEBUG:acme.client:Storing nonce: nbWKegf8G0QV6xpnl1IB5O-tuC46my0vr2IcGnUaQbmbDx66Ozk 2023-11-22 20:07:37,987:DEBUG:acme.client:JWS payload: b'' 2023-11-22 20:07:37,992:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066622126: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhHMFFWNnhwbmwxSUI1Ty10dUM0Nm15MHZyMkljR25VYVFibWJEeDY2T3prIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2MjIxMjYifQ", "signature": "fulod3q2c0snOYkOxEAcHiK0fd6d3uB36pzPYirENY0LWkpNz6gjynK5nesX9kDWyS45PgaqWSOby6lorAcIyMBTQZ-rOGASoKNQMrkJqZKwRaQjOY0WG4Tqm5vUyqtbycDbH1T6sOt17_Kg2a-LP8qSwhciPL9dVrQiuc3vKd_8kyRqbK7OeqN7Ae9vVBWqWaQmeKhXFpm1YuNT2dPwDvlc3f6EHnWUAeS-yqD9YyODFQanZIiCXttONDUP8mznymCIup2osjJq901Eo6JwjTpqA0pWjlPjqLcAuSl4qexmg1sjQoEDW9bOUNSPckhPxjzpftg2QSd8Y25vETpd2Q", "payload": "" } 2023-11-22 20:07:38,140:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066622126 HTTP/1.1" 200 805 2023-11-22 20:07:38,140:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:07:37 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfi15VEsAAyYn8Z1UlTXCbljyukkZETfjjp2rm-HharWUI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:34Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066622126/zRCxuQ", "token": "gv2fmd0seZNcl7Js9O_Y9lNTlUdsETbsewgxCi8k0AI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066622126/gv15MQ", "token": "gv2fmd0seZNcl7Js9O_Y9lNTlUdsETbsewgxCi8k0AI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066622126/tryPHA", "token": "gv2fmd0seZNcl7Js9O_Y9lNTlUdsETbsewgxCi8k0AI" } ] } 2023-11-22 20:07:38,141:DEBUG:acme.client:Storing nonce: v0bMowfi15VEsAAyYn8Z1UlTXCbljyukkZETfjjp2rm-HharWUI 2023-11-22 20:07:38,141:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-22 20:07:38,142:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2023-11-22 20:07:38,142:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-22 20:07:38,142:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-22 20:07:38,143:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-22 20:07:38,143:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-22 20:07:38,143:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-22 20:07:38,144:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-22 20:07:38,145:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-22 20:07:38,182:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-22 20:07:38,583:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-22 20:07:38,584:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-22 20:07:38,585:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-22 20:07:38,589:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:27 UTC. 2023-11-22 20:07:38,590:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-22 20:07:38,590:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-22 20:07:38,596:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-22 20:07:38,596:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-22 20:07:38,596:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-22 20:07:38,611:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-22 20:07:38,612:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-22 20:07:38,614:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-22 20:07:39,092:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-22 20:07:39,093:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:07:38 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "18S440pnRMY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-22 20:07:39,093:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-22 20:07:43,284:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6991_key-certbot.pem 2023-11-22 20:07:47,359:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6989_csr-certbot.pem 2023-11-22 20:07:47,359:DEBUG:acme.client:Requesting fresh nonce 2023-11-22 20:07:47,360:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-22 20:07:47,507:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-22 20:07:47,507:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:07:47 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfi2N7U3hugLssPbwMJvo2tffT_oMRXXslyEgoYwyvk5GQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-22 20:07:47,508:DEBUG:acme.client:Storing nonce: v0bMowfi2N7U3hugLssPbwMJvo2tffT_oMRXXslyEgoYwyvk5GQ 2023-11-22 20:07:47,508:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2023-11-22 20:07:47,514:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmkyTjdVM2h1Z0xzc1Bid01Kdm8ydGZmVF9vTVJYWHNseUVnb1l3eXZrNUdRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "xX-7fCD_j1KEB3ZQSpwedcH58Kq5b7VBwPXmpasPoVtkT5shUdc5SP4qSH1ssMqjc9LIdQf0FxqXTfMET4z25sZhBlnEwJnMmcKyrp3TGByp7cnwPVPuOcfHRxNXUY1hRd5uOUcSvfQ84EXko0fWxd0Rog_ph0Iz42xjbx5DuS7B1VB-YI6kb36JXSA1yarzZRHAgIux23q7tNUcXVR5Lt3lryqIURXxTCKLARzLOWsStdcyh2IB_qUY0mzgtUfLlHI8nwgrkBUwEB0UPm8a0vUFZhCfuh890zvJwCJFl1sXod78-aH_uxeS4JCCAYd-5QOZIBB0q_QZONRptdMkew", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-22 20:07:47,746:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2023-11-22 20:07:47,747:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 22 Nov 2023 19:07:47 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796091136 Replay-Nonce: nbWKegf8yZh7VMSlmVcJv-l-RXg2gYyNCiO_6603j37YzybKZTQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:43Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066646896" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796091136" } 2023-11-22 20:07:47,747:DEBUG:acme.client:Storing nonce: nbWKegf8yZh7VMSlmVcJv-l-RXg2gYyNCiO_6603j37YzybKZTQ 2023-11-22 20:07:47,748:DEBUG:acme.client:JWS payload: b'' 2023-11-22 20:07:47,755:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066646896: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjh5Wmg3Vk1TbG1WY0p2LWwtUlhnMmdZeU5DaU9fNjYwM2ozN1l6eWJLWlRRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2NDY4OTYifQ", "signature": "U3Ka9nOMDSomc5MRhXB5x0X1zaLazxdvVn1-NlkpR6rhbNjjDRibudKMYD35lnf4oZ-jxg7Amdu0DUe-rZe5PvjO6ddrVV8fBVU778wL9dtDcIFd_J5ZQMiAhOw-Ck1Ews1XPj1xYNZiqfPcheD0RmeA9R2rTGieJeHCR6zmUJun46eCszxCsW0EE7iXxhIItXizBSzM6FREmYZWYLLngDLxVpDdvyW5kl6sqAFIZmhdRI8ZL_XbEpxvHvXdSJhcf93exjF6_CeQULS-M86OUIAuAoh0JkYLmjMAB70C2XZgnGwwFxWO6nHnHVAAsNKnTDta-_FsSmgZX79IYh10Tw", "payload": "" } 2023-11-22 20:07:47,918:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066646896 HTTP/1.1" 200 809 2023-11-22 20:07:47,919:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:07:47 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfi8t0U1RVS5aRmUpahtsfGtrMfk8hhbc52dDsORLcwj3U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:43Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066646896/juW_-A", "token": "CWWUm3uLuT3l53wpiS92M-Qv-NaCbupUBW732wE0vd8" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066646896/EWbN0Q", "token": "CWWUm3uLuT3l53wpiS92M-Qv-NaCbupUBW732wE0vd8" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066646896/0CyP5g", "token": "CWWUm3uLuT3l53wpiS92M-Qv-NaCbupUBW732wE0vd8" } ] } 2023-11-22 20:07:47,919:DEBUG:acme.client:Storing nonce: v0bMowfi8t0U1RVS5aRmUpahtsfGtrMfk8hhbc52dDsORLcwj3U 2023-11-22 20:07:47,920:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-22 20:07:47,920:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2023-11-22 20:07:47,921:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-22 20:07:47,921:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-22 20:07:47,922:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-22 20:07:47,922:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-22 20:07:47,922:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-22 20:07:47,923:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-22 20:07:47,924:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-22 20:07:47,971:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-22 20:07:48,184:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-22 20:07:48,185:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-22 20:07:48,186:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-22 20:07:48,190:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:41 UTC. 2023-11-22 20:07:48,190:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-22 20:07:48,191:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-22 20:07:48,196:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-22 20:07:48,196:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-22 20:07:48,197:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-22 20:07:48,212:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-22 20:07:48,212:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-22 20:07:48,214:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-22 20:07:48,646:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-22 20:07:48,647:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:07:48 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "wSQHtyn2kdE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2023-11-22 20:07:48,647:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-22 20:07:52,944:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6992_key-certbot.pem 2023-11-22 20:07:56,897:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6990_csr-certbot.pem 2023-11-22 20:07:56,897:DEBUG:acme.client:Requesting fresh nonce 2023-11-22 20:07:56,898:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-22 20:07:57,041:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-22 20:07:57,042:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:07:56 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiqYD5Fy3A0Xi10idXG_fPfFcRzQqp3VNL7ool9dFODrw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-22 20:07:57,042:DEBUG:acme.client:Storing nonce: v0bMowfiqYD5Fy3A0Xi10idXG_fPfFcRzQqp3VNL7ool9dFODrw 2023-11-22 20:07:57,042:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2023-11-22 20:07:57,047:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlxWUQ1RnkzQTBYaTEwaWRYR19mUGZGY1J6UXFwM1ZOTDdvb2w5ZEZPRHJ3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "WSfIRiEGqFjZMNc6NJrrnBL_GDg7N-lFnfeFgBArxiGH9R78OLAjZYrCJJzz5J9_SeI1zVfmhEQVJqTubd_P8-9XRa1LHv1jDa2DvONgsHAUgKDgWNlVkLC4RMttZBfMCIJwMgnhAH2zvK-xYnpZo-nBoxw9q7nRNWEuGUI6ZmBnjVhKZVjzvw_DifTOgQCS-o5I8mm4F8_aQQ1I6cNnvd9w9DjDjuWz-wHyeZ3YWQuNCU8bvck2WMiRuwbPRCNzPL65s-YNzo79v5KbSh4y8YSuL8q7XcII6wEuRuHBYJ7qKGNVpe133NB65aNaAjoflfESn9VDKExWc-7o7u1ggQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-22 20:07:57,227:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2023-11-22 20:07:57,227:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 22 Nov 2023 19:07:56 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796108646 Replay-Nonce: nbWKegf8D-DNqmvd4ZkA-hE3H5bJSB8VPTaspDoGP_nBarsdI_8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:24:52Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066669286" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796108646" } 2023-11-22 20:07:57,228:DEBUG:acme.client:Storing nonce: nbWKegf8D-DNqmvd4ZkA-hE3H5bJSB8VPTaspDoGP_nBarsdI_8 2023-11-22 20:07:57,228:DEBUG:acme.client:JWS payload: b'' 2023-11-22 20:07:57,233:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066669286: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhELUROcW12ZDRaa0EtaEUzSDViSlNCOFZQVGFzcERvR1BfbkJhcnNkSV84IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2NjkyODYifQ", "signature": "D4F2B5Q_7VKzPaQt7UpuGBeBm1VRzwubNYYLlPe_MtqF87shlkbPvVO7k1svrRI6h4V64QjNB3LJPAFuCefy6XnRR_wnJSeDAEnDqobzQH1E213c6gXCbfm9Kt9JROvRb0uWSvo5ytWN1kjGXTA3n0UbapGVhlbbJDGWbxwWtQjnKsGeQ1WGNsf3W6vmkMUTh5x2KoFDYC9mTXD1vGEu-FlW7OiaKCOt-xruBaX9mKT2yKNLYHfQVkgGrmmIVaSsaIfY2iGLie_nuQnaSJ2NGAsovNHcJzS4CHDELWIcs_JGKSVfAKYsQWGvGKQPux0ghlxJ8etzCVjvKCFjZD0h9w", "payload": "" } 2023-11-22 20:07:57,381:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066669286 HTTP/1.1" 200 806 2023-11-22 20:07:57,382:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:07:57 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8evllnR_JnWkRh6XEbyOK5DFBP1dhvJYKrJaOyT9Gp4I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:24:52Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066669286/DZCB_w", "token": "FOLQeQhM5d7jUf4G9Qq1v4w7kH45foXttXys0ZoHmyY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066669286/3LwN7g", "token": "FOLQeQhM5d7jUf4G9Qq1v4w7kH45foXttXys0ZoHmyY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066669286/N8DWOw", "token": "FOLQeQhM5d7jUf4G9Qq1v4w7kH45foXttXys0ZoHmyY" } ] } 2023-11-22 20:07:57,382:DEBUG:acme.client:Storing nonce: nbWKegf8evllnR_JnWkRh6XEbyOK5DFBP1dhvJYKrJaOyT9Gp4I 2023-11-22 20:07:57,383:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-22 20:07:57,383:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2023-11-22 20:07:57,384:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-22 20:07:57,384:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-22 20:07:57,385:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-22 20:07:57,385:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-22 20:07:57,385:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-22 20:07:57,385:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-22 20:07:57,386:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-22 20:07:57,423:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2023-11-22 20:07:57,423:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-22 20:07:57,423:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2023-11-22 20:07:57,430:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2023-11-22 20:07:57,433:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2023-11-22 20:07:57,433:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2023-11-22 20:07:57,433:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2023-11-22 20:07:57,433:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2023-11-22 20:07:57,435:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2023-11-22 20:07:57,471:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-22 20:07:57,878:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-22 20:07:57,879:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-22 20:07:57,880:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-22 20:07:57,884:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:56 UTC. 2023-11-22 20:07:57,884:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-22 20:07:57,884:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-22 20:07:57,889:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-22 20:07:57,889:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-22 20:07:57,889:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-22 20:07:57,904:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-22 20:07:57,905:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-22 20:07:57,907:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-22 20:07:58,422:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-22 20:07:58,422:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:07:58 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "FgtyR6ih5RU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-22 20:07:58,423:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-22 20:08:02,550:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6993_key-certbot.pem 2023-11-22 20:08:06,466:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6991_csr-certbot.pem 2023-11-22 20:08:06,466:DEBUG:acme.client:Requesting fresh nonce 2023-11-22 20:08:06,467:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-22 20:08:06,639:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-22 20:08:06,640:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:08:06 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjvCG_4GoCgRFUiVoL6OzzIB8dV9LnCFWk_k_GhhmHVag X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-22 20:08:06,640:DEBUG:acme.client:Storing nonce: SFMYLIQjvCG_4GoCgRFUiVoL6OzzIB8dV9LnCFWk_k_GhhmHVag 2023-11-22 20:08:06,640:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2023-11-22 20:08:06,646:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWp2Q0dfNEdvQ2dSRlVpVm9MNk96eklCOGRWOUxuQ0ZXa19rX0doaG1IVmFnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "KReEgj5HdgRSwmJ2H--nZVoqpWeA16EBak1nmt3zxyt9mgN-pegSEosI8oY_s5xYvBifqmfU1HYmnr-1s2oGK52MZ6P7qLRmcZfyBK7bY4Im0vsA13udP6JR3M6kvfo60z9o59EM8ncdKqE4WH4K9JmKERJXPpUF34I4TNzeWu3wZd0QvzuDxzlcEHB9ND_bxvIozC_ICXDehlBQgvurJPQHVkQsJJF_XjLfN0cjTKGW0PdqCXVICvn7wvWZD-UR9kqWiaj0wKE1ygJVEDlHCzfll1UmkNn9VG93Yvwwebc9efMbY33rtkehROeNscjB9fK2T4huPcce9U3soJJWyA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-22 20:08:06,834:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2023-11-22 20:08:06,835:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 22 Nov 2023 19:08:06 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796125916 Replay-Nonce: jXyutbsnHNuw9V8wyQ-4O4QTiywFAX9J7G8JCTyTl-kvrzCSGZU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:00Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066692866" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796125916" } 2023-11-22 20:08:06,835:DEBUG:acme.client:Storing nonce: jXyutbsnHNuw9V8wyQ-4O4QTiywFAX9J7G8JCTyTl-kvrzCSGZU 2023-11-22 20:08:06,835:DEBUG:acme.client:JWS payload: b'' 2023-11-22 20:08:06,841:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066692866: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25ITnV3OVY4d3lRLTRPNFFUaXl3RkFYOUo3RzhKQ1R5VGwta3ZyekNTR1pVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY2OTI4NjYifQ", "signature": "pAQyD19yb8cc5Pb22EW3MNTzIPSF1Epwai8_Vwyx0oyV_aZnJQ-ByeRepSJmfVSmuOJeaqWVmvgtIGkJ453-bRHZUNeavRx1J7sxawJvCPca1lHkxhHzsIG4-6rwNvxIavYOu5sokmA75IBRaXcC41LuLBNOJ5t5B-4wcmUp0SGIO9ew1U7BsD1rtwtg427RFuUfOCZ119Rkl5aJ6rBUgis5ElvOu1hosS1cLid3Cv8r9rtOpUEgBYNy-XGE3TCv-wfz6t2S20emBy3UhQgOP0GzNFf-Q9M8Bs6FOal3O16rcAh_Qfoq8G89D6EFDTeNdCqs_OSVlXc7Gw2LL4kdCw", "payload": "" } 2023-11-22 20:08:07,018:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066692866 HTTP/1.1" 200 811 2023-11-22 20:08:07,018:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:08:06 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjb1ZL1mbEK1G2wwW6OW44TW4tFATFTLR-PNxwX8hgMqk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:00Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066692866/TZHJ0A", "token": "otJKkgRT8z2VOaRDiAmAclIadkc79VXFNmsAESfM3y0" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066692866/YBeUJQ", "token": "otJKkgRT8z2VOaRDiAmAclIadkc79VXFNmsAESfM3y0" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066692866/i1p7PQ", "token": "otJKkgRT8z2VOaRDiAmAclIadkc79VXFNmsAESfM3y0" } ] } 2023-11-22 20:08:07,019:DEBUG:acme.client:Storing nonce: SFMYLIQjb1ZL1mbEK1G2wwW6OW44TW4tFATFTLR-PNxwX8hgMqk 2023-11-22 20:08:07,019:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-22 20:08:07,020:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2023-11-22 20:08:07,020:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-22 20:08:07,021:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-22 20:08:07,022:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-22 20:08:07,022:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-22 20:08:07,022:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-22 20:08:07,023:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-22 20:08:07,024:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-22 20:08:07,064:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-22 20:08:07,448:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-22 20:08:07,449:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-22 20:08:07,450:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-22 20:08:07,454:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:09 UTC. 2023-11-22 20:08:07,454:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-22 20:08:07,455:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-22 20:08:07,459:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-22 20:08:07,460:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-22 20:08:07,460:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-22 20:08:07,475:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-22 20:08:07,476:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-22 20:08:07,477:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-22 20:08:07,984:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-22 20:08:07,984:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:08:07 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "c5y9aIZJyoo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-22 20:08:07,985:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-22 20:08:12,073:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6994_key-certbot.pem 2023-11-22 20:08:16,028:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6992_csr-certbot.pem 2023-11-22 20:08:16,028:DEBUG:acme.client:Requesting fresh nonce 2023-11-22 20:08:16,028:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-22 20:08:16,197:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-22 20:08:16,198:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:08:15 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQj21rfJ_7DMG8Sodm96FlkjOrIxcAqDT45rlVa3m6C53Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-22 20:08:16,198:DEBUG:acme.client:Storing nonce: SFMYLIQj21rfJ_7DMG8Sodm96FlkjOrIxcAqDT45rlVa3m6C53Q 2023-11-22 20:08:16,201:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2023-11-22 20:08:16,206:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWoyMXJmSl83RE1HOFNvZG05NkZsa2pPckl4Y0FxRFQ0NXJsVmEzbTZDNTNRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "EB4XslzpXA2Zq6rqFMjVEyT6jfjQLZ7kQ2gpLKkW7sJPXgABfWaSJ83I7DavW8qgsl7DfinCcKeXlauoyXtmeDvZZ6m9hqs5dHuK7MIYpx-S6epGpKnj-GQzo9u6fCUMmtyC6iFHRlt_k2ma0kHgeyCdSzl5XsIbhanxjnm1P9gQh7e4nzYguQmZ4oPncTU3IzLhx7oNK6sF_7TM5nKbT5Irnx8qMNq61stxvos7sgTYE5_kNKtsZ5boV7XMrJo7JEdu7YdsXWRGfWEqGx6wXL1fyFr4afpKI24oVdsgCSzcikJPHsUCrJxrbUM-dmypNckrbD1JvkMwxq0DvFixMQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-22 20:08:16,390:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2023-11-22 20:08:16,391:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 22 Nov 2023 19:08:16 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796165656 Replay-Nonce: jXyutbsnrYQLewAGiykm5bsswpHMV_IU0USAhckuahrixKnskng X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:08Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066738016" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796165656" } 2023-11-22 20:08:16,391:DEBUG:acme.client:Storing nonce: jXyutbsnrYQLewAGiykm5bsswpHMV_IU0USAhckuahrixKnskng 2023-11-22 20:08:16,392:DEBUG:acme.client:JWS payload: b'' 2023-11-22 20:08:16,397:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066738016: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25yWVFMZXdBR2l5a201YnNzd3BITVZfSVUwVVNBaGNrdWFocml4S25za25nIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY3MzgwMTYifQ", "signature": "C6wFYC4PZaF5nsxyhFb9QjLA2t4t0ODRDyJbHUtaOwxFBBU6-v8qV9HiEN7XegLroiQijzHLao8ipEjDcWy0IZEOc8aRPWiG58HW-3_ZhKdtaqmQlHV5QCwcAypAlfIo3qQ1_2jZa0mXTKUvwbvKuOP1y3jTzXNZrPMaRu1R0WpJ_4nn1OZIWowcj9UwTQ0u_y4oBXO00s8lEUT9T0ApBBtBmkMKhvthK-dCTBO8ddSoXzjCRwR9x4Jb3tFZYhW7NThxmvkjJW8pB8xKn__5nDDT74GqRyYMokKleQTDq26Z6_9hQBjqtxSMppcDljjjTHBWWzRI4VweO3xDtVx3hw", "payload": "" } 2023-11-22 20:08:16,567:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066738016 HTTP/1.1" 200 810 2023-11-22 20:08:16,568:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:08:16 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnLblYJ5D6jQXsVe7QzTQcZe-AEAKNiIgVdZlxi2HW3m4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:08Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066738016/ypE5ag", "token": "6TDiXsqmeP1Jr6MAv3ggvn4O3hX5INT6PvOa_y3w6tM" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066738016/HUvErQ", "token": "6TDiXsqmeP1Jr6MAv3ggvn4O3hX5INT6PvOa_y3w6tM" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066738016/nzokTQ", "token": "6TDiXsqmeP1Jr6MAv3ggvn4O3hX5INT6PvOa_y3w6tM" } ] } 2023-11-22 20:08:16,568:DEBUG:acme.client:Storing nonce: jXyutbsnLblYJ5D6jQXsVe7QzTQcZe-AEAKNiIgVdZlxi2HW3m4 2023-11-22 20:08:16,568:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-22 20:08:16,569:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2023-11-22 20:08:16,569:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-22 20:08:16,570:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-22 20:08:16,570:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-22 20:08:16,571:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-22 20:08:16,571:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-22 20:08:16,571:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-22 20:08:16,572:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-22 20:08:16,608:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-22 20:08:17,237:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-22 20:08:17,238:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2023-11-22 20:08:17,239:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2023-11-22 20:08:17,243:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:22 UTC. 2023-11-22 20:08:17,244:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-22 20:08:17,244:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-22 20:08:17,249:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-22 20:08:17,249:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-22 20:08:17,249:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-22 20:08:17,264:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-22 20:08:17,266:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-22 20:08:17,268:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-22 20:08:17,703:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-22 20:08:17,704:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:08:17 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "fRndme0xlXU": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-22 20:08:17,704:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-22 20:08:22,099:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6995_key-certbot.pem 2023-11-22 20:08:26,089:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6993_csr-certbot.pem 2023-11-22 20:08:26,090:DEBUG:acme.client:Requesting fresh nonce 2023-11-22 20:08:26,090:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-22 20:08:26,235:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-22 20:08:26,235:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:08:25 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiRYqglL3RioaHmndfutdoCx7KuWewFNZq1qxz9b9xDE0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-22 20:08:26,235:DEBUG:acme.client:Storing nonce: v0bMowfiRYqglL3RioaHmndfutdoCx7KuWewFNZq1qxz9b9xDE0 2023-11-22 20:08:26,236:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2023-11-22 20:08:26,241:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlSWXFnbEwzUmlvYUhtbmRmdXRkb0N4N0t1V2V3Rk5acTFxeHo5Yjl4REUwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ix9eRIVxa_VBEQzL3yZutMNEE17T5IlLBqyDSUusM4bQxRd1nCglC0gkb1-E5S-LRRIp8Vb9V7OENz86d-0f4CgYmAsAci593QqMpH0TUGogaOq_1AOPQMfjOX-nNL5q8aqajsELmqFWmCTRcHzEo3cyzrbim66lt4iqIkJHt8jgRTJnKsWtVCTMOsRIgKm4zcCk9RJUHLNJttBuQ4I08y4u7_opg9ZFyY3X5D1riWarc1cRn__78ehITxRpUuiRQj4bLUGHZWrT4NyapcUUd4_76zgbrBDRnJPyx_9f_TfBvAnFO4nPSn66yrtnS0xEteRuP66nZLc5MuRizPikuA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-22 20:08:26,402:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2023-11-22 20:08:26,403:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 22 Nov 2023 19:08:26 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796190496 Replay-Nonce: v0bMowfiVhrv_JWjf5AIL3m91GG9EGVUtTX6PDYIGD62MGf398w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:17Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066771416" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796190496" } 2023-11-22 20:08:26,403:DEBUG:acme.client:Storing nonce: v0bMowfiVhrv_JWjf5AIL3m91GG9EGVUtTX6PDYIGD62MGf398w 2023-11-22 20:08:26,403:DEBUG:acme.client:JWS payload: b'' 2023-11-22 20:08:26,408:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066771416: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlWaHJ2X0pXamY1QUlMM205MUdHOUVHVlV0VFg2UERZSUdENjJNR2YzOTh3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY3NzE0MTYifQ", "signature": "AtHmeT0K3uqjyj9C88apcnVpoU0CZIlhRjuBQMzeEQCllPRSk00Da2iy8Xn0mbF0EsQHWUJ4WM9ts4HpJ8J0Ao4na7RyQX1IlW5tigO60EalIWZpqFdITSMR6pKH94sxZKsPCGIaFnSn1p7PYglkZ1Yp9LkzrUYXeJzkHGsS9eB-BPBiy_4eAnOmRrs7KXrr4Ry9idx81F8WXf1QjzgWFDU72kWJKbw8KKQOpQvOi5YOJnmHEqvyJGNtB3Zy4XtZWpSXT2CvdXyOxXQCzc0yEqnxnE2vRHXqnAt9H2EYRQzaauKTCeSyh-80bLM8ciTeBUZTj2_aYWM1dWDwNPHX8w", "payload": "" } 2023-11-22 20:08:26,557:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066771416 HTTP/1.1" 200 809 2023-11-22 20:08:26,557:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:08:26 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8Yp4hbVYyzT_P1HyltIEvSrdkgz6Xk3Lf8dX2ZtlptQM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:17Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066771416/1qhCuQ", "token": "cVVMxW9zwT-iEFrTBcAWPKCXYKiDFVXWvmhWDvf--Y4" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066771416/isn6Gw", "token": "cVVMxW9zwT-iEFrTBcAWPKCXYKiDFVXWvmhWDvf--Y4" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066771416/lLjJ0A", "token": "cVVMxW9zwT-iEFrTBcAWPKCXYKiDFVXWvmhWDvf--Y4" } ] } 2023-11-22 20:08:26,557:DEBUG:acme.client:Storing nonce: nbWKegf8Yp4hbVYyzT_P1HyltIEvSrdkgz6Xk3Lf8dX2ZtlptQM 2023-11-22 20:08:26,558:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-22 20:08:26,558:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2023-11-22 20:08:26,559:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-22 20:08:26,559:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-22 20:08:26,560:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-22 20:08:26,561:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-22 20:08:26,561:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-22 20:08:26,561:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-22 20:08:26,562:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-22 20:08:26,612:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-22 20:08:27,015:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-22 20:08:27,016:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2023-11-22 20:08:27,017:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2023-11-22 20:08:27,021:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:34 UTC. 2023-11-22 20:08:27,021:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-22 20:08:27,022:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-22 20:08:27,027:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-22 20:08:27,027:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-22 20:08:27,027:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-22 20:08:27,042:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-22 20:08:27,043:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-22 20:08:27,045:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-22 20:08:27,477:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-22 20:08:27,478:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:08:27 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "gaZRFkEDNX0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-22 20:08:27,479:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-22 20:08:31,562:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6996_key-certbot.pem 2023-11-22 20:08:35,486:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6994_csr-certbot.pem 2023-11-22 20:08:35,486:DEBUG:acme.client:Requesting fresh nonce 2023-11-22 20:08:35,486:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-22 20:08:35,630:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-22 20:08:35,631:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:08:35 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8nXX8IqZghyHTDjIrWVA1stofR2js0gZTHZRcHlEEeEk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-22 20:08:35,631:DEBUG:acme.client:Storing nonce: nbWKegf8nXX8IqZghyHTDjIrWVA1stofR2js0gZTHZRcHlEEeEk 2023-11-22 20:08:35,631:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2023-11-22 20:08:35,638:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhuWFg4SXFaZ2h5SFREaklyV1ZBMXN0b2ZSMmpzMGdaVEhaUmNIbEVFZUVrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "TGfkQvk_uoN9W3QdY54cc0xOm1rBJqYuoFvnMBkWxBiS32hceZe_vT6FrzLLRooweZCzJuvV5ieyz9wRvvY_9ioNdWmWN9MLEzzGJ8BhIyv0VIwBTGlyifc0N8YgVbKCNP17ItN_bNqY7Ad0qwYnjLc2e17jp8U5dNtuwBtkNoR6eGZjbfrwqGeYowhpZ3nZBZRILniNbWSppkeQ1WTdwH9B-SJkEj9Xuwq42a-op-eX58AYPGL1hQAtaqHIE1uJIw1pQefj9L61xsjCy5srmUuGgPiBN4sqWRWb5M-TZcOU2cvf0DykO_wEUSkPp1eVrEBzTbVMiwH_cjSGEfbFug", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-22 20:08:35,822:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-22 20:08:35,823:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 22 Nov 2023 19:08:35 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796210686 Replay-Nonce: v0bMowfiNomXvcF1m10nagCO6h5CbEG1mBkCj6sbcmA1TLYGYuw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:25Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066800166" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796210686" } 2023-11-22 20:08:35,823:DEBUG:acme.client:Storing nonce: v0bMowfiNomXvcF1m10nagCO6h5CbEG1mBkCj6sbcmA1TLYGYuw 2023-11-22 20:08:35,823:DEBUG:acme.client:JWS payload: b'' 2023-11-22 20:08:35,829:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066800166: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlOb21YdmNGMW0xMG5hZ0NPNmg1Q2JFRzFtQmtDajZzYmNtQTFUTFlHWXV3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY4MDAxNjYifQ", "signature": "cpKxRT6mwJaefXKEtou6b9DhpW-_NfwvOfplWKQlkSsulw5irvv6oPPt829A96SxpJg0Muw5oW30rUqS9gviZz5uWWU3YCZjoPGWzFcrAg1LhBNNVHSvxwqErno9cTXSznVKa5u_undLuMtElsgWAA-s0e3B7y-nmN1fm4JDlGbmrAF91IC_ZMFuEb4qS6XzQ65jBwhiedySrrqUz8jkfjdJh4UpRj78uzRmwyXfJQdNl-1JT_D4C40x2mwytOEhXNUdk0y_yG3KdneF0SzkL9E4NKshUfwkWkni5W15ZvL6eFX6mXlB0n4pDMOM4q7yxiWdYRqXOw9kXp5eF0Cl5w", "payload": "" } 2023-11-22 20:08:35,984:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066800166 HTTP/1.1" 200 805 2023-11-22 20:08:35,985:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:08:35 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfic_xwPGe0cXGZCF6y690I468i5J_0w72yzmIO5OUflRc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:25Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066800166/zXEJ0Q", "token": "chax4aVJRBAwxdLyEKOihE2bmz-XL8HJpzNL8ytpyn8" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066800166/b777tA", "token": "chax4aVJRBAwxdLyEKOihE2bmz-XL8HJpzNL8ytpyn8" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066800166/Gd6Xnw", "token": "chax4aVJRBAwxdLyEKOihE2bmz-XL8HJpzNL8ytpyn8" } ] } 2023-11-22 20:08:35,985:DEBUG:acme.client:Storing nonce: v0bMowfic_xwPGe0cXGZCF6y690I468i5J_0w72yzmIO5OUflRc 2023-11-22 20:08:35,986:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-22 20:08:35,986:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2023-11-22 20:08:35,987:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-22 20:08:35,987:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-22 20:08:35,988:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-22 20:08:35,988:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-22 20:08:35,988:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-22 20:08:35,989:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-22 20:08:35,990:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-22 20:08:36,038:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-22 20:08:36,445:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-22 20:08:36,446:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-22 20:08:36,447:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-22 20:08:36,451:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:48 UTC. 2023-11-22 20:08:36,451:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-22 20:08:36,452:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-22 20:08:36,456:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-22 20:08:36,457:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-22 20:08:36,457:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-22 20:08:36,472:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-22 20:08:36,473:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-22 20:08:36,474:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-22 20:08:36,993:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-22 20:08:36,994:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:08:36 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "3AijhBPVOT4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-22 20:08:36,995:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-22 20:08:41,336:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6997_key-certbot.pem 2023-11-22 20:08:45,282:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6995_csr-certbot.pem 2023-11-22 20:08:45,283:DEBUG:acme.client:Requesting fresh nonce 2023-11-22 20:08:45,283:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-22 20:08:45,455:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-22 20:08:45,455:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:08:45 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnmtDAGpYVc3Rdo7N8OXVeSqCbYdLX7Ee_YJgF8D6j9IE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-22 20:08:45,456:DEBUG:acme.client:Storing nonce: jXyutbsnmtDAGpYVc3Rdo7N8OXVeSqCbYdLX7Ee_YJgF8D6j9IE 2023-11-22 20:08:45,456:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2023-11-22 20:08:45,462:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25tdERBR3BZVmMzUmRvN044T1hWZVNxQ2JZZExYN0VlX1lKZ0Y4RDZqOUlFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "mdayyXTMtHqUSW6oJXNJa2jETDheH3zr_nJSFg9uET_-VQL_3Jk8lkdGIGB1GCCUpDEanX_gShZQQgDTivA6Rw-Htdbb15RfBCNu0uIACacLOFx0MdSRqEr8lGH-tRLYSJ0u-TT1Nmfvn0Pj80oA63oonT7V8MqeLUYvu0Dk3qVirgySs1ihfKJmrLA-PZ-3Ar-qQefXgk_Ic4lMmJIe2FWUZ66J37j0XFa6hlXEKcl9Udhknc0VMKZDaCnx7h5cvM8IjYuLMqEXSzhp161bQxH4decJosWihXdXtWHv1Y6ppf3qigE3SqX8nKP-cAHixNLCOKU1sqgJ42cgl12hmw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-22 20:08:45,649:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-22 20:08:45,650:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 22 Nov 2023 19:08:45 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796230126 Replay-Nonce: jXyutbsnvivlJ_R0PAKDkjsSBoVMIB5a1IVwlOTjwjq2d1mHFOg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:34Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066828686" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796230126" } 2023-11-22 20:08:45,650:DEBUG:acme.client:Storing nonce: jXyutbsnvivlJ_R0PAKDkjsSBoVMIB5a1IVwlOTjwjq2d1mHFOg 2023-11-22 20:08:45,650:DEBUG:acme.client:JWS payload: b'' 2023-11-22 20:08:45,656:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066828686: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic252aXZsSl9SMFBBS0RranNTQm9WTUlCNWExSVZ3bE9UandqcTJkMW1IRk9nIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY4Mjg2ODYifQ", "signature": "da14kVGxGlAFAGZKuFVyu6nPgkgHstEVy9S04KyQ2_lTq4xboYDwtOmURnvV3RH-bGMKqm5cRWTbQ3DYvtlAez4A_cWxtLJxt3Jf84oHI8OMChNiLMcXn5Q0qwP98HwqfsxUAIYivkCqYJGmLreOVP2hgQGoaTrabN8k6GZh4SBFEcJxqNPrpt4TSnv2Zw8l7bb38c14Ka5Lv1QxNal98aoL5tXX--z3-nNwdWOD1cgOr1J2ovbdx0vxP8kEbT0NAfaHvvGzBmZUV6prkIMGCJme2qymm1RbvPKBrPlU3PKy-rQCVqVj7pskfdHbaom8b9MNCj6WauF_0C6BRdC3fA", "payload": "" } 2023-11-22 20:08:45,832:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066828686 HTTP/1.1" 200 805 2023-11-22 20:08:45,832:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:08:45 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnHZcaR8GOGAMDBW5BWS7FzHbvoceioYrFP2K0tPKsI04 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:34Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066828686/TFIwLw", "token": "kAlE0kR-pqo9F_UYGQCvSB7TRTjOLQiZBJq_dZ7iFHs" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066828686/se4r1w", "token": "kAlE0kR-pqo9F_UYGQCvSB7TRTjOLQiZBJq_dZ7iFHs" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066828686/Hc2_wQ", "token": "kAlE0kR-pqo9F_UYGQCvSB7TRTjOLQiZBJq_dZ7iFHs" } ] } 2023-11-22 20:08:45,833:DEBUG:acme.client:Storing nonce: jXyutbsnHZcaR8GOGAMDBW5BWS7FzHbvoceioYrFP2K0tPKsI04 2023-11-22 20:08:45,833:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-22 20:08:45,834:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2023-11-22 20:08:45,834:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-22 20:08:45,834:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-22 20:08:45,835:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-22 20:08:45,835:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-22 20:08:45,835:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-22 20:08:45,836:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-22 20:08:45,837:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-22 20:08:45,875:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-22 20:08:46,093:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-22 20:08:46,094:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-22 20:08:46,095:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-22 20:08:46,099:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:31:01 UTC. 2023-11-22 20:08:46,099:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-22 20:08:46,099:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-22 20:08:46,104:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-22 20:08:46,104:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-22 20:08:46,105:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-22 20:08:46,120:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-22 20:08:46,121:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-22 20:08:46,122:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-22 20:08:46,643:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-22 20:08:46,644:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:08:46 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "LM7-tpcTr60": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-22 20:08:46,644:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-22 20:08:51,105:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6998_key-certbot.pem 2023-11-22 20:08:55,042:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6996_csr-certbot.pem 2023-11-22 20:08:55,042:DEBUG:acme.client:Requesting fresh nonce 2023-11-22 20:08:55,043:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-22 20:08:55,215:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-22 20:08:55,215:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:08:54 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsn5xYG-ZthOGOgQ-MPfNzi7xFqc64v-Npfn-bcjSK9iuE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-22 20:08:55,216:DEBUG:acme.client:Storing nonce: jXyutbsn5xYG-ZthOGOgQ-MPfNzi7xFqc64v-Npfn-bcjSK9iuE 2023-11-22 20:08:55,216:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2023-11-22 20:08:55,222:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic241eFlHLVp0aE9HT2dRLU1QZk56aTd4RnFjNjR2LU5wZm4tYmNqU0s5aXVFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Q1uQnYca5IEaLx-36CtCW4KQ3cHl4XrjuXcLBYnaj7W4F-8dKVYqSR4BvP6iQfQY5mTVyhaHKvyHexpui-TSaDm1dOksDkQrq7gq4A1x_10kq5Zq21dsTt56ZU-2LcbmgR1EaoGNeNzYLHP06fN_5uvrfXkKEqJJ-O0OOaevuohHXM44SIhK1k35XGCnvHBpA8BWdQPHEBbc80p3B3MmZnI_Ozrs9MxgMISthYOk0IIZV9tp2DoBKwsDMDEHGFuQPKG5LE3QS9pdPDYcBfBbH2JJo0vaUZNvOJukvYD1rGtoZXGONPoH4D1X3SUC_36mxp_teBY94gqUW0csgRIvHA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-22 20:08:55,447:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-22 20:08:55,447:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 22 Nov 2023 19:08:55 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/223796249816 Replay-Nonce: jXyutbsnbYGYZEQUTwJyHSCYZAFIkgus4FYfPIs8Dqdu_u_RYbI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-28T14:25:42Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066858576" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/223796249816" } 2023-11-22 20:08:55,447:DEBUG:acme.client:Storing nonce: jXyutbsnbYGYZEQUTwJyHSCYZAFIkgus4FYfPIs8Dqdu_u_RYbI 2023-11-22 20:08:55,448:DEBUG:acme.client:JWS payload: b'' 2023-11-22 20:08:55,453:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/286066858576: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25iWUdZWkVRVVR3SnlIU0NZWkFGSWtndXM0RllmUElzOERxZHVfdV9SWWJJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODYwNjY4NTg1NzYifQ", "signature": "PJcAZmeq8iudpwys7yaXmBqf6nLjRY3fN1ywqPrnsMPso6GDBBc-RSn6MuFxq5HFZCfAiDMiuS26O_oAXMEk2inaEwXpL2mcXeZgWU5zOtrVB3KjcE_FhktkM50D35ETeywroxa3DJ3GYc1bfbCig70e8Qu8tidr9_dNF-xLfg1--HlRaTLV1d3MphA_DtqE-M-GZcdyod5MVqBH3X0m4opj8O2pvUdUmarrdLYz63C5x8lImOgUWcVAhKMVDH3ySwmfW6Zt_Or1-m2uhthJoNVc3bVEUvdHpo_rw0M_-kTOAtdv3mE_F5bnP7AdALtr7OKBGIPTBFNDZxnrKNDucQ", "payload": "" } 2023-11-22 20:08:55,629:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/286066858576 HTTP/1.1" 200 805 2023-11-22 20:08:55,629:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 22 Nov 2023 19:08:55 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnnLdP8E3sn63RQZ9LcyI2L8eYSc0T_xPP4GVE01UxjS0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-28T14:25:42Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066858576/p5HniQ", "token": "vgTEYICaF9gMErZyGxBr6V0KD9ZEoeesWVIQ8h9Ks48" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066858576/JwX8uw", "token": "vgTEYICaF9gMErZyGxBr6V0KD9ZEoeesWVIQ8h9Ks48" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/286066858576/_ogaVA", "token": "vgTEYICaF9gMErZyGxBr6V0KD9ZEoeesWVIQ8h9Ks48" } ] } 2023-11-22 20:08:55,630:DEBUG:acme.client:Storing nonce: jXyutbsnnLdP8E3sn63RQZ9LcyI2L8eYSc0T_xPP4GVE01UxjS0 2023-11-22 20:08:55,630:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-22 20:08:55,631:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2023-11-22 20:08:55,631:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-22 20:08:55,631:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-22 20:08:55,632:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-22 20:08:55,632:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-22 20:08:55,632:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-22 20:08:55,633:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-22 20:08:55,634:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-22 20:08:55,634:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2023-11-22 20:08:55,634:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2023-11-22 20:08:55,646:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2023-11-22 20:08:55,648:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)