2023-11-20 15:27:30,457:DEBUG:certbot._internal.main:certbot version: 1.6.0 2023-11-20 15:27:30,457:DEBUG:certbot._internal.main:Arguments: [] 2023-11-20 15:27:30,458:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2023-11-20 15:27:31,295:DEBUG:certbot._internal.log:Root logging level set at 20 2023-11-20 15:27:31,296:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2023-11-20 15:27:31,330:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2023-11-20 15:27:31,370:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-20 15:27:31,771:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-20 15:27:31,784:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is signed by the certificate's issuer. 2023-11-20 15:27:31,788:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is: OCSPCertStatus.GOOD 2023-11-20 15:27:31,796:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:23 UTC. 2023-11-20 15:27:31,796:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 15:27:31,796:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-20 15:27:31,801:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-20 15:27:31,802:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-20 15:27:31,802:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-20 15:27:31,808:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-20 15:27:31,809:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-20 15:27:31,811:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-20 15:27:32,252:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-20 15:27:32,253:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:27:31 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "sir5pNIOY4A": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2023-11-20 15:27:32,254:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-20 15:27:37,192:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6934_key-certbot.pem 2023-11-20 15:27:41,506:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6932_csr-certbot.pem 2023-11-20 15:27:41,507:DEBUG:acme.client:Requesting fresh nonce 2023-11-20 15:27:41,507:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-20 15:27:41,655:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-20 15:27:41,655:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:27:41 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfic-3gj3NBcuUJP-OcxuY-C_HDsKI9At6ZtYyta1orwKc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-20 15:27:41,655:DEBUG:acme.client:Storing nonce: v0bMowfic-3gj3NBcuUJP-OcxuY-C_HDsKI9At6ZtYyta1orwKc 2023-11-20 15:27:41,656:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2023-11-20 15:27:41,662:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmljLTNnajNOQmN1VUpQLU9jeHVZLUNfSERzS0k5QXQ2WnRZeXRhMW9yd0tjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "PEZlM3-yuFFZSZoxTFZgwMOW3J_FqxyNrQF21wPRu7itIK2J5e0MRSFxx6ZGv27zRabApV76G--7cAUZ6nZaC-1-CkcZ8gDcXQzBeHDSJOqYUncMuYVd0-hY6q3hOzy1gr5uplctsrCnb3f7RpIfjBYn9NXbjpihp-5ByltgDHp0Eg1C3j1wLLv0PLywtcKBVXN9MBK0UkNKnUnFjEfZUTwEEKoIT76CXKM8BYzMFXAAqoCGjjHgPXgcQLPChv6c3hopIEGHaHV2DQBoqeHAPQap19CDANMpqbYpuE5gKRA0MekUo9QHDRdI9w0ehsjs1w1Lzy4EVZppnNqsHjSrXA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-20 15:27:41,818:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2023-11-20 15:27:41,819:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 20 Nov 2023 14:27:41 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054336746 Replay-Nonce: nbWKegf8azQ8ssAAto-pRkNMIN8X-E1ceh8sS8hndLSAf5amDbI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:40:34Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612303016" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054336746" } 2023-11-20 15:27:41,819:DEBUG:acme.client:Storing nonce: nbWKegf8azQ8ssAAto-pRkNMIN8X-E1ceh8sS8hndLSAf5amDbI 2023-11-20 15:27:41,820:DEBUG:acme.client:JWS payload: b'' 2023-11-20 15:27:41,827:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612303016: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhhelE4c3NBQXRvLXBSa05NSU44WC1FMWNlaDhzUzhobmRMU0FmNWFtRGJJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTIzMDMwMTYifQ", "signature": "sXHpGbhNURGJqd7_8PQXuFi2QSS6BrTt65yUovOAIEgW3O3EkUmKJSxoGhqIa0s1ukiZ3eC55tHXDahArdcRQj56ptoy9K8X7D4Wlm2dUWEm6v4RDxc6mcyml-pt7YeBdZVOHTr1BWv00O2PwyNVVJ8HSPKtERaGHsA3RPI6WC-XACMf-6SO0WrvAxPxg7mzDVuCtCFNp71Hqg8dhBvCiMyA6IPIsTPIf0j5wKupTgpuZcytuyjJE6jZly8Zcb_gjAC7giOiAj1GoJN05rIxn6r7HWnOgeDrFDt1GY9w_84_IVMu70hzPuN8GHZRv3uKfLK2CKOEpxjKahfZEz05RA", "payload": "" } 2023-11-20 15:27:41,977:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612303016 HTTP/1.1" 200 810 2023-11-20 15:27:41,978:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:27:41 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8DPjD_Upg4TntHIwv1ugaIKiDD-lbaMXs72FghfV5GFM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:40:34Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612303016/SE_DLA", "token": "pQaTT9XorHa5ZWDeypT0Hc0yUXwYdMo60L_Xs22rZ0Q" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612303016/Wku45g", "token": "pQaTT9XorHa5ZWDeypT0Hc0yUXwYdMo60L_Xs22rZ0Q" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612303016/hUBGgQ", "token": "pQaTT9XorHa5ZWDeypT0Hc0yUXwYdMo60L_Xs22rZ0Q" } ] } 2023-11-20 15:27:41,978:DEBUG:acme.client:Storing nonce: nbWKegf8DPjD_Upg4TntHIwv1ugaIKiDD-lbaMXs72FghfV5GFM 2023-11-20 15:27:41,979:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-20 15:27:41,979:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2023-11-20 15:27:41,979:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-20 15:27:41,980:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-20 15:27:41,991:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 15:27:41,991:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-20 15:27:41,991:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-20 15:27:41,992:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-20 15:27:41,997:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 15:27:42,037:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-20 15:27:42,449:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-20 15:27:42,450:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-20 15:27:42,451:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-20 15:27:42,455:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:36 UTC. 2023-11-20 15:27:42,455:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 15:27:42,456:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-20 15:27:42,460:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-20 15:27:42,460:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-20 15:27:42,460:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-20 15:27:42,475:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-20 15:27:42,476:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-20 15:27:42,477:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-20 15:27:42,916:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-20 15:27:42,917:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:27:42 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "1Dt2Efaq7rI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-20 15:27:42,917:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-20 15:27:47,204:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6935_key-certbot.pem 2023-11-20 15:27:50,857:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6933_csr-certbot.pem 2023-11-20 15:27:50,857:DEBUG:acme.client:Requesting fresh nonce 2023-11-20 15:27:50,857:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-20 15:27:51,004:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-20 15:27:51,005:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:27:50 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfis8HezBFAHpEf3NukFLb_WxYNuBiA587S_QjS-2e-CUY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-20 15:27:51,005:DEBUG:acme.client:Storing nonce: v0bMowfis8HezBFAHpEf3NukFLb_WxYNuBiA587S_QjS-2e-CUY 2023-11-20 15:27:51,005:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2023-11-20 15:27:51,011:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlzOEhlekJGQUhwRWYzTnVrRkxiX1d4WU51QmlBNTg3U19RalMtMmUtQ1VZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "KMh1Gq6bR3j2up-BCj5ygpjlW9-pgN-VgASMCfyvarpME2Ibl-7YNnjn1TOGhPgABy81XjaFZ23gx1LJf5cU5fwyFgpxGEwDUVVLOiom2jhTkYaz-9OXFUDEMyFMTJSsXO-n1Bon7Av4D7FUeqm108SwRG2hb1JMUZMiANp-dAm4fUyFG9dFbZSII6rCNdfpCusciWJLIcmvbgrfTPTDe2Vis_2HsvCaclky1y07__H82EopqZUg5dM5t2jqTGbW1zg6KhRzk2g-DokGBiQLoaTZHgjMwqZtoP2sH_sZGzyydPJj3mDRjQA89QWZDab0K7me0AsovI7dOJ4uwR1jnw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-20 15:27:51,176:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2023-11-20 15:27:51,177:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 20 Nov 2023 14:27:50 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054364216 Replay-Nonce: nbWKegf8E8_29fRDOMzKsRSUSThZiAYUqikVh54GBKAfgBKecY8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:40:44Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612339826" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054364216" } 2023-11-20 15:27:51,177:DEBUG:acme.client:Storing nonce: nbWKegf8E8_29fRDOMzKsRSUSThZiAYUqikVh54GBKAfgBKecY8 2023-11-20 15:27:51,178:DEBUG:acme.client:JWS payload: b'' 2023-11-20 15:27:51,183:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612339826: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhFOF8yOWZSRE9NektzUlNVU1RoWmlBWVVxaWtWaDU0R0JLQWZnQktlY1k4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTIzMzk4MjYifQ", "signature": "ft7m1U1jM6qAhCLG1AUxjFXLqfkUO3zUHmdns83cIOhYaJnfdpz6J80G-9oW7VO3mCyWhDRhsYsckF_fNOqA_VJy1B1Vdgx-WlEX-PPJeJ4-bJfpYb0MzH01cuwSH1EAVmmDYpFynONVGKV9HhcG_m1QV8u4nrvZSKT2F2QxsTDUDtscTNNW8PZrs56SNsbissPMpMUkC9P9FVgFPh0CdPpAjKES92G-0HKKSt3_elWX6RM1MCiaZGttwyLXhYTAE-JnubuX96RY7iihW3dMfehx8WJsgBGCfg9P23DIaCYYgJgTHaksSb1aelVvf51R6B8D3HvAE_k-rrJx_PiHOA", "payload": "" } 2023-11-20 15:27:51,344:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612339826 HTTP/1.1" 200 804 2023-11-20 15:27:51,345:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:27:51 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8VrdlXp_brJhA3-6Rk2YSRUsTNRWHDUTTZSO5wU3luDk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:40:44Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612339826/iaWzYw", "token": "lZ4sjyuE91eCR82aOexpOm4No3LJXeuqBiMNXsnHG7w" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612339826/b2lhHw", "token": "lZ4sjyuE91eCR82aOexpOm4No3LJXeuqBiMNXsnHG7w" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612339826/4q2BkQ", "token": "lZ4sjyuE91eCR82aOexpOm4No3LJXeuqBiMNXsnHG7w" } ] } 2023-11-20 15:27:51,345:DEBUG:acme.client:Storing nonce: nbWKegf8VrdlXp_brJhA3-6Rk2YSRUsTNRWHDUTTZSO5wU3luDk 2023-11-20 15:27:51,345:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-20 15:27:51,346:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2023-11-20 15:27:51,346:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-20 15:27:51,347:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-20 15:27:51,347:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 15:27:51,347:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-20 15:27:51,347:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-20 15:27:51,348:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-20 15:27:51,349:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 15:27:51,386:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-20 15:27:51,596:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-20 15:27:51,597:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-20 15:27:51,598:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-20 15:27:51,602:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:49 UTC. 2023-11-20 15:27:51,602:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 15:27:51,603:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-20 15:27:51,608:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-20 15:27:51,608:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-20 15:27:51,609:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-20 15:27:51,624:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-20 15:27:51,625:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-20 15:27:51,627:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-20 15:27:52,157:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-20 15:27:52,158:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:27:51 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "VSssoeGY5Zw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-20 15:27:52,158:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-20 15:27:55,882:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6936_key-certbot.pem 2023-11-20 15:27:59,507:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6934_csr-certbot.pem 2023-11-20 15:27:59,508:DEBUG:acme.client:Requesting fresh nonce 2023-11-20 15:27:59,508:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-20 15:27:59,685:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-20 15:27:59,686:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:27:59 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjMNuI1Q60Ls8sUYW-YFfriwV8yD9_FO2NrZXqDranTno X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-20 15:27:59,686:DEBUG:acme.client:Storing nonce: SFMYLIQjMNuI1Q60Ls8sUYW-YFfriwV8yD9_FO2NrZXqDranTno 2023-11-20 15:27:59,686:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2023-11-20 15:27:59,691:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpNTnVJMVE2MExzOHNVWVctWUZmcml3Vjh5RDlfRk8yTnJaWHFEcmFuVG5vIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "O1YHtRS-KweFrQqxomGa63LW6AQQ-5D8sVcU-0WIf8_XcG9PxABVWSc-xH8svloQ6iVv8ciaivYSR_uSBnr-KSKzWO5t3tdTbsFlqzxMaoKE7ehRQI65JcUx4yny_75ZK9p0M9vcR_ljX6aiSJRaKBzoLv0EPBSEbMhL5MKqYjim-KYjM9wYQOcKgaYz-qoT68m6fE5kZ9eljdIszNUEvfERdBwtzg9nqhqmXhDjQeO5bFDHd0c1TnbTv9SABxmNOHtvoXQ5OmOw6UTrUqAFLIhkWRW7SrCwNyvzJBG4TBF-uBn4cpe0-n0s4nl6qxKiJQ4yCn_zZXtP7jrbpxc-og", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-20 15:27:59,899:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2023-11-20 15:27:59,900:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 20 Nov 2023 14:27:59 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054392386 Replay-Nonce: jXyutbsnR01qXk5lqmraa18FS1eolgtpVjnw31Kk3zmw7fSPQsc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:40:54Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612379486" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054392386" } 2023-11-20 15:27:59,900:DEBUG:acme.client:Storing nonce: jXyutbsnR01qXk5lqmraa18FS1eolgtpVjnw31Kk3zmw7fSPQsc 2023-11-20 15:27:59,900:DEBUG:acme.client:JWS payload: b'' 2023-11-20 15:27:59,906:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612379486: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25SMDFxWGs1bHFtcmFhMThGUzFlb2xndHBWam53MzFLazN6bXc3ZlNQUXNjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTIzNzk0ODYifQ", "signature": "b8qw-C62jkgz5ZnpAdx15V47L6EOgHDNy_sV2DJo-NgLUFmReFuMntP7HuSoUmmscZCKninkEbvAP5RWfPQxzHcYHlftIHSlvVD5LuGINeYTsgLmu_IoWwdQHQOf0UX8XSsUksAO2zRnECmf5NQ539u_0UMejK3LcuyrrW0vLWRrRaIO4WZsKh93OuAcueLmdVhtg8O2g15TX2ovTK5kohQqbdpcAAqqhmyEJN8y7Jx9WRJ-DRgXCKqdGVXZL205UsJw8vwfibqNgx0Fk5JdYQ9PhGWRBzkxt2LJIV8dndEVfWaENpjIGkReqks0_-PwOK0avt4uItAMeWtVWkdk6g", "payload": "" } 2023-11-20 15:28:00,089:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612379486 HTTP/1.1" 200 807 2023-11-20 15:28:00,089:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:27:59 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjWVf8bwi96qX1bzYte9O-rQqbNk7dNC4QgXqjr68crZc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:40:54Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612379486/az4Vdg", "token": "cudl-UJkA1ZG6E5Za_MtH1igwT5c-ctyXDfDcgUpCmc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612379486/Zk1DuA", "token": "cudl-UJkA1ZG6E5Za_MtH1igwT5c-ctyXDfDcgUpCmc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612379486/MleojA", "token": "cudl-UJkA1ZG6E5Za_MtH1igwT5c-ctyXDfDcgUpCmc" } ] } 2023-11-20 15:28:00,090:DEBUG:acme.client:Storing nonce: SFMYLIQjWVf8bwi96qX1bzYte9O-rQqbNk7dNC4QgXqjr68crZc 2023-11-20 15:28:00,090:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-20 15:28:00,091:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2023-11-20 15:28:00,091:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-20 15:28:00,091:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-20 15:28:00,092:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 15:28:00,092:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-20 15:28:00,092:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-20 15:28:00,093:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-20 15:28:00,094:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 15:28:00,142:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-20 15:28:00,540:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-20 15:28:00,541:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-20 15:28:00,542:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-20 15:28:00,545:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:02 UTC. 2023-11-20 15:28:00,545:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 15:28:00,545:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-20 15:28:00,550:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-20 15:28:00,550:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-20 15:28:00,550:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-20 15:28:00,555:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-20 15:28:00,556:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-20 15:28:00,558:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-20 15:28:01,021:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-20 15:28:01,022:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:28:00 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "gxtWFj2Yff4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-20 15:28:01,022:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-20 15:28:04,875:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6937_key-certbot.pem 2023-11-20 15:28:08,471:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6935_csr-certbot.pem 2023-11-20 15:28:08,472:DEBUG:acme.client:Requesting fresh nonce 2023-11-20 15:28:08,472:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-20 15:28:08,627:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-20 15:28:08,627:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:28:08 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8lSxyn6MNoxTFocVUY3Q6VpOPrH3Hxpgz2xtDWbM7JK4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-20 15:28:08,627:DEBUG:acme.client:Storing nonce: nbWKegf8lSxyn6MNoxTFocVUY3Q6VpOPrH3Hxpgz2xtDWbM7JK4 2023-11-20 15:28:08,627:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2023-11-20 15:28:08,633:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhsU3h5bjZNTm94VEZvY1ZVWTNRNlZwT1BySDNIeHBnejJ4dERXYk03Sks0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "QBkipvy0VsC4XIPB0pqa_Dmt9g7dXJ2Ikbckyb6YjcfXPMVlH_jCqi89d164c2KBrOttAPSNo-x5eyZpj_eEJKDmoTpRxteo8BCA5nlEtU2XTF-VaKda3m8fgU5fVJ8Emgq1LQ8Zu-yZ86kzeNpWUEyg-AqD8huh6Y5fJl1UTDt5ZkJuw98f1T-YDLHLIDWOzQs_7PMfhD1t32-9MxqZ06fBNK9qA69twbgzNf_E2LvmyRAEQwnxLZaICeP15wAJ0DIl6CTwmV3bEZX-ZT43OuHeb0s-acpxkIMw3Ex5ElBTbfOUykgyYEaVMhOphX2b6Xq02ohsNxYqlBPqJqOgVA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-20 15:28:08,805:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2023-11-20 15:28:08,806:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 20 Nov 2023 14:28:08 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054424916 Replay-Nonce: v0bMowfiiyBEWixN-Qtg0VVMqFQQPDhnRapJj8kdK82nKRePyW8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:04Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612422406" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054424916" } 2023-11-20 15:28:08,806:DEBUG:acme.client:Storing nonce: v0bMowfiiyBEWixN-Qtg0VVMqFQQPDhnRapJj8kdK82nKRePyW8 2023-11-20 15:28:08,806:DEBUG:acme.client:JWS payload: b'' 2023-11-20 15:28:08,811:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612422406: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlpeUJFV2l4Ti1RdGcwVlZNcUZRUVBEaG5SYXBKajhrZEs4Mm5LUmVQeVc4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI0MjI0MDYifQ", "signature": "lq6GsZM-8Sm2y3G4n2aRWP3OgAN7JPtiOitxNkmj4iP9QnyBo6Gw1i-lUkqY7QzrQFfNNZ6jOdx4_O_e9xn2cuLc-2BW5pCjz24BaF4jG94G3ILo8HVHgs03rZNga8IWSbhUCG7aaHjYENvMeuE0lK1op8cipDOXvYMlxOtVGRiRbUEMlopxWRA5xKF4UGhi4RoE_GpUlEmOaWqD43Y0TkN07GptVydGhFlNrwjA_GNzRaKpg_5Oi2IWV7jrYGALBAT9DSCWgXgNtxvypvo-JdX-XNq6slFjzn1B_4WEVOYX90viuK-R2hRFyXHyk2eMXX3qTT1J3cv0kWI-29rz_w", "payload": "" } 2023-11-20 15:28:08,967:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612422406 HTTP/1.1" 200 801 2023-11-20 15:28:08,967:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:28:08 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8aZiEAc7WwmH0qvsB6SYZEcZMFp0VmcJMPPISKymyTm0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:04Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612422406/ky6kcw", "token": "-IL9_EB3uvFRDRErY0ET1SQxqNaHG_FMeRx1kbAjZLg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612422406/weBWyw", "token": "-IL9_EB3uvFRDRErY0ET1SQxqNaHG_FMeRx1kbAjZLg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612422406/I55gjQ", "token": "-IL9_EB3uvFRDRErY0ET1SQxqNaHG_FMeRx1kbAjZLg" } ] } 2023-11-20 15:28:08,968:DEBUG:acme.client:Storing nonce: nbWKegf8aZiEAc7WwmH0qvsB6SYZEcZMFp0VmcJMPPISKymyTm0 2023-11-20 15:28:08,968:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-20 15:28:08,968:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2023-11-20 15:28:08,969:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-20 15:28:08,969:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-20 15:28:08,970:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 15:28:08,970:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-20 15:28:08,970:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-20 15:28:08,970:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-20 15:28:08,972:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 15:28:09,008:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-20 15:28:09,238:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-20 15:28:09,239:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-20 15:28:09,239:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-20 15:28:09,244:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:14 UTC. 2023-11-20 15:28:09,244:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 15:28:09,244:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-20 15:28:09,249:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-20 15:28:09,249:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-20 15:28:09,249:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-20 15:28:09,264:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-20 15:28:09,265:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-20 15:28:09,267:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-20 15:28:09,803:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-20 15:28:09,803:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:28:09 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "O-gVRPomdHk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-20 15:28:09,804:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-20 15:28:14,433:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6938_key-certbot.pem 2023-11-20 15:28:18,055:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6936_csr-certbot.pem 2023-11-20 15:28:18,056:DEBUG:acme.client:Requesting fresh nonce 2023-11-20 15:28:18,056:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-20 15:28:18,233:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-20 15:28:18,234:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:28:17 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnjWFmEh3Wm9d5aAEJN8-FmyAHzOyQ7lldvCG3kurbsBs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-20 15:28:18,234:DEBUG:acme.client:Storing nonce: jXyutbsnjWFmEh3Wm9d5aAEJN8-FmyAHzOyQ7lldvCG3kurbsBs 2023-11-20 15:28:18,234:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2023-11-20 15:28:18,240:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25qV0ZtRWgzV205ZDVhQUVKTjgtRm15QUh6T3lRN2xsZHZDRzNrdXJic0JzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "eoOVaWUHPNqFZzIe3OOOgZzlTWrobsqJ-27RPmbxnBxVAAuk0LcfBiM6r3t5v8SPD0r2SyGVyIQXwbVR7htnFEZWCEch9I08RaVNxr7j6l-OTKDgWqs7VfD52JOKz3dbPy40lQyfSxpw-H-13PzhiLl7O-n68si1TH2NB6I8KZymLyxPFQ7e0c65NqEGDGO_0UoGP7k6ced6nrM7ZLkCiPHvJm06hlafccFc4zUWc1nSla0gyZy7bltBbWSsbodUiC1uyjYPZ6ND1j2Iu9aEVpLwN-o2V89GjBOiYfXLfCyrN1yu6b4pguGLnzoLcqenVDf8HJUJBH_mQLwcP62snQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-20 15:28:18,442:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-20 15:28:18,443:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 20 Nov 2023 14:28:18 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054455886 Replay-Nonce: SFMYLIQjP2oVgU-GHQr07ufO84WLOs6eptfI6irJG5AzDkaIj_E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:13Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612463596" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054455886" } 2023-11-20 15:28:18,443:DEBUG:acme.client:Storing nonce: SFMYLIQjP2oVgU-GHQr07ufO84WLOs6eptfI6irJG5AzDkaIj_E 2023-11-20 15:28:18,443:DEBUG:acme.client:JWS payload: b'' 2023-11-20 15:28:18,449:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612463596: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpQMm9WZ1UtR0hRcjA3dWZPODRXTE9zNmVwdGZJNmlySkc1QXpEa2FJal9FIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI0NjM1OTYifQ", "signature": "bCUSC7js_8F376vVbHt_A6aJiOzAaszX9AEsJEXBQzJP7hah1EZ3WVRrcYh_afUTye984Ep012JcgQekwQjlFOtdPoMX8Hy9hO62y6Dqc6MBtgTl4_evoHqqQ3dHSjBgD_fUIPH5yvWHQhGNZZgBuQIXgCNfVvnBIXPr5BPYxlHhRAaY8OIYKzh0oOoJNMMFmK241WJmuyApXz7XRFaSqQcnSTP0Ue-dmgXQ3hmRCCQ2b26dVYETqK2cvs3jQFjlJ7abGt9tgZMgrBcBmEvnmCYbbhTBiNp886BLwoDYFpz8Fz0tfvZBkN1h1MW-h5XsAA32_hOF3sJ_NES3VU0uFQ", "payload": "" } 2023-11-20 15:28:18,629:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612463596 HTTP/1.1" 200 805 2023-11-20 15:28:18,630:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:28:18 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnhbK20-8p21pv_mdAizqXd6s1_WXXJoxvHi14IvFyOoQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:13Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612463596/6wvlBA", "token": "urpYTB_ISPnX0ZBqpybU40fCrJsoHs7T5gniMi-FKAI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612463596/WBsXnQ", "token": "urpYTB_ISPnX0ZBqpybU40fCrJsoHs7T5gniMi-FKAI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612463596/cdtfow", "token": "urpYTB_ISPnX0ZBqpybU40fCrJsoHs7T5gniMi-FKAI" } ] } 2023-11-20 15:28:18,630:DEBUG:acme.client:Storing nonce: jXyutbsnhbK20-8p21pv_mdAizqXd6s1_WXXJoxvHi14IvFyOoQ 2023-11-20 15:28:18,630:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-20 15:28:18,631:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2023-11-20 15:28:18,632:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-20 15:28:18,632:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-20 15:28:18,633:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 15:28:18,633:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-20 15:28:18,633:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-20 15:28:18,633:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-20 15:28:18,634:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 15:28:18,669:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-20 15:28:19,055:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-20 15:28:19,057:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-20 15:28:19,058:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-20 15:28:19,062:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:27 UTC. 2023-11-20 15:28:19,062:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 15:28:19,063:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-20 15:28:19,068:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-20 15:28:19,068:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-20 15:28:19,068:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-20 15:28:19,083:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-20 15:28:19,083:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-20 15:28:19,085:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-20 15:28:19,606:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-20 15:28:19,613:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:28:19 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "x1VK0Rpshz4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2023-11-20 15:28:19,614:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-20 15:28:23,441:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6939_key-certbot.pem 2023-11-20 15:28:27,029:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6937_csr-certbot.pem 2023-11-20 15:28:27,030:DEBUG:acme.client:Requesting fresh nonce 2023-11-20 15:28:27,030:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-20 15:28:27,205:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-20 15:28:27,206:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:28:26 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjRIchoPRyn5inHNhCGgf7Yv8ylhSbXExI3eLxp-RihdA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-20 15:28:27,206:DEBUG:acme.client:Storing nonce: SFMYLIQjRIchoPRyn5inHNhCGgf7Yv8ylhSbXExI3eLxp-RihdA 2023-11-20 15:28:27,207:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2023-11-20 15:28:27,213:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpSSWNob1BSeW41aW5ITmhDR2dmN1l2OHlsaFNiWEV4STNlTHhwLVJpaGRBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "x0sk6QKt82sOZn9UKW2dD0WE_D3M_VHtbMmqxL_MX45aTCrgfM08OvuS8fKxJMyXxQ6jDVXFl_kKwiZSE_F5rk_wiBiAd_ODMHNKavzTSyOykTNQyJcWf-h-r0AcJ22qS-q4lrq0tw6gPb9OTyRvk-rvOJvvjfj4qU0J4l4GwjzwaGYEjb2mR5zL0Q64agiig1jNTxdS8jskf5bYN60-Kq8SmNKV-QYt6rCeXRhNuG_PehXIcTsKpu-o6rIZwswrvyMfCMD2Lp4MGf8MrXr81yMqUaDveO0mmTpE_ohc_JfvO0ZpOPD0_InuKCHkolfne-j0048WNR64cbppgxPcbg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-20 15:28:27,408:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2023-11-20 15:28:27,408:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 20 Nov 2023 14:28:27 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054483926 Replay-Nonce: jXyutbsn0L4sz760zomo_CS6jcl7bNpd9aogPsNBKa3IBZuVMVc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:23Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612503666" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054483926" } 2023-11-20 15:28:27,409:DEBUG:acme.client:Storing nonce: jXyutbsn0L4sz760zomo_CS6jcl7bNpd9aogPsNBKa3IBZuVMVc 2023-11-20 15:28:27,409:DEBUG:acme.client:JWS payload: b'' 2023-11-20 15:28:27,415:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612503666: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic24wTDRzejc2MHpvbW9fQ1M2amNsN2JOcGQ5YW9nUHNOQkthM0lCWnVWTVZjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI1MDM2NjYifQ", "signature": "y0UK9tuMpFmC590jC6QrdW5E1Tg-vXABSFM4oeWyJel6nStbl3xd41VWO42HULcNr76-SW65K2F826alPR3O5OiCcR0b2DoINLSsE_tyZDReZQfnZyRwSifAKHkybBHNCmhf8K8ohCx1Yu_5FxXsPHG-2AZEPCEN0DneDOcUCQizWHhmyUowI767DQO3HlaJeGSqXLo-H7DQm6PBazsE7CxXItsnmNyGGqDOX2Upf4C7cQphjI0c0Tq2k9RxOa9SZWt8VrntdvuWCWqBcVBM87ik4kc6BOcxBQEzVT38Rr6F8ndALb2y8ybXRdMONqywHi7w_-YZ_MBQh5z3kScLUw", "payload": "" } 2023-11-20 15:28:27,593:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612503666 HTTP/1.1" 200 809 2023-11-20 15:28:27,594:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:28:27 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnGRQ2vxcGVNe4ffrfSs_w7GTOWR1snwfkCIn4hMzVEpM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:23Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612503666/EfdATg", "token": "t3ldTTjSTD5p1ZXdigrc7Y9ujwScKzlEFH7-_2FHjZc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612503666/HlUCsw", "token": "t3ldTTjSTD5p1ZXdigrc7Y9ujwScKzlEFH7-_2FHjZc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612503666/hGYrLw", "token": "t3ldTTjSTD5p1ZXdigrc7Y9ujwScKzlEFH7-_2FHjZc" } ] } 2023-11-20 15:28:27,594:DEBUG:acme.client:Storing nonce: jXyutbsnGRQ2vxcGVNe4ffrfSs_w7GTOWR1snwfkCIn4hMzVEpM 2023-11-20 15:28:27,595:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-20 15:28:27,595:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2023-11-20 15:28:27,596:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-20 15:28:27,596:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-20 15:28:27,597:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 15:28:27,597:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-20 15:28:27,597:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-20 15:28:27,598:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-20 15:28:27,599:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 15:28:27,645:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-20 15:28:27,901:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-20 15:28:27,903:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-20 15:28:27,903:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-20 15:28:27,908:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:41 UTC. 2023-11-20 15:28:27,908:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 15:28:27,908:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-20 15:28:27,912:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-20 15:28:27,912:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-20 15:28:27,912:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-20 15:28:27,917:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-20 15:28:27,918:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-20 15:28:27,920:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-20 15:28:28,462:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-20 15:28:28,462:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:28:28 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "8h8xKGcohK4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-20 15:28:28,463:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-20 15:28:32,570:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6940_key-certbot.pem 2023-11-20 15:28:36,222:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6938_csr-certbot.pem 2023-11-20 15:28:36,223:DEBUG:acme.client:Requesting fresh nonce 2023-11-20 15:28:36,223:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-20 15:28:36,404:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-20 15:28:36,404:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:28:36 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnFwMOHE7qzcTJ524zd3fglMWDbSNHwlvDzlkhaTUgkIA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-20 15:28:36,405:DEBUG:acme.client:Storing nonce: jXyutbsnFwMOHE7qzcTJ524zd3fglMWDbSNHwlvDzlkhaTUgkIA 2023-11-20 15:28:36,405:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2023-11-20 15:28:36,412:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25Gd01PSEU3cXpjVEo1MjR6ZDNmZ2xNV0RiU05Id2x2RHpsa2hhVFVna0lBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Wg0-mc0-cmqQADsQax9pmo0WGI97jkyfyK5Vngw5MFXicD613X9AqFQXdA6W9Im2i4sL1dnqJRXxYs6nreoFN_HWV9qDX3yE6QR2uD3sXgKXhlgvZGN8zxJEVXyFoegU4GgJ080VYytzQ1EunC4Ze_MC3TPVAb4XGji6OUnU_1BQfX3m1shMVmJVbBsiqsak3IqQK8RciZeTsZilUi_JPS1k8NwNoQqw-60TSCCXD6f2XCZyvJmDP2MwSYEqEzRGInlxVMpQ3I9RgH50H93QWVbp_xEo5m4NhPfg2McmAG3akJ8IbQrHNRhUoP7ww_u-sMWOBzoVULonncZF-YruKg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-20 15:28:36,611:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2023-11-20 15:28:36,612:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 20 Nov 2023 14:28:36 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054508996 Replay-Nonce: SFMYLIQjHJ_t7E1nWW0tUc5xfunEj1WBbDpUjrAjOWBnb_YAXjU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:32Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612537686" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054508996" } 2023-11-20 15:28:36,612:DEBUG:acme.client:Storing nonce: SFMYLIQjHJ_t7E1nWW0tUc5xfunEj1WBbDpUjrAjOWBnb_YAXjU 2023-11-20 15:28:36,612:DEBUG:acme.client:JWS payload: b'' 2023-11-20 15:28:36,618:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612537686: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpISl90N0UxbldXMHRVYzV4ZnVuRWoxV0JiRHBVanJBak9XQm5iX1lBWGpVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI1Mzc2ODYifQ", "signature": "QG6zRkjhCXhXHJfKo2RRIoNilX2elfI2_L9_vMLvJwJsGRUUISZikvF30osuRIeY7vlb7B50RwYKxoXNJePkwKprMtOeMMBUFYpXhCtQ6En7GHxDrxWuF0RdVmpG5wbjDFLP_bTZxsen_8Fe8-SqF3l9UT6wyEUpiTCZ5hj0Nv31-JGs6pzcaBEoLnPkAgW78GT2ue3NXl6ja0389Qn47Die0Qe508PdDYYkNXJwzYHxTi_psuiNZUPKUt6SImDEbynJtZY9PFel6EkBwOaSimcQX9O6RHGkFyDdHAbXFVmvS14Nkz99vvY2Q-w0SHxEOfrc4qG49PkJE5lPM13ulA", "payload": "" } 2023-11-20 15:28:36,802:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612537686 HTTP/1.1" 200 806 2023-11-20 15:28:36,803:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:28:36 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnejMz_ZSKarltv9fV37nSyhxsqwldhlbwBmQYH5p0Duc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:32Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612537686/EQ01mA", "token": "Ljm0jeSPr8yxmsFdnztDCFHUg_abiozhTXTTTEUuJuY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612537686/E16lcw", "token": "Ljm0jeSPr8yxmsFdnztDCFHUg_abiozhTXTTTEUuJuY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612537686/vtzF_w", "token": "Ljm0jeSPr8yxmsFdnztDCFHUg_abiozhTXTTTEUuJuY" } ] } 2023-11-20 15:28:36,803:DEBUG:acme.client:Storing nonce: jXyutbsnejMz_ZSKarltv9fV37nSyhxsqwldhlbwBmQYH5p0Duc 2023-11-20 15:28:36,804:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-20 15:28:36,804:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2023-11-20 15:28:36,805:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-20 15:28:36,805:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-20 15:28:36,806:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 15:28:36,806:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-20 15:28:36,806:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-20 15:28:36,807:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-20 15:28:36,808:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 15:28:36,855:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2023-11-20 15:28:36,855:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 15:28:36,856:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2023-11-20 15:28:36,863:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2023-11-20 15:28:36,864:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2023-11-20 15:28:36,865:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2023-11-20 15:28:36,865:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2023-11-20 15:28:36,865:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2023-11-20 15:28:36,867:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2023-11-20 15:28:36,904:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-20 15:28:37,125:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-20 15:28:37,127:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-20 15:28:37,129:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-20 15:28:37,135:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:56 UTC. 2023-11-20 15:28:37,135:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 15:28:37,135:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-20 15:28:37,140:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-20 15:28:37,140:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-20 15:28:37,140:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-20 15:28:37,156:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-20 15:28:37,156:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-20 15:28:37,158:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-20 15:28:37,617:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-20 15:28:37,617:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:28:37 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "ToOL4KZYpoY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-20 15:28:37,618:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-20 15:28:41,522:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6941_key-certbot.pem 2023-11-20 15:28:45,159:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6939_csr-certbot.pem 2023-11-20 15:28:45,159:DEBUG:acme.client:Requesting fresh nonce 2023-11-20 15:28:45,159:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-20 15:28:45,312:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-20 15:28:45,313:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:28:44 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8n-D1oT76fYNXI4hb1NFiJNbSaMTSwJhU03sMG4xvjGs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-20 15:28:45,313:DEBUG:acme.client:Storing nonce: nbWKegf8n-D1oT76fYNXI4hb1NFiJNbSaMTSwJhU03sMG4xvjGs 2023-11-20 15:28:45,313:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2023-11-20 15:28:45,319:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhuLUQxb1Q3NmZZTlhJNGhiMU5GaUpOYlNhTVRTd0poVTAzc01HNHh2akdzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "nXOdegFFOtL4hWzNKxVQcaFgffnZAr4fGFr0FDi3RWKI92XnB6ha8q5k9TQsdtN-3W8iUO3J0DJQJYUo95mwggDmOFeSVqYu0M0C0bvRGmJBoTzyixr3sCfG_1eLkEjEyZzrAml-3hYzFVm8B_OSRn1oaNzIcMVqEJDo6nw12VUH3kjByHT0BVfXIeKDhuGT_Ujvo1O1PKCY3QQa0HZzwcQ-2IASd9kUadAMa27v9J9oHvlCmtntCdhBnAJAbNLpYzFyxRJvoeI4Zl6HvSfnIyzNCiioPaV6WCZhfGFsDHMDBwbgb4N03coRqBTQni1neXkEkrGuHbu1lhLXXrl3XA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-20 15:28:45,490:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2023-11-20 15:28:45,491:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 20 Nov 2023 14:28:45 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054534246 Replay-Nonce: v0bMowfiWWYMNANbMcLW5wP6pyKVUqLBiKBB80pWPKy9Lt7NMxc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:42Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612574526" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054534246" } 2023-11-20 15:28:45,491:DEBUG:acme.client:Storing nonce: v0bMowfiWWYMNANbMcLW5wP6pyKVUqLBiKBB80pWPKy9Lt7NMxc 2023-11-20 15:28:45,491:DEBUG:acme.client:JWS payload: b'' 2023-11-20 15:28:45,497:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612574526: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlXV1lNTkFOYk1jTFc1d1A2cHlLVlVxTEJpS0JCODBwV1BLeTlMdDdOTXhjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI1NzQ1MjYifQ", "signature": "FDCA8GyOKv3t0_OhRiHJp-g8V7wBKK5BG-tW2faVf3-62gOiW8GxOUBsGjMfuKTKLzXQPBUu5toPqfE_Fchn9fYwCLpjKEteafYWVWNh56Xxqv_BRYdwfvvWkRojIJR97gBMI2LBlgbK9wkEbThUqk4R9ccniLGAE-rfJAvbCjx_9TJqMObTnTZ8ypq6mKawh02XhJE42P5VdaS5PhsYqcGpeMX6mCNcvJOIfZleKYq2J27Gn3JUtXlA9UJjVWfoTaUzvvIaIIpbzIse2dyCv04hlAx_YqIKkbY1dDXiziUuuJKwlWnMGi3QDJfNRkHhLEifenh3fKFIs3mOAJqF5Q", "payload": "" } 2023-11-20 15:28:45,655:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612574526 HTTP/1.1" 200 811 2023-11-20 15:28:45,656:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:28:45 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfi167rSRVHh4eON14vqv7eIjBTO6WsbPQ8anzAUr-Gm_Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:42Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612574526/5letZQ", "token": "BHBPORVyrUrsGlhEnIrTc6lFdf8IW61JSn4cYnoDYfc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612574526/8PjU2A", "token": "BHBPORVyrUrsGlhEnIrTc6lFdf8IW61JSn4cYnoDYfc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612574526/O6CYAw", "token": "BHBPORVyrUrsGlhEnIrTc6lFdf8IW61JSn4cYnoDYfc" } ] } 2023-11-20 15:28:45,656:DEBUG:acme.client:Storing nonce: v0bMowfi167rSRVHh4eON14vqv7eIjBTO6WsbPQ8anzAUr-Gm_Q 2023-11-20 15:28:45,657:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-20 15:28:45,658:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2023-11-20 15:28:45,658:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-20 15:28:45,659:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-20 15:28:45,660:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 15:28:45,660:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-20 15:28:45,660:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-20 15:28:45,661:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-20 15:28:45,662:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 15:28:45,701:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-20 15:28:46,107:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-20 15:28:46,108:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-20 15:28:46,109:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-20 15:28:46,112:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:09 UTC. 2023-11-20 15:28:46,113:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 15:28:46,113:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-20 15:28:46,120:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-20 15:28:46,121:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-20 15:28:46,121:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-20 15:28:46,137:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-20 15:28:46,137:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-20 15:28:46,139:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-20 15:28:46,672:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-20 15:28:46,673:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:28:46 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "N5MVHcfBgGY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-20 15:28:46,673:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-20 15:28:50,310:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6942_key-certbot.pem 2023-11-20 15:28:53,800:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6940_csr-certbot.pem 2023-11-20 15:28:53,800:DEBUG:acme.client:Requesting fresh nonce 2023-11-20 15:28:53,801:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-20 15:28:53,978:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-20 15:28:53,978:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:28:53 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnDTW7GfzQ2agB86EtEkSv9vau1c1O1lUqipQpQ9-U5vU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-20 15:28:53,978:DEBUG:acme.client:Storing nonce: jXyutbsnDTW7GfzQ2agB86EtEkSv9vau1c1O1lUqipQpQ9-U5vU 2023-11-20 15:28:53,979:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2023-11-20 15:28:53,986:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25EVFc3R2Z6UTJhZ0I4NkV0RWtTdjl2YXUxYzFPMWxVcWlwUXBROS1VNXZVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "trYY_urgJbsiCfRFGFR9kqs9xDMph2ems3MMC1_9_Eex01kC89LWAGpsU7P22iuMghpdYOLvuoAN6AeCktlxSmPf5iKSgRTueLEHfaRBNGDt0OT857Ni4ueClT-02lDEQUo4fLd2rY4LvqAjcRIL-j10FAWKQWFAAC0jrre_-SOBlEysm1pm-Gtl320PwC1g2wO19dSxtq7GzzULIn53oEq5ic0-SxgON_VgD0bB7ot_ZqQxfJTlhGJrxUWXajNssrzEkZKWbk99MczRNK-IfFyVzKbQwef8hDWzQ6YLsEAr6dBiQm-v0YW84uEYGa0n3ofANfh-AUDUY9H_Y9z6BQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-20 15:28:54,180:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2023-11-20 15:28:54,181:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 20 Nov 2023 14:28:53 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054557496 Replay-Nonce: jXyutbsnGw7h6wPInhaIs_AUf1FcELzeG6WiDJpfKZprte5hbPw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:51Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612606006" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054557496" } 2023-11-20 15:28:54,181:DEBUG:acme.client:Storing nonce: jXyutbsnGw7h6wPInhaIs_AUf1FcELzeG6WiDJpfKZprte5hbPw 2023-11-20 15:28:54,181:DEBUG:acme.client:JWS payload: b'' 2023-11-20 15:28:54,187:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612606006: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25HdzdoNndQSW5oYUlzX0FVZjFGY0VMemVHNldpREpwZktacHJ0ZTVoYlB3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI2MDYwMDYifQ", "signature": "pmC6QGeu3BUxd4Sfiw6aniuMCbibAxetDKBS9zdLEjXT4tINK1RPtbxmTwEmKC8PvzTDWd6ZFmwSl5lQxWsjIn88fQ-NUbOBm9Iqv_3Ey5OLnuq8s97cDv2EuYCO37_HfTRMKZd1PUglFBUcDbCA5T-sLmxX3Hh0Zi8nzcKztRCemdt5bK7y5ndKcyCfJoo_wLngtfi65VCwfGOiDYkC176BE81HkbW1VIfk8gRQFFYpqRmM_pLKIqw5u9O04jD1LHW3Ru-IOey0zQsMc_gLRlLC0pwnUP30cn6kAPtNnuzC8jJ2HDU1YBtIBM7pBOTixZFwgBB4XCYbhKjL_wBv-A", "payload": "" } 2023-11-20 15:28:54,368:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612606006 HTTP/1.1" 200 810 2023-11-20 15:28:54,369:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:28:54 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQj6NhpJnOslNwHJqmvxfoq8mH4_pM9pf1ZolesEXBJADk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:51Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612606006/8R9vlA", "token": "srB66M3oeWbzzvIHjdwngsK6CxnDqV_EXeQJth9kWQ4" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612606006/fgtMqQ", "token": "srB66M3oeWbzzvIHjdwngsK6CxnDqV_EXeQJth9kWQ4" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612606006/kOODDA", "token": "srB66M3oeWbzzvIHjdwngsK6CxnDqV_EXeQJth9kWQ4" } ] } 2023-11-20 15:28:54,369:DEBUG:acme.client:Storing nonce: SFMYLIQj6NhpJnOslNwHJqmvxfoq8mH4_pM9pf1ZolesEXBJADk 2023-11-20 15:28:54,370:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-20 15:28:54,371:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2023-11-20 15:28:54,372:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-20 15:28:54,372:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-20 15:28:54,374:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 15:28:54,374:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-20 15:28:54,374:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-20 15:28:54,375:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-20 15:28:54,377:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 15:28:54,424:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-20 15:28:54,819:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-20 15:28:54,820:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2023-11-20 15:28:54,821:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2023-11-20 15:28:54,825:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:22 UTC. 2023-11-20 15:28:54,825:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 15:28:54,826:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-20 15:28:54,831:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-20 15:28:54,831:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-20 15:28:54,831:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-20 15:28:54,847:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-20 15:28:54,848:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-20 15:28:54,850:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-20 15:28:55,392:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-20 15:28:55,392:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:28:55 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "HtTXmclBXeI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-20 15:28:55,393:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-20 15:28:59,277:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6943_key-certbot.pem 2023-11-20 15:29:02,804:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6941_csr-certbot.pem 2023-11-20 15:29:02,804:DEBUG:acme.client:Requesting fresh nonce 2023-11-20 15:29:02,805:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-20 15:29:02,978:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-20 15:29:02,978:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:29:02 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjI0jFed0JICl5q_7SlH21jaQw4n7xPPpPb-Mpm_5MMaU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-20 15:29:02,978:DEBUG:acme.client:Storing nonce: SFMYLIQjI0jFed0JICl5q_7SlH21jaQw4n7xPPpPb-Mpm_5MMaU 2023-11-20 15:29:02,978:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2023-11-20 15:29:02,983:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpJMGpGZWQwSklDbDVxXzdTbEgyMWphUXc0bjd4UFBwUGItTXBtXzVNTWFVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "wxoFsZTqkVLFR7rOI7bLR0MjIFyExtpg2FKkPgMpaa4W44RSx3lfoqKQUhY19LNZTLG3LzzUg7TRn8qLI1M25K0xkRjJHIOHo1RdDVCslfNNErH0fChR-gweeSkDxabeISBqMQ-zWnIG-fBThxTFNr7Rk_o9NrlfhGn4ZEsRUK46dvpHqAqWhOCqCxW3UD8-Ey1sRE552Rd6MNY6DJ-bPlaqcbYun-fStZeGgujWH0E24nXzFLwlBZPLuxmj0G6SKsENcb9P-wCzFbx6Q6tXxpGrK6Zy-Qbz3ArQmYqIuDi-nRKHAyGLdWf8_18V7QsxVV4It52Gn3JNxrDLtWsN8w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-20 15:29:03,177:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2023-11-20 15:29:03,178:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 20 Nov 2023 14:29:02 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054581526 Replay-Nonce: jXyutbsnhuWTYuJ1Y5BsYL5oLbByfXrJzLazSWyhvlVPtEuZKeI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:42:01Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612638726" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054581526" } 2023-11-20 15:29:03,178:DEBUG:acme.client:Storing nonce: jXyutbsnhuWTYuJ1Y5BsYL5oLbByfXrJzLazSWyhvlVPtEuZKeI 2023-11-20 15:29:03,178:DEBUG:acme.client:JWS payload: b'' 2023-11-20 15:29:03,184:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612638726: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25odVdUWXVKMVk1QnNZTDVvTGJCeWZYckp6TGF6U1d5aHZsVlB0RXVaS2VJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI2Mzg3MjYifQ", "signature": "RDbxO1SQfupQ8VoJPFR2OdYjXOYLPQbnDbir1jaFQrYMQdawKYpezMv21jr-7BVce7AolUCrLE_5mPKXS1iuhOheoRz1w9yJJx-9HKdrsMNvy8Ef30woeGrugCSdJpm81R2VGUAVeLiJmbe38hmozJ8UXW2PvIBUjYzJSYm2j_bO-cCDd-_U2MMEPR4W7Qe4KkiCw1z3mA8jf-0OfHvMXvdF32vLYzD2sCla61CilNWqQVPA_24penK6JQ7pzm7jOf1_seYcFNIDsE5lJx0IVvPey12yPDeWLT8qVgt5idiy2LfPfhHX6fTCMoqeLo7P3FKmCVErgqvyD4gqyUPMxg", "payload": "" } 2023-11-20 15:29:03,361:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612638726 HTTP/1.1" 200 809 2023-11-20 15:29:03,362:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:29:03 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnByMaivneKeYyIwnfDS6wu32pcCEbcFAPJm3HVC1JT3Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:42:01Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612638726/NNBnvg", "token": "YtLscuYTUghWYv3C17nxbU_cYAHfqS3iJAb6EzBv31Y" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612638726/Mo2Oxw", "token": "YtLscuYTUghWYv3C17nxbU_cYAHfqS3iJAb6EzBv31Y" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612638726/wNN3rQ", "token": "YtLscuYTUghWYv3C17nxbU_cYAHfqS3iJAb6EzBv31Y" } ] } 2023-11-20 15:29:03,362:DEBUG:acme.client:Storing nonce: jXyutbsnByMaivneKeYyIwnfDS6wu32pcCEbcFAPJm3HVC1JT3Y 2023-11-20 15:29:03,362:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-20 15:29:03,363:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2023-11-20 15:29:03,363:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-20 15:29:03,364:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-20 15:29:03,364:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 15:29:03,364:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-20 15:29:03,365:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-20 15:29:03,365:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-20 15:29:03,366:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 15:29:03,404:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-20 15:29:03,813:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-20 15:29:03,814:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2023-11-20 15:29:03,815:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2023-11-20 15:29:03,819:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:34 UTC. 2023-11-20 15:29:03,819:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 15:29:03,819:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-20 15:29:03,830:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-20 15:29:03,830:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-20 15:29:03,831:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-20 15:29:03,848:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-20 15:29:03,848:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-20 15:29:03,850:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-20 15:29:04,373:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-20 15:29:04,374:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:29:04 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "PJ6ikBgsS08": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-20 15:29:04,374:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-20 15:29:08,017:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6944_key-certbot.pem 2023-11-20 15:29:11,560:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6942_csr-certbot.pem 2023-11-20 15:29:11,560:DEBUG:acme.client:Requesting fresh nonce 2023-11-20 15:29:11,560:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-20 15:29:11,734:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-20 15:29:11,735:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:29:11 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnsB1y2S3MXGx1Y9hVCyIumTa0H0a90UiYZhvxGb-EX8M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-20 15:29:11,735:DEBUG:acme.client:Storing nonce: jXyutbsnsB1y2S3MXGx1Y9hVCyIumTa0H0a90UiYZhvxGb-EX8M 2023-11-20 15:29:11,735:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2023-11-20 15:29:11,740:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25zQjF5MlMzTVhHeDFZOWhWQ3lJdW1UYTBIMGE5MFVpWVpodnhHYi1FWDhNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "vWpONW05E7Xsy4CLjNXrD6Y0g4ua3HYw6EBvuw3yGYT2YvL4q_uoKKEY4FY8tSxd2CLCAvrJj9Uyk5mjurGG9AKjwZHpmnx7bFVMC3HHauEcOK6_9LBiXUye6PwKsE8bXbaZyN4fpr634ywMQDvmflwaVKtZZM22Tat14CkEh1AtRwk6mJKeNUSi24eA1MihEp2f9loEfjqDZ1eXJCwUiMeQ-l4_rJWQTUpN46886rNjB0CU0lRMtB5ETV1v3EAVjDf2L0EUnJQNaLUR4zGfkTEZxzU367mtVOIPlhuubatuXtlAOHVv5dgZSDOUvZUtVyJmKVlJptoCiFEEq40NyA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-20 15:29:11,934:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-20 15:29:11,935:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 20 Nov 2023 14:29:11 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054620886 Replay-Nonce: jXyutbsnFg-qEb-ZO0llI1lo_JjENCYqw1wQOtoJWR_5H0jzXms X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:42:10Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612689796" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054620886" } 2023-11-20 15:29:11,935:DEBUG:acme.client:Storing nonce: jXyutbsnFg-qEb-ZO0llI1lo_JjENCYqw1wQOtoJWR_5H0jzXms 2023-11-20 15:29:11,935:DEBUG:acme.client:JWS payload: b'' 2023-11-20 15:29:11,941:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612689796: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25GZy1xRWItWk8wbGxJMWxvX0pqRU5DWXF3MXdRT3RvSldSXzVIMGp6WG1zIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI2ODk3OTYifQ", "signature": "xG6lsuK2ofsvgdxxwKD_TYw0vhspdlowGbdgKB6StMFkzFBKU7xdzULj7Ec2hGpIUwcw5HNsjcgNU73qXXQXUnCRzf3ISRU-gEZnqUcPHf58NRKhuzxG9RCDyBItdQ-C3EL3Sl0_wm_2WmEwKFT6oA2fe-WmU7yvxSeZlWaswAZ4FTlcatpCFhPCLgMvoZlVxd4tPbvbFaezFZ1mEEIV36y5on2U8bgjCjUo8DBWe8cL-AcBq3tmDUvHS7isC1W3Q1StwGaIshTmUBvFIsmoUummr8dDDGnTm85RBSdaX_4EsmGqT3tIHPkkVdrvXpDkfWpC_G2CJTxp94wjYBpkKg", "payload": "" } 2023-11-20 15:29:12,117:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612689796 HTTP/1.1" 200 805 2023-11-20 15:29:12,118:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:29:11 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQj-tQ8pW0tReAXegJJX6tWyKdIjow9Z1oLJ3sefIb0PqQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:42:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612689796/q81CXQ", "token": "dD3h4qBbL0oo-gEVD5KIIoE28_8_ZHTsPoThE2SmgpA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612689796/RA9KcA", "token": "dD3h4qBbL0oo-gEVD5KIIoE28_8_ZHTsPoThE2SmgpA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612689796/phjqOQ", "token": "dD3h4qBbL0oo-gEVD5KIIoE28_8_ZHTsPoThE2SmgpA" } ] } 2023-11-20 15:29:12,118:DEBUG:acme.client:Storing nonce: SFMYLIQj-tQ8pW0tReAXegJJX6tWyKdIjow9Z1oLJ3sefIb0PqQ 2023-11-20 15:29:12,119:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-20 15:29:12,119:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2023-11-20 15:29:12,120:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-20 15:29:12,120:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-20 15:29:12,121:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 15:29:12,121:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-20 15:29:12,121:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-20 15:29:12,122:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-20 15:29:12,123:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 15:29:12,169:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-20 15:29:12,559:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-20 15:29:12,560:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-20 15:29:12,561:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-20 15:29:12,566:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:48 UTC. 2023-11-20 15:29:12,566:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 15:29:12,566:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-20 15:29:12,571:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-20 15:29:12,571:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-20 15:29:12,571:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-20 15:29:12,587:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-20 15:29:12,588:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-20 15:29:12,591:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-20 15:29:13,110:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-20 15:29:13,111:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:29:12 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "oOBEdzdBXw4": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-20 15:29:13,112:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-20 15:29:16,850:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6945_key-certbot.pem 2023-11-20 15:29:20,401:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6943_csr-certbot.pem 2023-11-20 15:29:20,402:DEBUG:acme.client:Requesting fresh nonce 2023-11-20 15:29:20,402:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-20 15:29:20,576:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-20 15:29:20,576:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:29:20 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjhSkn2nBbgZrXyUgr7RuUm6mpaT-PWMrkrTVgpTxvspY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-20 15:29:20,577:DEBUG:acme.client:Storing nonce: SFMYLIQjhSkn2nBbgZrXyUgr7RuUm6mpaT-PWMrkrTVgpTxvspY 2023-11-20 15:29:20,577:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2023-11-20 15:29:20,583:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpoU2tuMm5CYmdaclh5VWdyN1J1VW02bXBhVC1QV01ya3JUVmdwVHh2c3BZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "qEEqh5SSpIfXcxwZ3xizeEJtCqCawgqEEK_8zGi53O1ps-3vokR6jLF-r3IYX0Q5SDOrt3FOQvQJvOrH1EZ-lGzgTze9nYTsb8VmCdVJWF-5G_4st0Vdx5i9T733HWHxphMN0On3KmKfnWbjLsFLpQd_LPLxMnd-lWAziszWzj88sVaCdMY7-ty-AnmksOKfWaqMrvNi3HJWri4XspSIzPc4Duq17q2dhsn57G0PrHEoXZWrE4pEyCTISV6xvcCn7QvyRnPr0lQFHV2wT1QqbBnqYVFYbfrAJfFpRHM0uUIK43fT2sB7rQUBtSoHf-5uBnsie5KQNcHGKtlAvGSVJg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-20 15:29:20,777:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-20 15:29:20,778:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 20 Nov 2023 14:29:20 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054650586 Replay-Nonce: SFMYLIQjUaft8rKph_cfXVXlr2CdHRAtXap0ekIv0ToyYwkXUhA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:42:20Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612731716" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054650586" } 2023-11-20 15:29:20,778:DEBUG:acme.client:Storing nonce: SFMYLIQjUaft8rKph_cfXVXlr2CdHRAtXap0ekIv0ToyYwkXUhA 2023-11-20 15:29:20,778:DEBUG:acme.client:JWS payload: b'' 2023-11-20 15:29:20,783:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612731716: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpVYWZ0OHJLcGhfY2ZYVlhscjJDZEhSQXRYYXAwZWtJdjBUb3lZd2tYVWhBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI3MzE3MTYifQ", "signature": "p6nHHNtJhsm6Vy3zas5U0zoleOXLHTshABTYJu2RriEJ8NR7fj9F-j3dMJ7jSAL_8cKbdcjjkjA6z09VpRomVVfcslssxrOG_jBOEP_E5VAEOUg2srhnKtwuNRoBx45dQ7E0JOBgzBuA8XhesfkiVvEQwNjgDS8AeYJmMTyVfpXZN6t1CrcTCpGrGhYzPKsF1t0CyxnC5wo7cm6wlC1xakONlwsvjpBjEpt5AfHVrSBFCtL0SBLzgqTdALPau93MkhoDGNwUc6NONsmWxtNGSNs5LHKo_CQmdiK4JJ4bYCgJ1cmKPw0qXKTNgobbkX8VnfWV4XCQAcN8Xp8VWxrK-Q", "payload": "" } 2023-11-20 15:29:20,960:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612731716 HTTP/1.1" 200 805 2023-11-20 15:29:20,961:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:29:20 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnlgeDfy9kqtUbxZkkvjFpO97fxBDCZjg17r-_J9l97rk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:42:20Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612731716/vs9hIA", "token": "6C6a5wxSVRoWYNwzinMlWR0pwxBViZEyUzdFtpz8okw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612731716/C3Z5fA", "token": "6C6a5wxSVRoWYNwzinMlWR0pwxBViZEyUzdFtpz8okw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612731716/Qu4skQ", "token": "6C6a5wxSVRoWYNwzinMlWR0pwxBViZEyUzdFtpz8okw" } ] } 2023-11-20 15:29:20,961:DEBUG:acme.client:Storing nonce: jXyutbsnlgeDfy9kqtUbxZkkvjFpO97fxBDCZjg17r-_J9l97rk 2023-11-20 15:29:20,962:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-20 15:29:20,962:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2023-11-20 15:29:20,962:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-20 15:29:20,963:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-20 15:29:20,963:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 15:29:20,963:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-20 15:29:20,964:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-20 15:29:20,964:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-20 15:29:20,965:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 15:29:21,002:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-20 15:29:21,381:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-20 15:29:21,382:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-20 15:29:21,383:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-20 15:29:21,387:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:31:01 UTC. 2023-11-20 15:29:21,387:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 15:29:21,388:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-20 15:29:21,393:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-20 15:29:21,393:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-20 15:29:21,393:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-20 15:29:21,408:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-20 15:29:21,408:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-20 15:29:21,410:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-20 15:29:21,848:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-20 15:29:21,849:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:29:21 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "iIMR7wEAyGs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-20 15:29:21,850:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-20 15:29:25,536:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6946_key-certbot.pem 2023-11-20 15:29:29,064:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6944_csr-certbot.pem 2023-11-20 15:29:29,064:DEBUG:acme.client:Requesting fresh nonce 2023-11-20 15:29:29,064:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-20 15:29:29,210:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-20 15:29:29,211:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:29:28 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiJgemBMEHj99_MTiyk-t34OH_hdpvdfQLK8nOa6UC7Jw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-20 15:29:29,211:DEBUG:acme.client:Storing nonce: v0bMowfiJgemBMEHj99_MTiyk-t34OH_hdpvdfQLK8nOa6UC7Jw 2023-11-20 15:29:29,211:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2023-11-20 15:29:29,217:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlKZ2VtQk1FSGo5OV9NVGl5ay10MzRPSF9oZHB2ZGZRTEs4bk9hNlVDN0p3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "QaWhyVly4krLYwtrzmUaQA1CI5W0A3sFG4Xu-eFczeecHzJOEiiYx0vXUguM1M-LqF5R_0fv_zIwOCUqTc_ILcfR51UQxl5MtEGVYzcaYPtFS7exnOZK4AD_7Xil4A--6ya2iaNFDH7G7HYAs3Qy2-1_zs46phYdv6Sk8DoXYSbWDunHhwQsPR4hRE_f1o2jpw3waifihmhBhA5obemKdKxTYobk4i8aoQz5bI7qWr2_K7DOZO6H0OGVK5C_ycd6_bs8GPFrMp-NjEA6in6mvj-S41pd_BEg5o7QeqpL5M8UMfORZluab3jqqNmAxQ7ym6lCgop9gVPtkXPJLiGN6A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-20 15:29:29,398:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-20 15:29:29,398:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 20 Nov 2023 14:29:29 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054677986 Replay-Nonce: v0bMowfi1HpvYRMzZkAF3sr3rfrMgOuvA1jeFrhETtSXKkia-gk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:42:29Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612771016" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054677986" } 2023-11-20 15:29:29,399:DEBUG:acme.client:Storing nonce: v0bMowfi1HpvYRMzZkAF3sr3rfrMgOuvA1jeFrhETtSXKkia-gk 2023-11-20 15:29:29,399:DEBUG:acme.client:JWS payload: b'' 2023-11-20 15:29:29,404:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612771016: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmkxSHB2WVJNelprQUYzc3IzcmZyTWdPdXZBMWplRnJoRVR0U1hLa2lhLWdrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI3NzEwMTYifQ", "signature": "stdm0zSqlYP9GzANpTYCLetEaURjUIY-11DHB1Q2Kx5nD0sZPIiwzoa9Y17mflCaMinQVHpQxRVmnGDQCzQKTP0vzlg6m6m275GmuA-ILJ_r69hoIcItF5A1PQpSLENTEkgY07RT57p8rDzl3YLShI9Vnj-v25ojUbLYPSgCEigOsGnsoOD9EOLgqyEhwbbRNoRdtO1TSPXC9dw6PaHFOK7RzWKww9tYZ9_jvdYh_-E5LCOgHiv7z90DorxxXWb9xrusdNMoV7M_mNcKe_vqsFTMDpqudYbExU4yIbNjDktkWFO0ZNc7uRk7TbpnqeMy81IDSNiEvmRk5WdDawqfMQ", "payload": "" } 2023-11-20 15:29:29,555:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612771016 HTTP/1.1" 200 805 2023-11-20 15:29:29,556:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 14:29:29 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf86L93YsPC2kJGIYJau9LICzFLMxsWlHs3HPu9gLJYtsQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:42:29Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612771016/NXssXA", "token": "fBQUbQwPgLxd5Q_xY3yj1324L93-p0HcHbbwXfA2ky8" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612771016/srEC8w", "token": "fBQUbQwPgLxd5Q_xY3yj1324L93-p0HcHbbwXfA2ky8" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612771016/pqGTdw", "token": "fBQUbQwPgLxd5Q_xY3yj1324L93-p0HcHbbwXfA2ky8" } ] } 2023-11-20 15:29:29,556:DEBUG:acme.client:Storing nonce: nbWKegf86L93YsPC2kJGIYJau9LICzFLMxsWlHs3HPu9gLJYtsQ 2023-11-20 15:29:29,556:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-20 15:29:29,557:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2023-11-20 15:29:29,557:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-20 15:29:29,557:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-20 15:29:29,558:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 15:29:29,558:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-20 15:29:29,558:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-20 15:29:29,559:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-20 15:29:29,560:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 15:29:29,560:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2023-11-20 15:29:29,561:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2023-11-20 15:29:29,562:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2023-11-20 15:29:29,563:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)