2023-11-21 04:06:53,221:DEBUG:certbot._internal.main:certbot version: 1.6.0 2023-11-21 04:06:53,221:DEBUG:certbot._internal.main:Arguments: [] 2023-11-21 04:06:53,222:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2023-11-21 04:06:54,011:DEBUG:certbot._internal.log:Root logging level set at 20 2023-11-21 04:06:54,011:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2023-11-21 04:06:54,045:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2023-11-21 04:06:54,083:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-21 04:06:54,297:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-21 04:06:54,306:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is signed by the certificate's issuer. 2023-11-21 04:06:54,311:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is: OCSPCertStatus.GOOD 2023-11-21 04:06:54,318:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:23 UTC. 2023-11-21 04:06:54,318:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-21 04:06:54,318:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-21 04:06:54,323:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-21 04:06:54,323:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-21 04:06:54,323:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-21 04:06:54,329:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-21 04:06:54,330:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-21 04:06:54,332:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-21 04:06:54,879:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-21 04:06:54,879:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:06:54 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "kWbP1fhySYg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-21 04:06:54,880:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-21 04:06:59,130:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6947_key-certbot.pem 2023-11-21 04:07:02,965:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6945_csr-certbot.pem 2023-11-21 04:07:02,966:DEBUG:acme.client:Requesting fresh nonce 2023-11-21 04:07:02,966:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-21 04:07:03,140:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-21 04:07:03,141:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:07:02 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQj97aHBns7OSiwBqzR7f3S82xx8CuDEhWDdGvreou7FXg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-21 04:07:03,141:DEBUG:acme.client:Storing nonce: SFMYLIQj97aHBns7OSiwBqzR7f3S82xx8CuDEhWDdGvreou7FXg 2023-11-21 04:07:03,141:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2023-11-21 04:07:03,146:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWo5N2FIQm5zN09TaXdCcXpSN2YzUzgyeHg4Q3VERWhXRGRHdnJlb3U3RlhnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "RUBMMHS44bPj0wCg2vncXOywk84KFirkPYTCiWKl1Huj8JlkF5G75MxXfXxSRbx28T5EXIuOe3WnuZiD8S4ND6KprW6m4U6nYgWeE6ACpMqsJBa_dM6fCwTxuPfBIxwGzkf-6_gc9x0u8CIdyUdh3n8wvLfmhZxCzFTMS0URDOgI_ML9pRcI1gSHG1MHXqw5bJDLrIMhPDTev96MIpJiZiwb8-JtjQCHUfZrYJ8wf_5RUWkk_u6ojKN4IoKAGHNKhtg4BBzSMlIlkQ2QfYqgXJ2914eEMRP1Cuo1GQTswQRbKHYf8h2oh5i-XLn6csbqLZvCQJ7sGnQ9hhGIsMyVEw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-21 04:07:03,334:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2023-11-21 04:07:03,335:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 21 Nov 2023 03:07:02 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054336746 Replay-Nonce: SFMYLIQj0HEmE2K_LqdfkiZZxdurygmcmNXKv6EubrS04ktR1iM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:40:34Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612303016" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054336746" } 2023-11-21 04:07:03,335:DEBUG:acme.client:Storing nonce: SFMYLIQj0HEmE2K_LqdfkiZZxdurygmcmNXKv6EubrS04ktR1iM 2023-11-21 04:07:03,335:DEBUG:acme.client:JWS payload: b'' 2023-11-21 04:07:03,341:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612303016: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWowSEVtRTJLX0xxZGZraVpaeGR1cnlnbWNtTlhLdjZFdWJyUzA0a3RSMWlNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTIzMDMwMTYifQ", "signature": "EiOxU--WSQ7BS-0L9L-9dX2MSsHcq3Msw0rS95E2lVQ7x2XBPyFy2prywfGJ67G7Osrhk8WzCsMKrQ7qFbG1DXymhAr9CyAVFHFcx5qJ55cvj4ojZjDiSNETNhh_HClUK5494S4eHog-Qu884VHv0_wIWIixskxWeKUgBlnMGW_rLzoM-xBbWW3I1lBwEdLl_qmm7KpcqV_EAz34Lax1aiVKB_1H4ffB_wm0KCOITC8eYaDBhabLD5yW6LZKGgbNuINB2rh61waFpj-66UmWQv1biwy0gHEvrMyr37TN5Ku4WbnyWXtSc-g0bZ9se3c88dW5suS4keEVaeCeJB-TZQ", "payload": "" } 2023-11-21 04:07:03,519:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612303016 HTTP/1.1" 200 810 2023-11-21 04:07:03,520:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:07:02 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnjx7zbgwhypMyr0ErtJlWLZfEDIiycxwxzB0n-TmY2tY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:40:34Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612303016/SE_DLA", "token": "pQaTT9XorHa5ZWDeypT0Hc0yUXwYdMo60L_Xs22rZ0Q" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612303016/Wku45g", "token": "pQaTT9XorHa5ZWDeypT0Hc0yUXwYdMo60L_Xs22rZ0Q" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612303016/hUBGgQ", "token": "pQaTT9XorHa5ZWDeypT0Hc0yUXwYdMo60L_Xs22rZ0Q" } ] } 2023-11-21 04:07:03,521:DEBUG:acme.client:Storing nonce: jXyutbsnjx7zbgwhypMyr0ErtJlWLZfEDIiycxwxzB0n-TmY2tY 2023-11-21 04:07:03,522:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-21 04:07:03,522:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2023-11-21 04:07:03,523:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-21 04:07:03,524:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-21 04:07:03,539:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-21 04:07:03,539:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-21 04:07:03,539:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-21 04:07:03,539:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-21 04:07:03,545:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-21 04:07:03,580:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-21 04:07:03,980:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-21 04:07:03,982:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-21 04:07:03,984:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-21 04:07:03,994:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:36 UTC. 2023-11-21 04:07:03,994:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-21 04:07:03,995:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-21 04:07:04,001:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-21 04:07:04,001:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-21 04:07:04,001:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-21 04:07:04,005:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-21 04:07:04,006:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-21 04:07:04,008:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-21 04:07:04,554:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-21 04:07:04,555:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:07:03 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "PBcJXgSN95c": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-21 04:07:04,556:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-21 04:07:08,206:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6948_key-certbot.pem 2023-11-21 04:07:11,681:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6946_csr-certbot.pem 2023-11-21 04:07:11,681:DEBUG:acme.client:Requesting fresh nonce 2023-11-21 04:07:11,682:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-21 04:07:11,863:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-21 04:07:11,865:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:07:11 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnvLci8nUrzGWqFS3zRRJ5Sqx1tumNru2rlY8dnib0Dm4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-21 04:07:11,865:DEBUG:acme.client:Storing nonce: jXyutbsnvLci8nUrzGWqFS3zRRJ5Sqx1tumNru2rlY8dnib0Dm4 2023-11-21 04:07:11,866:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2023-11-21 04:07:11,875:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic252TGNpOG5VcnpHV3FGUzN6UlJKNVNxeDF0dW1OcnUycmxZOGRuaWIwRG00IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "DThFMb5BxwtcCrSNi64oXCQjiFdElJIHXUIQQr2DL5Run5Fi1OkkHzS4_pkGqY1uAhCtqO0a5wyGyByHuN1oes89cT_j04mj3s7s_1yfAjmBUyM8qgxFEtbjNEe-BrWePxjLMzDsvwKuIoqvFPclURc7qQac0lQsHt_ICIf8Z8tw_myR2mH8-g0JsOo6-__CWg2z6TyV4-rqBjxDMdx0CgpCrUT12-CQfX6xzQDejV6rR2luF86eRI83usbXdhMAqdcTIEw3SFxcltWdQNLvXgMddqrlTGPUqfbEKHt56ZRwe0H6chYaMvJ193OW9ALreGU0-YuQ3tKJxuhFvdFBtQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-21 04:07:12,077:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2023-11-21 04:07:12,078:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 21 Nov 2023 03:07:11 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054364216 Replay-Nonce: jXyutbsnoyUinIDpWotUW1LwquQMIOZgNlv5GCp58A2rU2occIs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:40:44Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612339826" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054364216" } 2023-11-21 04:07:12,079:DEBUG:acme.client:Storing nonce: jXyutbsnoyUinIDpWotUW1LwquQMIOZgNlv5GCp58A2rU2occIs 2023-11-21 04:07:12,079:DEBUG:acme.client:JWS payload: b'' 2023-11-21 04:07:12,086:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612339826: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25veVVpbklEcFdvdFVXMUx3cXVRTUlPWmdObHY1R0NwNThBMnJVMm9jY0lzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTIzMzk4MjYifQ", "signature": "auK_TNw4D9Zm9pLb-rw1BNpXsMwRqWkjpuXx0R9U3pqsObo2kK_HrFJJsXl5TGqkXEe95bkyZh9m-VJoQKwFhE_w7R3b4my3wh1wNGxqO9B_23tv_ePOfKFuWM-u4rtEOLggJAgZsrjn9q0O5iCxn46ffpwGNBCjIBwEZr6SIByUq6HdeEryIhYcaaH-znfHuXhy2atFtlZU-UzCgyS7Ll5j3Ssdsvh6A9DFT-8Rznj0IvC5OFzXiw8W-0DKAIB5Kw6lmj8AYGO0WcvwNGHykuJ2ckwcgMPjZHvjWukMJNl5cpWqZ49adJWCWAmcDKGRLZEbseZi61D3Q0JI_7RxnA", "payload": "" } 2023-11-21 04:07:12,272:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612339826 HTTP/1.1" 200 804 2023-11-21 04:07:12,273:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:07:11 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnmf5c5ism1-GCqfn1T2XWfJr8M67HKKV76AOe9ka_Mzw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:40:44Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612339826/iaWzYw", "token": "lZ4sjyuE91eCR82aOexpOm4No3LJXeuqBiMNXsnHG7w" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612339826/b2lhHw", "token": "lZ4sjyuE91eCR82aOexpOm4No3LJXeuqBiMNXsnHG7w" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612339826/4q2BkQ", "token": "lZ4sjyuE91eCR82aOexpOm4No3LJXeuqBiMNXsnHG7w" } ] } 2023-11-21 04:07:12,273:DEBUG:acme.client:Storing nonce: jXyutbsnmf5c5ism1-GCqfn1T2XWfJr8M67HKKV76AOe9ka_Mzw 2023-11-21 04:07:12,274:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-21 04:07:12,275:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2023-11-21 04:07:12,276:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-21 04:07:12,276:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-21 04:07:12,277:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-21 04:07:12,277:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-21 04:07:12,278:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-21 04:07:12,278:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-21 04:07:12,279:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-21 04:07:12,324:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-21 04:07:12,765:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-21 04:07:12,768:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-21 04:07:12,769:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-21 04:07:12,775:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:49 UTC. 2023-11-21 04:07:12,775:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-21 04:07:12,775:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-21 04:07:12,779:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-21 04:07:12,779:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-21 04:07:12,779:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-21 04:07:12,784:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-21 04:07:12,785:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-21 04:07:12,787:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-21 04:07:13,322:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-21 04:07:13,324:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:07:12 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "Aw7UTpM55Ug": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-21 04:07:13,325:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-21 04:07:17,284:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6949_key-certbot.pem 2023-11-21 04:07:20,789:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6947_csr-certbot.pem 2023-11-21 04:07:20,790:DEBUG:acme.client:Requesting fresh nonce 2023-11-21 04:07:20,790:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-21 04:07:20,968:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-21 04:07:20,969:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:07:20 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjROr87xWL6W5ERpDH4VoMpiiJq9DwE5Kg9-M8oYsByL0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-21 04:07:20,969:DEBUG:acme.client:Storing nonce: SFMYLIQjROr87xWL6W5ERpDH4VoMpiiJq9DwE5Kg9-M8oYsByL0 2023-11-21 04:07:20,970:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2023-11-21 04:07:20,979:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpST3I4N3hXTDZXNUVScERINFZvTXBpaUpxOUR3RTVLZzktTThvWXNCeUwwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "jU8vtje1Gs_R27l1Mp3H1dJJJyaXSU2tJY6F7bod9NwXVM03PRyw40k5YKNf1D6VCbc855KsW_36uCtjDJOIOZMaq4dtW4SunWyRbEmYa1SERo89_b-MSkJu7mmq9QHBgUr02WSunhhLjIFZPycvy1Qb-NKNbJqIUdJ6mrAk1iKM3YhqJOq2VFareYO1vkTMpq9oUBuYD3BWPG546v6GUT6ufZzCxzXyURRGKzsnoYpQ1vPVEMzdP2plmvzVe8FZb-8Tc0cfFpgN6lHdNLpDkcEe9WqbwAUxKlqmN6IUucO37TKuXD8KHWXLGKDTSxxP6uTQcbWl5tlS_FtRuhoGNg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-21 04:07:21,255:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2023-11-21 04:07:21,256:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 21 Nov 2023 03:07:20 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054392386 Replay-Nonce: SFMYLIQjm_HFylAfOCfWMLLyaYDkv4t4rE_WK_75oacctkUaSBE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:40:54Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612379486" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054392386" } 2023-11-21 04:07:21,257:DEBUG:acme.client:Storing nonce: SFMYLIQjm_HFylAfOCfWMLLyaYDkv4t4rE_WK_75oacctkUaSBE 2023-11-21 04:07:21,257:DEBUG:acme.client:JWS payload: b'' 2023-11-21 04:07:21,265:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612379486: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWptX0hGeWxBZk9DZldNTEx5YVlEa3Y0dDRyRV9XS183NW9hY2N0a1VhU0JFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTIzNzk0ODYifQ", "signature": "ZS5WM_Q4aeo946gBE2aRoDrpKmhT2qHLULxiIycojEe27y2bttYU2pHqDwpuo1GpMxzwx0qbOxYqMvfRdNcT-oMJgp8-9tF4oPO1q1bc2--apovhlBxosVrFStuf0jZtlrxMIH1jbREitoedEiAaHVaJMEpII632aNYg-P3fXfcZw2LjEnI3fvbNJJFn0sQvSDKlAkW6dJJ50n3dizBNur54tHtrKPXFijmBE9Zsnvfz2XmIwI5Nbv9N_oesXY9lkjhxIpBDwltEYzKLDNluK9E8ZMhxMWiiegTaFb9JzK1FJfYiMTu-RQghSm6m48F6QQo_GZEDcau2StoK_yw00w", "payload": "" } 2023-11-21 04:07:21,459:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612379486 HTTP/1.1" 200 807 2023-11-21 04:07:21,460:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:07:20 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjToHqEpi2yNcHdCOZaA5PCQJ8eztfOxbpRe4U6Wnx8oM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:40:54Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612379486/az4Vdg", "token": "cudl-UJkA1ZG6E5Za_MtH1igwT5c-ctyXDfDcgUpCmc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612379486/Zk1DuA", "token": "cudl-UJkA1ZG6E5Za_MtH1igwT5c-ctyXDfDcgUpCmc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612379486/MleojA", "token": "cudl-UJkA1ZG6E5Za_MtH1igwT5c-ctyXDfDcgUpCmc" } ] } 2023-11-21 04:07:21,460:DEBUG:acme.client:Storing nonce: SFMYLIQjToHqEpi2yNcHdCOZaA5PCQJ8eztfOxbpRe4U6Wnx8oM 2023-11-21 04:07:21,461:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-21 04:07:21,461:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2023-11-21 04:07:21,461:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-21 04:07:21,462:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-21 04:07:21,462:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-21 04:07:21,463:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-21 04:07:21,463:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-21 04:07:21,463:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-21 04:07:21,464:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-21 04:07:21,507:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-21 04:07:21,929:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-21 04:07:21,930:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-21 04:07:21,931:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-21 04:07:21,936:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:02 UTC. 2023-11-21 04:07:21,936:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-21 04:07:21,937:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-21 04:07:21,942:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-21 04:07:21,943:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-21 04:07:21,943:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-21 04:07:21,958:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-21 04:07:21,959:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-21 04:07:21,961:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-21 04:07:22,413:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-21 04:07:22,414:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:07:21 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "XpfaAprP0AM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-21 04:07:22,415:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-21 04:07:26,050:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6950_key-certbot.pem 2023-11-21 04:07:29,519:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6948_csr-certbot.pem 2023-11-21 04:07:29,520:DEBUG:acme.client:Requesting fresh nonce 2023-11-21 04:07:29,520:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-21 04:07:29,670:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-21 04:07:29,671:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:07:28 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8ZSDVJFxSflnHYaoRvECHlmffL53Tt0WBumshnMDtlzw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-21 04:07:29,671:DEBUG:acme.client:Storing nonce: nbWKegf8ZSDVJFxSflnHYaoRvECHlmffL53Tt0WBumshnMDtlzw 2023-11-21 04:07:29,672:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2023-11-21 04:07:29,679:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhaU0RWSkZ4U2ZsbkhZYW9SdkVDSGxtZmZMNTNUdDBXQnVtc2huTUR0bHp3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "URTezH7gYCXnkA7pphOxjHLZSY1y_EjOilOUSJytL1jZsjdDci9X3__2t-OzeeFjy1XRIG9uR-GZsO_Qru44HvfMRmp0JSzjJ-Itluvu0ZMAmw3a9Gn3UCO9dtoBllxuKc8TQuDqUukY21tVSfi8ygEm7Uy4wkWUKUiVxYLav7TZpyUkgESSlBFYZSS2OExp9IktiK1Vl8OX-WlL-G7Xly4mTSxs4kD1MDk4ne5G_dicviB24aYefXQhEZtPtcR-_kmjLZ-rkRj_pBGT-CsD9ZJbBnHIsYLvlXn6eGJBzaev0Xyiow3o-PAo_VJAa257WfZYLl1ZAsZdxxdpRWkdrQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-21 04:07:29,933:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2023-11-21 04:07:29,934:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 21 Nov 2023 03:07:29 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054424916 Replay-Nonce: v0bMowfiTJcIAaQQvjcerwPGwfy0JueRp1LpP12dV--sfK9ttKE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:04Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612422406" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054424916" } 2023-11-21 04:07:29,934:DEBUG:acme.client:Storing nonce: v0bMowfiTJcIAaQQvjcerwPGwfy0JueRp1LpP12dV--sfK9ttKE 2023-11-21 04:07:29,934:DEBUG:acme.client:JWS payload: b'' 2023-11-21 04:07:29,940:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612422406: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlUSmNJQWFRUXZqY2Vyd1BHd2Z5MEp1ZVJwMUxwUDEyZFYtLXNmSzl0dEtFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI0MjI0MDYifQ", "signature": "Vhlh7ImWg_e5qR67HVhLhOssPlt-0nASIwEFkdOpghqG3WNNtjWvSKyIvRl1dGJDZaDW7gTvNUs1Aa8U3COq0PicIPJ93akr9e0ShkHyFNSmEacj0v8Ct05Z8PQRS3gUmOcNLRKF6435kQtJJgTUoaqVdiYtI2rUgvgbr65nywIsZ6zLIrMAWy4kkmrqG9czB3ERf8Xg0Xvf4Il2DrF3KBI05FtDa7TglhFEsICZfBTJFGvwRg1Dv1Re_7GnOhHkVsZ4xR4VPr_MTWF29YxD-ADMHYQA2GxilSV-3ZSKUYEs-1vHPOwHdyIgGnThT_273PFknOIEAhjqZh5IPD1ExQ", "payload": "" } 2023-11-21 04:07:30,135:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612422406 HTTP/1.1" 200 801 2023-11-21 04:07:30,136:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:07:29 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiiH_iDxUVusKcVM8kp6h3l1-KVBi7YQQMoR5Uic2sUm4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:04Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612422406/ky6kcw", "token": "-IL9_EB3uvFRDRErY0ET1SQxqNaHG_FMeRx1kbAjZLg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612422406/weBWyw", "token": "-IL9_EB3uvFRDRErY0ET1SQxqNaHG_FMeRx1kbAjZLg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612422406/I55gjQ", "token": "-IL9_EB3uvFRDRErY0ET1SQxqNaHG_FMeRx1kbAjZLg" } ] } 2023-11-21 04:07:30,137:DEBUG:acme.client:Storing nonce: v0bMowfiiH_iDxUVusKcVM8kp6h3l1-KVBi7YQQMoR5Uic2sUm4 2023-11-21 04:07:30,138:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-21 04:07:30,139:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2023-11-21 04:07:30,140:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-21 04:07:30,140:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-21 04:07:30,142:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-21 04:07:30,142:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-21 04:07:30,142:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-21 04:07:30,142:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-21 04:07:30,143:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-21 04:07:30,191:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-21 04:07:30,490:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-21 04:07:30,491:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-21 04:07:30,492:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-21 04:07:30,501:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:14 UTC. 2023-11-21 04:07:30,501:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-21 04:07:30,502:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-21 04:07:30,506:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-21 04:07:30,506:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-21 04:07:30,506:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-21 04:07:30,511:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-21 04:07:30,512:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-21 04:07:30,514:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-21 04:07:31,057:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-21 04:07:31,058:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:07:30 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "YJNabxFD-pc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-21 04:07:31,059:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-21 04:07:34,748:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6951_key-certbot.pem 2023-11-21 04:07:38,206:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6949_csr-certbot.pem 2023-11-21 04:07:38,207:DEBUG:acme.client:Requesting fresh nonce 2023-11-21 04:07:38,207:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-21 04:07:38,388:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-21 04:07:38,388:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:07:37 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnpeSBMf05h3_nL7CrUwPs0l-pQHKEHy2ZgRqwQ2vED24 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-21 04:07:38,388:DEBUG:acme.client:Storing nonce: jXyutbsnpeSBMf05h3_nL7CrUwPs0l-pQHKEHy2ZgRqwQ2vED24 2023-11-21 04:07:38,389:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2023-11-21 04:07:38,394:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25wZVNCTWYwNWgzX25MN0NyVXdQczBsLXBRSEtFSHkyWmdScXdRMnZFRDI0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "KLAA9siTcItrbFyER-BOTFchwm9j1tKyvK2UlFBJvlox0w5J-c8dxVinUG0L9hmIN5n43zaWKHGVmqosklEunOy8Z2qhMXDDL0miPkztUcfUGi3KJCCR_I6mv_bXnBHzHJci2d6XtwQ-6pojnWq-ILufnEgys3xp8o4uJGd2Wqc6Y8KAWVT_YZjSMymA1HMcWteWNDRVvKuXOdj1fAi3kivJpbIniAcvtCUxqxoEYe_qM97wU3xzMk04BgKPYa7PnOqlEF5AvHrglkFH26Hwg5oPRGKFakE6W1e_hPER2XstntsbIgDphNdBIflsL9OXbtbNg8ijO5FEeAagTOGr6w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-21 04:07:38,592:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-21 04:07:38,594:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 21 Nov 2023 03:07:37 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054455886 Replay-Nonce: jXyutbsnOQ6JXPF6nku9ka3ca78eIbOavB79Kzc0CBhPbZVMUYI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:13Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612463596" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054455886" } 2023-11-21 04:07:38,594:DEBUG:acme.client:Storing nonce: jXyutbsnOQ6JXPF6nku9ka3ca78eIbOavB79Kzc0CBhPbZVMUYI 2023-11-21 04:07:38,595:DEBUG:acme.client:JWS payload: b'' 2023-11-21 04:07:38,604:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612463596: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25PUTZKWFBGNm5rdTlrYTNjYTc4ZUliT2F2Qjc5S3pjMENCaFBiWlZNVVlJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI0NjM1OTYifQ", "signature": "EoDfZzSA0kPiIjV-GweUveEYPfnwUk2j9SlsH2hd2AbJ8cyjd397d7pTx9ERC-K0kGY3R3pHlhPD4kkEInGM2cGnKp6Pfy23fUZ5NuX4CMT2sj5nEtaHOFZ_UkDDv_9hU0EBcMwqgsR2ooR9a3uApp95QeO2iQUbK4sRMPC9ymaTBknLlQe7FZFiU4kDmCRaaLVomMy3aY4rAW7LE3k5RSjatbqo8q4zRcsxaFfIAXhE-3mPJjiMyh8vQPXVzFIiPoZQ9ZtcsrK3ImCAeq23V8zTVwFlVYCKbD1Nh8xziC5hwFwkUTPN94zUH7J2K4RINUTt1ovO2bRuArVFYd66LQ", "payload": "" } 2023-11-21 04:07:38,791:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612463596 HTTP/1.1" 200 805 2023-11-21 04:07:38,792:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:07:37 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQj315qs5WP1u7MESgG3Dh_ZbO_x6Hd6_BEuS-wdKWvQO0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:13Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612463596/6wvlBA", "token": "urpYTB_ISPnX0ZBqpybU40fCrJsoHs7T5gniMi-FKAI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612463596/WBsXnQ", "token": "urpYTB_ISPnX0ZBqpybU40fCrJsoHs7T5gniMi-FKAI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612463596/cdtfow", "token": "urpYTB_ISPnX0ZBqpybU40fCrJsoHs7T5gniMi-FKAI" } ] } 2023-11-21 04:07:38,792:DEBUG:acme.client:Storing nonce: SFMYLIQj315qs5WP1u7MESgG3Dh_ZbO_x6Hd6_BEuS-wdKWvQO0 2023-11-21 04:07:38,793:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-21 04:07:38,793:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2023-11-21 04:07:38,794:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-21 04:07:38,794:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-21 04:07:38,795:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-21 04:07:38,795:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-21 04:07:38,795:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-21 04:07:38,796:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-21 04:07:38,797:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-21 04:07:38,839:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-21 04:07:39,069:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-21 04:07:39,070:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-21 04:07:39,071:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-21 04:07:39,075:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:27 UTC. 2023-11-21 04:07:39,075:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-21 04:07:39,076:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-21 04:07:39,080:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-21 04:07:39,080:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-21 04:07:39,080:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-21 04:07:39,086:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-21 04:07:39,087:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-21 04:07:39,089:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-21 04:07:39,543:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-21 04:07:39,544:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:07:38 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "DJ7O7o2uZso": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-21 04:07:39,545:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-21 04:07:43,541:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6952_key-certbot.pem 2023-11-21 04:07:47,083:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6950_csr-certbot.pem 2023-11-21 04:07:47,084:DEBUG:acme.client:Requesting fresh nonce 2023-11-21 04:07:47,084:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-21 04:07:47,235:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-21 04:07:47,237:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:07:46 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiDiMZvPsCOGtd8L2OGmXWHqX19f7hswtCXxZLU44FK3I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-21 04:07:47,237:DEBUG:acme.client:Storing nonce: v0bMowfiDiMZvPsCOGtd8L2OGmXWHqX19f7hswtCXxZLU44FK3I 2023-11-21 04:07:47,238:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2023-11-21 04:07:47,246:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlEaU1adlBzQ09HdGQ4TDJPR21YV0hxWDE5Zjdoc3d0Q1h4WkxVNDRGSzNJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Igvcdd1OhN-qJfFnP_V0QlCWFu8O29FVRLmW4_5MPXnMJNz0vo8yj9hGx7RtPmbh-1j52xwo--iUeDSFJ64BaEhazjsVvE-JePHBZMGaL1NrOJW9NBmG205sg6Tez6pqam-ZAX2x2I_kCPoIh2nPWFacWCwz35ot4OVU-yBxh5IFd3iqeU1Jj6rBd3y_-u-myuv-ZpsOGCEwdCtRTK_aQkBj-FcXCBG1ke-nNoQfAfmXHaX4nn3liqwxEO9ixkVfGdIgaSNfA9pZuCFJZRCEdSk2HqD9XPTV-s50Q3QulIK3YpCv_iZxYWAJqNabg1NsIDtGm7WxRjFR1myC7kIrmw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-21 04:07:47,427:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2023-11-21 04:07:47,428:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 21 Nov 2023 03:07:46 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054483926 Replay-Nonce: nbWKegf8LjZYOj8r0OoLczRPQQ6ZMltYrFznXUzzRIiZh8vCBDo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:23Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612503666" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054483926" } 2023-11-21 04:07:47,429:DEBUG:acme.client:Storing nonce: nbWKegf8LjZYOj8r0OoLczRPQQ6ZMltYrFznXUzzRIiZh8vCBDo 2023-11-21 04:07:47,430:DEBUG:acme.client:JWS payload: b'' 2023-11-21 04:07:47,440:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612503666: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhMalpZT2o4cjBPb0xjelJQUVE2Wk1sdFlyRnpuWFV6elJJaVpoOHZDQkRvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI1MDM2NjYifQ", "signature": "o_gpZz55KfKlTrc0BsHJJdPaWVhdEuC825dis7FRZGyY6FgDwhSHQD55Vmv1vXlTcXe7Q82DH9ebcPpvUb1gsKMQhRQXvHZjRYXoqVTWGpDpHFBKLJGal6Q8gqCxS-u6dU5o4uAcbT40e1Ga1NGuvzHIY0uWbal_HlqewSyWUHQrUQW_CkpLUtPFq_dgfcbMXNjc7P6ZZmhElK7hm7DIhSQGZGvGnGDFFiszn3QKoiiFLPx4QoJbn2eZrZegeL9YhzTV8ls2zfV9q9BVS0bh1L0rCjVQMQsykc7YHsI-hceWsJLvjnymD7VRCOrzxlwE-TwYL8qWUJjsD8HTYQjdTQ", "payload": "" } 2023-11-21 04:07:47,599:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612503666 HTTP/1.1" 200 809 2023-11-21 04:07:47,601:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:07:46 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8FsBUFclsjg4x2kEvxFU0WiO83d70ymbUSQzq4BPPvRo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:23Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612503666/EfdATg", "token": "t3ldTTjSTD5p1ZXdigrc7Y9ujwScKzlEFH7-_2FHjZc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612503666/HlUCsw", "token": "t3ldTTjSTD5p1ZXdigrc7Y9ujwScKzlEFH7-_2FHjZc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612503666/hGYrLw", "token": "t3ldTTjSTD5p1ZXdigrc7Y9ujwScKzlEFH7-_2FHjZc" } ] } 2023-11-21 04:07:47,601:DEBUG:acme.client:Storing nonce: nbWKegf8FsBUFclsjg4x2kEvxFU0WiO83d70ymbUSQzq4BPPvRo 2023-11-21 04:07:47,603:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-21 04:07:47,603:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2023-11-21 04:07:47,604:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-21 04:07:47,604:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-21 04:07:47,605:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-21 04:07:47,605:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-21 04:07:47,605:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-21 04:07:47,606:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-21 04:07:47,608:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-21 04:07:47,655:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-21 04:07:48,114:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-21 04:07:48,117:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-21 04:07:48,118:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-21 04:07:48,123:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:41 UTC. 2023-11-21 04:07:48,123:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-21 04:07:48,123:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-21 04:07:48,128:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-21 04:07:48,128:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-21 04:07:48,128:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-21 04:07:48,134:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-21 04:07:48,135:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-21 04:07:48,136:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-21 04:07:48,669:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-21 04:07:48,670:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:07:47 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "z7g6kp_yDCI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2023-11-21 04:07:48,671:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-21 04:07:52,781:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6953_key-certbot.pem 2023-11-21 04:07:56,235:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6951_csr-certbot.pem 2023-11-21 04:07:56,236:DEBUG:acme.client:Requesting fresh nonce 2023-11-21 04:07:56,236:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-21 04:07:56,413:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-21 04:07:56,414:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:07:55 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQj3dBrODym6TNSu5LXu3qKpSrwe-Ul4CtmNisr7A9z8fM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-21 04:07:56,415:DEBUG:acme.client:Storing nonce: SFMYLIQj3dBrODym6TNSu5LXu3qKpSrwe-Ul4CtmNisr7A9z8fM 2023-11-21 04:07:56,415:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2023-11-21 04:07:56,425:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWozZEJyT0R5bTZUTlN1NUxYdTNxS3BTcndlLVVsNEN0bU5pc3I3QTl6OGZNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Uog3HlSBHiitlqAL7kUknp7RKP5ulj6J9WAV8k0C1MM3keQ20gqwDlty2o2B56wD0my2_XKyh4mpjBB6qwjKxqP8WKxS4aoInJdjGfsDwIVI--Mz2lhBaOLw7635L2d_ZRqPVzsQhgr_jQZ4RfY8_sZN1m5YNiquPBv1m_U62D9CbJsR23sVqtKqHGvgtOa3J_bW2QQKc-3JVkcWbBZbZpsnNGNL8_bbVMahq0xglE_U73SJyEfBx71YGaid9PyrF5cWORTvRU03CPswkq3HXAuP-pqZuVife9mOOBiVcm8TtFvhUy8_9Pn1CUvv3Smv5njeGhAFh5qxlfSEahrmGA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-21 04:07:56,616:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2023-11-21 04:07:56,617:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 21 Nov 2023 03:07:55 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054508996 Replay-Nonce: jXyutbsnwzgzlDCFd7DfDbq_cT7ChQg1z-HonvnjTmPTEJrk4qI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:32Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612537686" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054508996" } 2023-11-21 04:07:56,617:DEBUG:acme.client:Storing nonce: jXyutbsnwzgzlDCFd7DfDbq_cT7ChQg1z-HonvnjTmPTEJrk4qI 2023-11-21 04:07:56,617:DEBUG:acme.client:JWS payload: b'' 2023-11-21 04:07:56,623:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612537686: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic253emd6bERDRmQ3RGZEYnFfY1Q3Q2hRZzF6LUhvbnZualRtUFRFSnJrNHFJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI1Mzc2ODYifQ", "signature": "YPsI0Im9P7GjiQPKulNTPYUbu8DiK-yEKv9gyz91RaWw-0Hk0kqAslLnfvdgKf9pH6Ya-rGPfvbUwVelOh8pgyTzDiJKNmTWFuCpBM0ZSoUBHQTHYYm6z_K0pEHSHL47aqQBEHBq9AoWSyCwTmHCi1Ps6fZ2qdLP0lmZS9Zt4NNpnPoOETwRlJ4IPufKBRn9yYfr1_Top8JWr0j6K5pQG48xupjxxpgFrxrfn8-WSyVERhac-rEknytasVBTIMk9bwo_27Jw3frpGrK1GdDGwXjwUJdUZz999Cp_5oqs2PgVT5IHh-ZLLBm32OXSUCcx70px8S-fGnJYxP315zyYSQ", "payload": "" } 2023-11-21 04:07:56,806:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612537686 HTTP/1.1" 200 806 2023-11-21 04:07:56,807:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:07:55 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQj3AbJ5oUz1P7BE7pmbRyyRTQkZKfmBzwHtdMFvnuXvBg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:32Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612537686/EQ01mA", "token": "Ljm0jeSPr8yxmsFdnztDCFHUg_abiozhTXTTTEUuJuY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612537686/E16lcw", "token": "Ljm0jeSPr8yxmsFdnztDCFHUg_abiozhTXTTTEUuJuY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612537686/vtzF_w", "token": "Ljm0jeSPr8yxmsFdnztDCFHUg_abiozhTXTTTEUuJuY" } ] } 2023-11-21 04:07:56,807:DEBUG:acme.client:Storing nonce: SFMYLIQj3AbJ5oUz1P7BE7pmbRyyRTQkZKfmBzwHtdMFvnuXvBg 2023-11-21 04:07:56,808:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-21 04:07:56,808:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2023-11-21 04:07:56,809:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-21 04:07:56,809:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-21 04:07:56,810:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-21 04:07:56,810:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-21 04:07:56,810:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-21 04:07:56,811:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-21 04:07:56,812:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-21 04:07:56,857:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2023-11-21 04:07:56,857:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-21 04:07:56,857:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2023-11-21 04:07:56,865:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2023-11-21 04:07:56,868:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2023-11-21 04:07:56,868:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2023-11-21 04:07:56,868:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2023-11-21 04:07:56,869:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2023-11-21 04:07:56,871:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2023-11-21 04:07:56,907:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-21 04:07:57,137:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-21 04:07:57,139:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-21 04:07:57,139:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-21 04:07:57,144:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:56 UTC. 2023-11-21 04:07:57,144:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-21 04:07:57,144:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-21 04:07:57,149:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-21 04:07:57,149:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-21 04:07:57,149:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-21 04:07:57,153:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-21 04:07:57,153:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-21 04:07:57,155:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-21 04:07:57,608:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-21 04:07:57,609:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:07:56 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "gc137dfPT-A": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-21 04:07:57,610:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-21 04:08:01,231:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6954_key-certbot.pem 2023-11-21 04:08:04,589:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6952_csr-certbot.pem 2023-11-21 04:08:04,589:DEBUG:acme.client:Requesting fresh nonce 2023-11-21 04:08:04,589:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-21 04:08:04,740:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-21 04:08:04,741:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:08:03 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf86W6ROBQdM9v4trvFvGfOLQYDkueLbQemFVGwRX2WhJc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-21 04:08:04,742:DEBUG:acme.client:Storing nonce: nbWKegf86W6ROBQdM9v4trvFvGfOLQYDkueLbQemFVGwRX2WhJc 2023-11-21 04:08:04,742:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2023-11-21 04:08:04,750:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjg2VzZST0JRZE05djR0cnZGdkdmT0xRWURrdWVMYlFlbUZWR3dSWDJXaEpjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "nh5Trq1oHnUPtb9n5OpkIsMygP32J8F5MtMMmybHKBtc7KGF8yLPgG2BzWHQ8dx9kF6jIXJbgVeRewtYsKXZkcbn8T4UFaAW3LzasibKTHtD8sJHV3rK54iaYWgz99Da5C40spdIOtQSHjz8PuegdZEE49N3NhZ4-ShfYcIlcJmwmTJdRf4oNi3-q4KqVkCGXViwEViuLwYOPZKMq4B3jP8SIB5DWDI8OoN5wHCCNOirwHQ62esMxcscscSErOCv54juM6wxOMVg0ec7Ace2Gz0GZ61J-xlEgDA1HzKezuaZsj3YI4yMJuBEPP26I_p6ZZ-YIv33D7ns9q66goZldQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-21 04:08:04,962:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2023-11-21 04:08:04,963:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 21 Nov 2023 03:08:04 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054534246 Replay-Nonce: v0bMowfixbrUwq9Ep8rwGnJgBF_WR2ADEbuPNIdsvhPsfqyFTI4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:42Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612574526" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054534246" } 2023-11-21 04:08:04,964:DEBUG:acme.client:Storing nonce: v0bMowfixbrUwq9Ep8rwGnJgBF_WR2ADEbuPNIdsvhPsfqyFTI4 2023-11-21 04:08:04,964:DEBUG:acme.client:JWS payload: b'' 2023-11-21 04:08:04,974:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612574526: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93Zml4YnJVd3E5RXA4cndHbkpnQkZfV1IyQURFYnVQTklkc3ZoUHNmcXlGVEk0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI1NzQ1MjYifQ", "signature": "JcfxtoZtlaJpmRs0Qq9lQLK2XjGGeXrtOKwseTUAHDdQuVW1p3XsI05IgeSSidVqVCew28DV7FmNE3oEuDOdRTEWJ-uELawxEYFvh1Ur9VPrKXkjhxJnfnHvs0P0YoyW68fo0lzHNlFzftlwrnZIrSdcaPLer1tqMzsVFKEDzXutJEy0HmKTzKLhqE9rO3-ufA3UNkC9qS08ys3B_W4pzfhYMuDU6qdCw_yX8-InFPg6FNt9cQfm3eC20wu4IUqT5ZUIyPoBLhK9QxxHlgg0aFtATia763rZ_vaa_iIS07UkQrC3w9-nmGN-mH3vBxHkysS9tP-YkH7Smms5TQHq5A", "payload": "" } 2023-11-21 04:08:05,153:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612574526 HTTP/1.1" 200 811 2023-11-21 04:08:05,154:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:08:04 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8a_JmuO3xFpOgjFuous_oRteuC4vlNdTsXLC38Ye6fhE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:42Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612574526/5letZQ", "token": "BHBPORVyrUrsGlhEnIrTc6lFdf8IW61JSn4cYnoDYfc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612574526/8PjU2A", "token": "BHBPORVyrUrsGlhEnIrTc6lFdf8IW61JSn4cYnoDYfc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612574526/O6CYAw", "token": "BHBPORVyrUrsGlhEnIrTc6lFdf8IW61JSn4cYnoDYfc" } ] } 2023-11-21 04:08:05,154:DEBUG:acme.client:Storing nonce: nbWKegf8a_JmuO3xFpOgjFuous_oRteuC4vlNdTsXLC38Ye6fhE 2023-11-21 04:08:05,155:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-21 04:08:05,155:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2023-11-21 04:08:05,155:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-21 04:08:05,156:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-21 04:08:05,157:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-21 04:08:05,157:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-21 04:08:05,157:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-21 04:08:05,157:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-21 04:08:05,159:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-21 04:08:05,206:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-21 04:08:05,653:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-21 04:08:05,654:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-21 04:08:05,655:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-21 04:08:05,659:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:09 UTC. 2023-11-21 04:08:05,659:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-21 04:08:05,660:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-21 04:08:05,664:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-21 04:08:05,665:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-21 04:08:05,665:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-21 04:08:05,669:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-21 04:08:05,670:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-21 04:08:05,672:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-21 04:08:06,204:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-21 04:08:06,205:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:08:05 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "_XFsEQ2ssBc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-21 04:08:06,205:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-21 04:08:10,139:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6955_key-certbot.pem 2023-11-21 04:08:13,507:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6953_csr-certbot.pem 2023-11-21 04:08:13,507:DEBUG:acme.client:Requesting fresh nonce 2023-11-21 04:08:13,508:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-21 04:08:13,685:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-21 04:08:13,686:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:08:12 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnkTMu9D2p3ezItv9ZUwBKcSGDzfQDcgLXWg4TqxetCx4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-21 04:08:13,686:DEBUG:acme.client:Storing nonce: jXyutbsnkTMu9D2p3ezItv9ZUwBKcSGDzfQDcgLXWg4TqxetCx4 2023-11-21 04:08:13,687:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2023-11-21 04:08:13,703:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25rVE11OUQycDNlekl0djlaVXdCS2NTR0R6ZlFEY2dMWFdnNFRxeGV0Q3g0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "AsZFS8c0-fmNsBkzfW2AY97JiLAtakrPdwyBRSTUcDk3DZSAfZfbUCtyt2M_yI5OHBLipTAZ1YPYkrSfuirxzlKy-ns0ikugQ_T59uxl6CfImX40LKtq1cO9OFRXa4W2gjb9fYPCjPYQQVaKAU1eMHwkW1NI08HJxhI4HA_-VFpxfN9ywsXrXPBiCrBPwcZuXuQjIdu-w4hT0dDo2Qn6tYO4YBYBTeHqCnhM842E8E-V1eaVoHk7Ac-cvd8yXggO4lj_QF-tRsR1JgYiy9Swoagi8ejx6JvevshKq-lnCo3bzobbDZXei3fWvL35GrzgNEy_-BHuiNFKqJaCZuU2QA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-21 04:08:13,913:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2023-11-21 04:08:13,913:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 21 Nov 2023 03:08:13 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054557496 Replay-Nonce: SFMYLIQjRZqE-iY00SEd838N8MfLG2pQB4TqpJX1LvgGuUzn9dM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:51Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612606006" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054557496" } 2023-11-21 04:08:13,913:DEBUG:acme.client:Storing nonce: SFMYLIQjRZqE-iY00SEd838N8MfLG2pQB4TqpJX1LvgGuUzn9dM 2023-11-21 04:08:13,913:DEBUG:acme.client:JWS payload: b'' 2023-11-21 04:08:13,921:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612606006: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpSWnFFLWlZMDBTRWQ4MzhOOE1mTEcycFFCNFRxcEpYMUx2Z0d1VXpuOWRNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI2MDYwMDYifQ", "signature": "TCDCf1ez6LDMULK6_v2odmcDHSFlFr-CiPPYUhCBc1StSxOYGaEVstCG12L0A-Xabmkp4OFuttvY5dnL_H3JP1NJWHTUsl8TZ9GJkY8SgIGsrHrfokc7WbxOEI3W-HJj5RKpfjWC27WAxqrO0iU_lPJg1HESEQiVKpewMKx-sPDSqwWyx6aQaZjoCicfuKEVBoadFdLgzSkBCluoQ3zUoKBoOVOysDcTl4sRmxq5IX_P4ZFXD1FUPsOY7a78OZop3lkesw2MBKF3b2FOzC48c72o-04CKuc2veIRscdatjx1ZG_H4HSaz9eoaEM6dKAMEWwRsjkJkLaW73HJAsFDHg", "payload": "" } 2023-11-21 04:08:14,106:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612606006 HTTP/1.1" 200 810 2023-11-21 04:08:14,107:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:08:13 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnv7kGQZG_lwVxKdQaEb7Y28LXkQA3GfCfZg4F5VqnUs0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:51Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612606006/8R9vlA", "token": "srB66M3oeWbzzvIHjdwngsK6CxnDqV_EXeQJth9kWQ4" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612606006/fgtMqQ", "token": "srB66M3oeWbzzvIHjdwngsK6CxnDqV_EXeQJth9kWQ4" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612606006/kOODDA", "token": "srB66M3oeWbzzvIHjdwngsK6CxnDqV_EXeQJth9kWQ4" } ] } 2023-11-21 04:08:14,108:DEBUG:acme.client:Storing nonce: jXyutbsnv7kGQZG_lwVxKdQaEb7Y28LXkQA3GfCfZg4F5VqnUs0 2023-11-21 04:08:14,108:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-21 04:08:14,109:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2023-11-21 04:08:14,109:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-21 04:08:14,109:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-21 04:08:14,110:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-21 04:08:14,110:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-21 04:08:14,110:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-21 04:08:14,111:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-21 04:08:14,112:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-21 04:08:14,147:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-21 04:08:14,380:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-21 04:08:14,383:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2023-11-21 04:08:14,384:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2023-11-21 04:08:14,392:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:22 UTC. 2023-11-21 04:08:14,392:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-21 04:08:14,393:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-21 04:08:14,397:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-21 04:08:14,397:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-21 04:08:14,398:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-21 04:08:14,407:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-21 04:08:14,408:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-21 04:08:14,410:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-21 04:08:14,943:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-21 04:08:14,944:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:08:14 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "6z2dzUeAO7g": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-21 04:08:14,945:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-21 04:08:18,567:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6956_key-certbot.pem 2023-11-21 04:08:22,004:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6954_csr-certbot.pem 2023-11-21 04:08:22,004:DEBUG:acme.client:Requesting fresh nonce 2023-11-21 04:08:22,004:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-21 04:08:22,006:DEBUG:urllib3.connectionpool:Resetting dropped connection: acme-v02.api.letsencrypt.org 2023-11-21 04:08:22,623:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-21 04:08:22,624:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:08:21 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8yaYxTbcT-NdU1Y7s5aVJPxvcDUG1eXJlz72PhYsIgjg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-21 04:08:22,624:DEBUG:acme.client:Storing nonce: nbWKegf8yaYxTbcT-NdU1Y7s5aVJPxvcDUG1eXJlz72PhYsIgjg 2023-11-21 04:08:22,625:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2023-11-21 04:08:22,630:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjh5YVl4VGJjVC1OZFUxWTdzNWFWSlB4dmNEVUcxZVhKbHo3MlBoWXNJZ2pnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "g1CbPj56-B1ng9d4-3Ny0WDQQrBJmIj_rmWVHBNV_1JCX41rJAswiiFQ-MOXPmEg_A_r5ZdvXCqDqTkB1eTqe_IJZvXL0LwR1s5_gMRgc0ORsy3XGMI0ZMNg5ttVmxS-0whj0aUZW7vgxaaBHDcMv0BFGhGSEWmckKQKwnYgOcicS_hf8jvgKCthyJbID9IGqy8m6jIDYvtSOdQLJQWqytUyLnjD5ehJgp75eengeqOIoZSfVGqr77uSjrb6Tcq0kUTvEY4K7e6PAo2uAfaPcW6tqhRPzdmVEF3AiSQKOBMdQ__CP09SZkoD0HIzuiSiWdn0t2oh1XhgRu3v0tbFaA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-21 04:08:22,850:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2023-11-21 04:08:22,851:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 21 Nov 2023 03:08:22 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054581526 Replay-Nonce: nbWKegf87PUzZ6Mcg01TpI0gAqijZe0NNwdgSDfP3ksLyprUCaY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:42:01Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612638726" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054581526" } 2023-11-21 04:08:22,852:DEBUG:acme.client:Storing nonce: nbWKegf87PUzZ6Mcg01TpI0gAqijZe0NNwdgSDfP3ksLyprUCaY 2023-11-21 04:08:22,852:DEBUG:acme.client:JWS payload: b'' 2023-11-21 04:08:22,866:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612638726: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjg3UFV6WjZNY2cwMVRwSTBnQXFpalplME5Od2RnU0RmUDNrc0x5cHJVQ2FZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI2Mzg3MjYifQ", "signature": "Vog2yF-jUDUtRZJYBfhUNw_3Rc6az5mgN4N5HZ7yaDsJljYBCM9ARUWoiaeMN7b-0oV_K4zfAqyaiJWHFfqn4zJtg5dHx4FHuwTveIgSPbbTsQD2tGPGSchTbhJ6xPWhLodSE5s5gDYLpzsg8nVkMSbEUDuTYSthWgaE5QfENRb5IP5vX84EtqQ-gceQa5V3tGh80ufpTkPwfsdrAQ8Eg40s3D9SZXtzHLzzUoAimwXlMw2kut-l-qRFk9oEYDyivUnrtTIqaYS1SqC_y0okJ3NVt-MEDi39NgHNzExpwY5a35uQdNbdTgNRRL6e6Wu4e0vvjK_fLqknek5wrLfQMw", "payload": "" } 2023-11-21 04:08:23,053:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612638726 HTTP/1.1" 200 809 2023-11-21 04:08:23,055:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:08:22 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiRq_0nAtugq5T0p_5jUdJKcaYp9SzLBz-QEqSb0HSG7s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:42:01Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612638726/NNBnvg", "token": "YtLscuYTUghWYv3C17nxbU_cYAHfqS3iJAb6EzBv31Y" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612638726/Mo2Oxw", "token": "YtLscuYTUghWYv3C17nxbU_cYAHfqS3iJAb6EzBv31Y" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612638726/wNN3rQ", "token": "YtLscuYTUghWYv3C17nxbU_cYAHfqS3iJAb6EzBv31Y" } ] } 2023-11-21 04:08:23,055:DEBUG:acme.client:Storing nonce: v0bMowfiRq_0nAtugq5T0p_5jUdJKcaYp9SzLBz-QEqSb0HSG7s 2023-11-21 04:08:23,057:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-21 04:08:23,057:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2023-11-21 04:08:23,058:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-21 04:08:23,058:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-21 04:08:23,059:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-21 04:08:23,059:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-21 04:08:23,059:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-21 04:08:23,060:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-21 04:08:23,062:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-21 04:08:23,113:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-21 04:08:23,508:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-21 04:08:23,511:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2023-11-21 04:08:23,512:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2023-11-21 04:08:23,516:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:34 UTC. 2023-11-21 04:08:23,516:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-21 04:08:23,516:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-21 04:08:23,521:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-21 04:08:23,521:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-21 04:08:23,521:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-21 04:08:23,537:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-21 04:08:23,537:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-21 04:08:23,539:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-21 04:08:23,982:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-21 04:08:23,982:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:08:23 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "8AJRmbZwM9E": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-21 04:08:23,983:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-21 04:08:27,954:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6957_key-certbot.pem 2023-11-21 04:08:31,340:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6955_csr-certbot.pem 2023-11-21 04:08:31,341:DEBUG:acme.client:Requesting fresh nonce 2023-11-21 04:08:31,341:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-21 04:08:31,486:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-21 04:08:31,487:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:08:30 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfi0x_08MIRFP8ATjd_SG3Tl4PVqMofuT5n2EonF_4KOdk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-21 04:08:31,487:DEBUG:acme.client:Storing nonce: v0bMowfi0x_08MIRFP8ATjd_SG3Tl4PVqMofuT5n2EonF_4KOdk 2023-11-21 04:08:31,488:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2023-11-21 04:08:31,494:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmkweF8wOE1JUkZQOEFUamRfU0czVGw0UFZxTW9mdVQ1bjJFb25GXzRLT2RrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "RHVmvIb_WwVyg5BcJry16DPNNPd-BS7qxiYRfkvdgeHgAP9eFqgcy-gg2gWr43I5vVjoTME32q8EXWgch_0I4zParW8OsQJXg0jm-N65thqL4I0GlfqjiITUO1pXrEmDaObwNwt3sRy9YwUq6tz_YXhAl7iEkiRsnaGskrrmIXtJH8pgqrVB2xPoacKihGXr9VzFDwQTDwOWEeO_ZuJ2Nqf3Q36DMqi78tTRct6sMFF-z5CdgbOw2bqGTPy-ytCC7tWPH2UKSsVtD5NrOxjYDcGj5Ka9lmVAJzeNFmqy3lPE5a7xVhWhlVz4FQ6C75aoTd_tFPKzM3FeKVVw-lUOSw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-21 04:08:31,762:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-21 04:08:31,763:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 21 Nov 2023 03:08:30 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054620886 Replay-Nonce: nbWKegf8_HIx45Pm0lj_nlhFN6X2GdfZc0TQzzcjIluhEv6qT9c X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:42:10Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612689796" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054620886" } 2023-11-21 04:08:31,763:DEBUG:acme.client:Storing nonce: nbWKegf8_HIx45Pm0lj_nlhFN6X2GdfZc0TQzzcjIluhEv6qT9c 2023-11-21 04:08:31,764:DEBUG:acme.client:JWS payload: b'' 2023-11-21 04:08:31,777:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612689796: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhfSEl4NDVQbTBsal9ubGhGTjZYMkdkZlpjMFRRenpjaklsdWhFdjZxVDljIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI2ODk3OTYifQ", "signature": "OsKdjTPu4zhu36FZdx3fEMw2eyPWOdsZGahM55tj6g8f6dkkaI6xADxu_0nghNvkKW8iI_3s5UryAcDFX_OOp16kDH4ukX0QmDpxIeIvMztBICCSRxV7JCe-wcsUsiOjvjhwRe-HhUqHvM_m_kX2zraW_9HGna597GYT1RftIr3a0VjMnoP6LqHwEr5Kag8eXqSnqUAWcYYPVPlpP1L845QrbA6cGWvKdXtK36idwG3hqIGedDL-bRbnM_B2vPyrWlqO239xMGPnSeVdnCBBPsqrdsgBP1TGsRMhNxX-GZ6GNhZOyWnM_J8Oy3yk1MPg_oWq0FUZ5TqnLAHGsNebVw", "payload": "" } 2023-11-21 04:08:31,971:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612689796 HTTP/1.1" 200 805 2023-11-21 04:08:31,973:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:08:31 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8HQcj8JCqibxkSSSxL4gk4tjY7XpDoKvdOUHDw_i5Pq4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:42:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612689796/q81CXQ", "token": "dD3h4qBbL0oo-gEVD5KIIoE28_8_ZHTsPoThE2SmgpA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612689796/RA9KcA", "token": "dD3h4qBbL0oo-gEVD5KIIoE28_8_ZHTsPoThE2SmgpA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612689796/phjqOQ", "token": "dD3h4qBbL0oo-gEVD5KIIoE28_8_ZHTsPoThE2SmgpA" } ] } 2023-11-21 04:08:31,973:DEBUG:acme.client:Storing nonce: nbWKegf8HQcj8JCqibxkSSSxL4gk4tjY7XpDoKvdOUHDw_i5Pq4 2023-11-21 04:08:31,973:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-21 04:08:31,974:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2023-11-21 04:08:31,975:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-21 04:08:31,975:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-21 04:08:31,976:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-21 04:08:31,976:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-21 04:08:31,976:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-21 04:08:31,977:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-21 04:08:31,979:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-21 04:08:32,030:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-21 04:08:32,243:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-21 04:08:32,245:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-21 04:08:32,247:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-21 04:08:32,257:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:48 UTC. 2023-11-21 04:08:32,257:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-21 04:08:32,257:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-21 04:08:32,262:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-21 04:08:32,262:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-21 04:08:32,263:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-21 04:08:32,267:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-21 04:08:32,268:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-21 04:08:32,270:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-21 04:08:32,726:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-21 04:08:32,728:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:08:31 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "9WsHLhocHT4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-21 04:08:32,729:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-21 04:08:36,238:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6958_key-certbot.pem 2023-11-21 04:08:39,605:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6956_csr-certbot.pem 2023-11-21 04:08:39,606:DEBUG:acme.client:Requesting fresh nonce 2023-11-21 04:08:39,606:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-21 04:08:39,758:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-21 04:08:39,760:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:08:38 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8K9mzaJNA3_pd3BBgKF9pdyaHS24u0_e4YIgLUsxVwmE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-21 04:08:39,760:DEBUG:acme.client:Storing nonce: nbWKegf8K9mzaJNA3_pd3BBgKF9pdyaHS24u0_e4YIgLUsxVwmE 2023-11-21 04:08:39,761:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2023-11-21 04:08:39,774:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhLOW16YUpOQTNfcGQzQkJnS0Y5cGR5YUhTMjR1MF9lNFlJZ0xVc3hWd21FIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ZfCpz2iTXzUR6X9wqrCja9GPEn7aogtKvz6GeTgPJtbiQJEL2G89IpcrHd55k4dweM3tXUe4GO2O0BZVG02S6IYw03e8D2UW7m5PyPpD-tAD_5rHtzO_Au-jiAs1H-juMJGCLEF2KtqFQ-1U7UL56XfMhK3r-MiUJ5YIsBBPknVVqD9LtrkmqPQ8LGaBbkMjm6eBXFXC8_83r8yjcpJOtudBVsx-jRL6cI2SPrqCdd5-lkxcrnhNb0sNhh97E1rKmssDKYsbogZot4GcrdxGcC5Ytt8Ldy8iY9UtCIO8WnYviDIyNFA1QPdEQJEAoCPExWTGIh75jtbzBhizrdcoiw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-21 04:08:39,967:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-21 04:08:39,968:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 21 Nov 2023 03:08:39 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054650586 Replay-Nonce: v0bMowfi9-NJQAqNpsQ6ig3eNPusoTXKKDhbHGkmAAzSgpV1hpo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:42:20Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612731716" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054650586" } 2023-11-21 04:08:39,969:DEBUG:acme.client:Storing nonce: v0bMowfi9-NJQAqNpsQ6ig3eNPusoTXKKDhbHGkmAAzSgpV1hpo 2023-11-21 04:08:39,969:DEBUG:acme.client:JWS payload: b'' 2023-11-21 04:08:39,982:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612731716: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93Zmk5LU5KUUFxTnBzUTZpZzNlTlB1c29UWEtLRGhiSEdrbUFBelNncFYxaHBvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI3MzE3MTYifQ", "signature": "huLwVrNkgGKdvG7AMIRai1_CSq_t-phWFsHJVpZ9_cC5r8zPqyNazVFW39ncQR8TDlB5uHgHuzeyjLagzMJAxI5NzLkVW1fy3_Rp_8X3M6w6zg8KQv0qzxedg3SJ-x5USe9a1O5I9w1EkGVJl8UXNtmtH3JL4RIQu35x2gaoi71RH53BuP3nvK8GVAYszlkFUdtTmJwGoF-t_ZUWTSs5z-04E7CvTZK2bqP4poLk4f7yAnxexoqyd5T38PV62fRZ9lF-Iic-EtIZT2aC8h0do9e6zR2xmK4xEZk-ldAeD5LpW_ITAbTqfpiLW-z65rT_eKgmJR_2Ldr455hkyqy6UA", "payload": "" } 2023-11-21 04:08:40,139:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612731716 HTTP/1.1" 200 805 2023-11-21 04:08:40,140:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:08:39 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8HFmUyLesWb6FjjxdvggRpf3mmJ_mF77mCIlt3bGhAug X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:42:20Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612731716/vs9hIA", "token": "6C6a5wxSVRoWYNwzinMlWR0pwxBViZEyUzdFtpz8okw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612731716/C3Z5fA", "token": "6C6a5wxSVRoWYNwzinMlWR0pwxBViZEyUzdFtpz8okw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612731716/Qu4skQ", "token": "6C6a5wxSVRoWYNwzinMlWR0pwxBViZEyUzdFtpz8okw" } ] } 2023-11-21 04:08:40,141:DEBUG:acme.client:Storing nonce: nbWKegf8HFmUyLesWb6FjjxdvggRpf3mmJ_mF77mCIlt3bGhAug 2023-11-21 04:08:40,142:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-21 04:08:40,143:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2023-11-21 04:08:40,143:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-21 04:08:40,143:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-21 04:08:40,144:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-21 04:08:40,144:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-21 04:08:40,144:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-21 04:08:40,145:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-21 04:08:40,146:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-21 04:08:40,195:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-21 04:08:40,629:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-21 04:08:40,631:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-21 04:08:40,633:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-21 04:08:40,641:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:31:01 UTC. 2023-11-21 04:08:40,641:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-21 04:08:40,642:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-21 04:08:40,646:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-21 04:08:40,646:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-21 04:08:40,647:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-21 04:08:40,651:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-21 04:08:40,652:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-21 04:08:40,654:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-21 04:08:41,185:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-21 04:08:41,186:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:08:40 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "lnkvJf91dO0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-21 04:08:41,187:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-21 04:08:45,212:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6959_key-certbot.pem 2023-11-21 04:08:48,636:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6957_csr-certbot.pem 2023-11-21 04:08:48,636:DEBUG:acme.client:Requesting fresh nonce 2023-11-21 04:08:48,636:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-21 04:08:48,814:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-21 04:08:48,815:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:08:48 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnIbeukQxJ41pz3RmfSbQuhP0Z2V_2B7Y4Jt3Zt4CVXo4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-21 04:08:48,815:DEBUG:acme.client:Storing nonce: jXyutbsnIbeukQxJ41pz3RmfSbQuhP0Z2V_2B7Y4Jt3Zt4CVXo4 2023-11-21 04:08:48,815:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2023-11-21 04:08:48,822:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25JYmV1a1F4SjQxcHozUm1mU2JRdWhQMFoyVl8yQjdZNEp0M1p0NENWWG80IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "gShuqcz_gT0PjbkizoT0SLuOmXOccOPtSYnGa6FvEKNb8Zs2eXJWKm6BetGO53az-OGDUMwK02Jm9bl22fhzpLRko0OsrtmpsdfHksOC60tSAuN2IeF7aHqbIrqHwrd3WeLTLa9Siksnm-2p7hRVwDxosSk1kZVUAHtwTk0Xg_p38d8F1npFlMOJ3ds0Y0KYse97XzRq196n1jaW6tjCkQFN1VTLmCmo1IGQWErzMprPvNL63nauG8IkTSvGruf_Q6nB6J-OGI6DL7UNemE1ugh10Qd7ej-KJPsY-d3CmYFU0F5En1422cYe8mpmHjGMC_pzeVPYUFDT4rFvgF-Z3Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-21 04:08:49,027:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-21 04:08:49,028:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Tue, 21 Nov 2023 03:08:48 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054677986 Replay-Nonce: jXyutbsnVy1CvdN_DMtWnqGgZTAjRg_HlN7HRWvBbYDliFmbZyg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:42:29Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612771016" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054677986" } 2023-11-21 04:08:49,028:DEBUG:acme.client:Storing nonce: jXyutbsnVy1CvdN_DMtWnqGgZTAjRg_HlN7HRWvBbYDliFmbZyg 2023-11-21 04:08:49,029:DEBUG:acme.client:JWS payload: b'' 2023-11-21 04:08:49,034:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612771016: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25WeTFDdmROX0RNdFducUdnWlRBalJnX0hsTjdIUld2QmJZRGxpRm1iWnlnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI3NzEwMTYifQ", "signature": "pGD-DKfzql0YM8Gd3qS-edtXqw9_Gpex48nTXU_IchwxuXAoCY12OeZWHH4obIzUbSKTAncWu7WC_tf_MKxUSI0OzT2NToBvnPjEea5UvAK6aO-_lDTPFLx5w50ii8BVzHYvqAU2TzmhfQLM2ijZfSt3iPdphpL_b0s1JzUZR7i_ykmhEujXw4eVHBYlp0C6ADAMJ7jTTQjOuSJ6lqpI4GUrasZD6PmR3Mq4Guq6170Cun3if8nBaNmoiPVbm8gh4qebqzf6kGjzPD3ZVUOwiLIMHv_6FPHvCoiNt2tO_yjJ7BFsoky5yj0yY0wZznnE-tFQ_vRJyQbdo4ZSDsdM9w", "payload": "" } 2023-11-21 04:08:49,216:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612771016 HTTP/1.1" 200 805 2023-11-21 04:08:49,217:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 21 Nov 2023 03:08:48 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjy-szLxWx-nJEH-M6-OUcRchQwrigkuJCDbnAHrX6FGU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:42:29Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612771016/NXssXA", "token": "fBQUbQwPgLxd5Q_xY3yj1324L93-p0HcHbbwXfA2ky8" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612771016/srEC8w", "token": "fBQUbQwPgLxd5Q_xY3yj1324L93-p0HcHbbwXfA2ky8" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612771016/pqGTdw", "token": "fBQUbQwPgLxd5Q_xY3yj1324L93-p0HcHbbwXfA2ky8" } ] } 2023-11-21 04:08:49,218:DEBUG:acme.client:Storing nonce: SFMYLIQjy-szLxWx-nJEH-M6-OUcRchQwrigkuJCDbnAHrX6FGU 2023-11-21 04:08:49,219:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-21 04:08:49,219:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2023-11-21 04:08:49,220:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-21 04:08:49,221:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-21 04:08:49,222:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-21 04:08:49,222:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-21 04:08:49,222:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-21 04:08:49,223:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-21 04:08:49,225:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-21 04:08:49,225:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2023-11-21 04:08:49,226:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2023-11-21 04:08:49,227:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2023-11-21 04:08:49,229:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)