2023-11-20 08:42:58,908:DEBUG:certbot._internal.main:certbot version: 1.6.0 2023-11-20 08:42:58,909:DEBUG:certbot._internal.main:Arguments: [] 2023-11-20 08:42:58,909:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2023-11-20 08:42:59,775:DEBUG:certbot._internal.log:Root logging level set at 20 2023-11-20 08:42:59,776:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2023-11-20 08:42:59,812:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2023-11-20 08:42:59,851:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-20 08:43:00,257:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-20 08:43:00,258:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is signed by the certificate's issuer. 2023-11-20 08:43:00,262:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is: OCSPCertStatus.GOOD 2023-11-20 08:43:00,270:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:23 UTC. 2023-11-20 08:43:00,270:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 08:43:00,270:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-20 08:43:00,275:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-20 08:43:00,276:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-20 08:43:00,276:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-20 08:43:00,281:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-20 08:43:00,282:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-20 08:43:00,284:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-20 08:43:00,749:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-20 08:43:00,750:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:43:00 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "TwELHuQGasM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-20 08:43:00,751:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-20 08:43:05,247:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6921_key-certbot.pem 2023-11-20 08:43:09,467:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6919_csr-certbot.pem 2023-11-20 08:43:09,468:DEBUG:acme.client:Requesting fresh nonce 2023-11-20 08:43:09,468:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-20 08:43:09,619:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-20 08:43:09,620:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:43:09 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfibpyBUNZPeKp-lcI6mBIiU17zAxRzd7lavtp6w06LYvI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-20 08:43:09,620:DEBUG:acme.client:Storing nonce: v0bMowfibpyBUNZPeKp-lcI6mBIiU17zAxRzd7lavtp6w06LYvI 2023-11-20 08:43:09,620:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2023-11-20 08:43:09,626:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlicHlCVU5aUGVLcC1sY0k2bUJJaVUxN3pBeFJ6ZDdsYXZ0cDZ3MDZMWXZJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "mutBDdcD0m4y7PXaiYb1EdeGrEaYrcYc3_n7HEfzkWq6aGMdHlIhwKjYCNVRBQ7hlCNynrthAjXZ6TgSFrntOLmTrCSV56eDHlvAqGmRP_UCkrE2bXU5MgHYbmfwA1DQYeUiEZ0GbgNXl-euBH6Cd2yTuEL0c-9JIjE_1EHAxRVxyeEMtjzSD8XmFqBastKHqYJUfK5Rn9NPVzthXe1r1togGMPi_lTJ9cDaO_UAZIIk-MMqy8A7ggxL8ldTHjnuDgDe8KQxZgI3e41kBFnkDfMG6MvSuFuWCeRGwwSTtpUTQIo9B3xCVH36o7HBqT0-uo9Hsb9EA3uaopotdWZ1_A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-20 08:43:09,866:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2023-11-20 08:43:09,867:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 20 Nov 2023 07:43:09 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054336746 Replay-Nonce: v0bMowfiyai0YrM3Nx2koTQ_PCm47i43seR9QqFIq0qQW4-7FLs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:40:34Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612303016" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054336746" } 2023-11-20 08:43:09,867:DEBUG:acme.client:Storing nonce: v0bMowfiyai0YrM3Nx2koTQ_PCm47i43seR9QqFIq0qQW4-7FLs 2023-11-20 08:43:09,868:DEBUG:acme.client:JWS payload: b'' 2023-11-20 08:43:09,873:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612303016: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93Zml5YWkwWXJNM054MmtvVFFfUENtNDdpNDNzZVI5UXFGSXEwcVFXNC03RkxzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTIzMDMwMTYifQ", "signature": "MQuvnJrgo9jrlNkTdWYjEm34lIX4VTUgfj2D0gaLhBqtpyaGhqeq_cqDbujaNma5JK2ANc78Si7w2F92ohvJywi6BVaNsQCC3r-p2ZvSPzbMzNCELDTFZo3VxzRH2hEkqOCzEcuVr3-ZeTekgdBTI5MUR4r7Um6ec23oJk6taDEIeZuDEHKEkr9KaknJghqzheQDtJSW7UH34dKQtrTeA4p7-V6cowZuZplgZJ27Eqj2f0ZzFi0iCJ_M-663xLaq6ZpwuLqrUoi5Sf0PLHkVmehJRLd4cMCtbtIJphyfjkSYY-lcdmC9zaNgAxT5-N7AS8ljxKwGE550lWILGOadbg", "payload": "" } 2023-11-20 08:43:10,028:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612303016 HTTP/1.1" 200 810 2023-11-20 08:43:10,029:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:43:09 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8wKiY7qwTo8VH-3BTGdeY-KSRHXtHtJAfZE9q0BDcLfY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:40:34Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612303016/SE_DLA", "token": "pQaTT9XorHa5ZWDeypT0Hc0yUXwYdMo60L_Xs22rZ0Q" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612303016/Wku45g", "token": "pQaTT9XorHa5ZWDeypT0Hc0yUXwYdMo60L_Xs22rZ0Q" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612303016/hUBGgQ", "token": "pQaTT9XorHa5ZWDeypT0Hc0yUXwYdMo60L_Xs22rZ0Q" } ] } 2023-11-20 08:43:10,029:DEBUG:acme.client:Storing nonce: nbWKegf8wKiY7qwTo8VH-3BTGdeY-KSRHXtHtJAfZE9q0BDcLfY 2023-11-20 08:43:10,030:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-20 08:43:10,030:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2023-11-20 08:43:10,031:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-20 08:43:10,031:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-20 08:43:10,045:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 08:43:10,045:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-20 08:43:10,045:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-20 08:43:10,046:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-20 08:43:10,051:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 08:43:10,087:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-20 08:43:10,526:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-20 08:43:10,527:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-20 08:43:10,528:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-20 08:43:10,532:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:36 UTC. 2023-11-20 08:43:10,532:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 08:43:10,532:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-20 08:43:10,536:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-20 08:43:10,536:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-20 08:43:10,536:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-20 08:43:10,552:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-20 08:43:10,553:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-20 08:43:10,555:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-20 08:43:10,998:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-20 08:43:10,999:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:43:10 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "I0P4WTgvLFI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-20 08:43:11,000:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-20 08:43:14,846:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6922_key-certbot.pem 2023-11-20 08:43:18,510:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6920_csr-certbot.pem 2023-11-20 08:43:18,511:DEBUG:acme.client:Requesting fresh nonce 2023-11-20 08:43:18,511:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-20 08:43:18,658:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-20 08:43:18,659:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:43:18 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf81xx6LG7ttfKRrhMyJp5HUiyPgfsg9VN8SHwoNpK346M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-20 08:43:18,659:DEBUG:acme.client:Storing nonce: nbWKegf81xx6LG7ttfKRrhMyJp5HUiyPgfsg9VN8SHwoNpK346M 2023-11-20 08:43:18,659:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2023-11-20 08:43:18,665:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjgxeHg2TEc3dHRmS1JyaE15SnA1SFVpeVBnZnNnOVZOOFNId29OcEszNDZNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "tPceEY3YPIxxmgYY8_i3_rIIUGtwIq1dn_BUx4zNWWCLGgio4NYQ_GbfqANPKRZtyHNSIIy6wcIX8MG6L4HfzU38UsZuAw_myiNKBzbH2HOkk-w2hBVsBtLJ-VMd69UJhOpz0OrBIB4iWMVUc-2XBO0z5S8qVbhbksAkHyAgqNYi4LDSBKylF-j8eEefQYG5Oe6b2Hb2kaoGnX1m91fzV4s8eFs9dREYbI2vHXv-SNqnqk1OZDN3Fx3qc5kazIg1wjblgcKHagplJ-BT0KoChyCJdseoio-YUzC6yVPCey2RLpXFti0s0SRdEc9OQWawKbftly18JShusiBh_OQvUg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-20 08:43:18,838:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2023-11-20 08:43:18,839:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 20 Nov 2023 07:43:18 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054364216 Replay-Nonce: nbWKegf8iW5dx0OFg08DdoowHneg5kScXnWFQ0zXW-BirNLuOuU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:40:44Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612339826" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054364216" } 2023-11-20 08:43:18,839:DEBUG:acme.client:Storing nonce: nbWKegf8iW5dx0OFg08DdoowHneg5kScXnWFQ0zXW-BirNLuOuU 2023-11-20 08:43:18,839:DEBUG:acme.client:JWS payload: b'' 2023-11-20 08:43:18,846:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612339826: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhpVzVkeDBPRmcwOERkb293SG5lZzVrU2NYbldGUTB6WFctQmlyTkx1T3VVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTIzMzk4MjYifQ", "signature": "UK96I0XWKVMx6Hq5ddm-9POP9YHDqwIoTeX7TMMpTY9aLnfGHLyROM8Apjm4jNPjv93j_gw0UhGY4a5V_qo9kJcQFGlV6J1hiF-Z007XrMLkrfL_VAiuiXSiCAO7movoBtwN1nm1uWEkZCcEr2v3dtnYJ7ZHya_eR9Ba93zd_Ratv0Ci7uSOFp6NDufpUkc_RXxcvsr4cYzio4RQegamygjgzrGFIym2hVJd4P_fjtoZ192B4GNrSLai897cMDoOgrlnRFKFGbcGy0zE61Rdh-W4IR1bGZRhW5je09Hjt0K57Obv_CAqqePw5Lefn5GzwqA1okedBs-1fTnNHqt7aw", "payload": "" } 2023-11-20 08:43:19,012:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612339826 HTTP/1.1" 200 804 2023-11-20 08:43:19,013:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:43:18 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfi9098I1lYMQyZb9-Rlk5e5Ittfwkpk0MbjhnYe5F-LhY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:40:44Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612339826/iaWzYw", "token": "lZ4sjyuE91eCR82aOexpOm4No3LJXeuqBiMNXsnHG7w" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612339826/b2lhHw", "token": "lZ4sjyuE91eCR82aOexpOm4No3LJXeuqBiMNXsnHG7w" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612339826/4q2BkQ", "token": "lZ4sjyuE91eCR82aOexpOm4No3LJXeuqBiMNXsnHG7w" } ] } 2023-11-20 08:43:19,013:DEBUG:acme.client:Storing nonce: v0bMowfi9098I1lYMQyZb9-Rlk5e5Ittfwkpk0MbjhnYe5F-LhY 2023-11-20 08:43:19,014:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-20 08:43:19,014:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2023-11-20 08:43:19,014:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-20 08:43:19,015:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-20 08:43:19,015:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 08:43:19,016:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-20 08:43:19,016:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-20 08:43:19,016:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-20 08:43:19,017:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 08:43:19,064:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-20 08:43:19,308:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-20 08:43:19,309:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-20 08:43:19,310:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-20 08:43:19,314:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:49 UTC. 2023-11-20 08:43:19,314:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 08:43:19,315:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-20 08:43:19,319:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-20 08:43:19,320:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-20 08:43:19,320:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-20 08:43:19,335:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-20 08:43:19,337:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-20 08:43:19,338:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-20 08:43:19,790:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-20 08:43:19,790:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:43:19 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "1bXUaPQ6Cu0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-20 08:43:19,791:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-20 08:43:23,662:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6923_key-certbot.pem 2023-11-20 08:43:27,227:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6921_csr-certbot.pem 2023-11-20 08:43:27,228:DEBUG:acme.client:Requesting fresh nonce 2023-11-20 08:43:27,228:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-20 08:43:27,379:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-20 08:43:27,379:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:43:27 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiFWYFRsWGhtOa4RcrMNQ4UyYQmZli3ujf_BgHJ2mJuZY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-20 08:43:27,379:DEBUG:acme.client:Storing nonce: v0bMowfiFWYFRsWGhtOa4RcrMNQ4UyYQmZli3ujf_BgHJ2mJuZY 2023-11-20 08:43:27,380:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2023-11-20 08:43:27,384:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlGV1lGUnNXR2h0T2E0UmNyTU5RNFV5WVFtWmxpM3VqZl9CZ0hKMm1KdVpZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "uUPPmEi_eWmWE6INZ-ep-I0dPinFin1ArFQdVWE-Na9AAEjqXTO5zGiDQkWwP2hcSHpTt10U1094A1oJAVa-uJ3OY4-cEInQYRRNg9dyW70EaWOD-XClRanLQVh1hI8E-pIMf4CykBeA8-GJp1fg5rwiCtNungiDP8v1rMmQzP0cHQ3Bzn9b8VkbPeKvY-nOSbgV0EOUgWoKcsIUf-1NFQAeP7qxwLq0n4efWlAbf5VldFVe7YQWqz2gpkGOkMZk4y9raCGbf3d5g9tuU0U5mFJbLVejClc6KTL3ObtfWssQHNtNN7Z0X-8TRh16-Ncn59LpK9UAObc_NBLbBD89Nw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-20 08:43:27,567:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2023-11-20 08:43:27,567:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 20 Nov 2023 07:43:27 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054392386 Replay-Nonce: nbWKegf8oTApC86Q08NJY_wO6gqAlRQl_ovCKEj30BgRlponA_s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:40:54Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612379486" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054392386" } 2023-11-20 08:43:27,568:DEBUG:acme.client:Storing nonce: nbWKegf8oTApC86Q08NJY_wO6gqAlRQl_ovCKEj30BgRlponA_s 2023-11-20 08:43:27,568:DEBUG:acme.client:JWS payload: b'' 2023-11-20 08:43:27,573:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612379486: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhvVEFwQzg2UTA4TkpZX3dPNmdxQWxSUWxfb3ZDS0VqMzBCZ1JscG9uQV9zIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTIzNzk0ODYifQ", "signature": "ZSmV7wS43TEID0odrIlbf5kCGr_Ogq19b4dFGbnG3e-_bHlpyxdJ7weQg29pz-wql1AnfKZAFzGqi-5dq04TK4eBBrOYTkVQS9YZZPm0BM_b-FhLLyF9D0wAQqS3bGIGVKoA0wlay9E1bgUZoNPLeRoWDoW9tVIF6KOdpE6ipRLCGewcm4X98iQQ6oYmbaYgxKQ7UXkOdpaWiu9Mz-2N3ZGL5buhFDfW7rS9HA16W1AAaAOOy8bKsms8QNSzp6niyjd2ULSHhtu9C-9WRcdMXPfyqiC1Oryph9M9oBs9R6LW3XMmbnWz4vi8EjxPDXFywpTlXRuwLs6ibKU3axWZaA", "payload": "" } 2023-11-20 08:43:27,740:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612379486 HTTP/1.1" 200 807 2023-11-20 08:43:27,741:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:43:27 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8XIctoOKvXQV-Hi40FqiSpCE0_LAlj1qkR7jZvAq5SV4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:40:54Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612379486/az4Vdg", "token": "cudl-UJkA1ZG6E5Za_MtH1igwT5c-ctyXDfDcgUpCmc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612379486/Zk1DuA", "token": "cudl-UJkA1ZG6E5Za_MtH1igwT5c-ctyXDfDcgUpCmc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612379486/MleojA", "token": "cudl-UJkA1ZG6E5Za_MtH1igwT5c-ctyXDfDcgUpCmc" } ] } 2023-11-20 08:43:27,741:DEBUG:acme.client:Storing nonce: nbWKegf8XIctoOKvXQV-Hi40FqiSpCE0_LAlj1qkR7jZvAq5SV4 2023-11-20 08:43:27,742:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-20 08:43:27,742:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2023-11-20 08:43:27,743:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-20 08:43:27,743:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-20 08:43:27,743:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 08:43:27,744:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-20 08:43:27,744:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-20 08:43:27,744:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-20 08:43:27,745:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 08:43:27,783:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-20 08:43:28,005:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-20 08:43:28,006:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-20 08:43:28,007:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-20 08:43:28,011:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:02 UTC. 2023-11-20 08:43:28,011:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 08:43:28,012:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-20 08:43:28,016:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-20 08:43:28,016:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-20 08:43:28,016:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-20 08:43:28,032:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-20 08:43:28,032:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-20 08:43:28,034:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-20 08:43:28,569:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-20 08:43:28,570:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:43:28 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "f-H8pJeCcMo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-20 08:43:28,570:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-20 08:43:32,417:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6924_key-certbot.pem 2023-11-20 08:43:36,015:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6922_csr-certbot.pem 2023-11-20 08:43:36,016:DEBUG:acme.client:Requesting fresh nonce 2023-11-20 08:43:36,016:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-20 08:43:36,194:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-20 08:43:36,194:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:43:36 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnVwC6dRyST-udnd-48Y8m0RpJEBo47tP8LhNjDHIGGtQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-20 08:43:36,194:DEBUG:acme.client:Storing nonce: jXyutbsnVwC6dRyST-udnd-48Y8m0RpJEBo47tP8LhNjDHIGGtQ 2023-11-20 08:43:36,195:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2023-11-20 08:43:36,200:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25Wd0M2ZFJ5U1QtdWRuZC00OFk4bTBScEpFQm80N3RQOExoTmpESElHR3RRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "eegjGC7VMDRW54U_QQ8h9Kr20-neroMPx69yKvWHKAtif00hoRhqe10qCIj30IK2qg55SBqo8wwPDAXy1G30K6n4a-Nx1J6EwsuuqG9Lo_boFBSDyHAkTSSqwzP5tedZDDmSvuHNxTp1rgN1iGVH8Xr9_CwEEbsZE3mT49GLv0-B97Jlg4BxRkYBr7_hVhIIn2XShfi6-WgFeL9TvVhn4fHQkWaSgzqq4yeqm1IQQrt-aYSoyWy6iNO8zqZWAWXIPAQHALKi9MrZCVcc4ITvOZwKpaVD0GCuSKOZKH9Y5g3wsnA2gT42mUzvFIFQgP7agxWihExxlnmnKNhsu8l9zA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-20 08:43:36,420:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2023-11-20 08:43:36,420:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 20 Nov 2023 07:43:36 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054424916 Replay-Nonce: jXyutbsnkVAySDAgBlgfmLULyVLx5aOFc9hZGA8UqW73UK07i7Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:04Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612422406" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054424916" } 2023-11-20 08:43:36,420:DEBUG:acme.client:Storing nonce: jXyutbsnkVAySDAgBlgfmLULyVLx5aOFc9hZGA8UqW73UK07i7Q 2023-11-20 08:43:36,420:DEBUG:acme.client:JWS payload: b'' 2023-11-20 08:43:36,426:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612422406: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25rVkF5U0RBZ0JsZ2ZtTFVMeVZMeDVhT0ZjOWhaR0E4VXFXNzNVSzA3aTdRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI0MjI0MDYifQ", "signature": "OU_RFJDK2nmPOYvyCH9RvZ29DdtYfnYW9TPr3O8yflGc05lDnoEh1QiYEJsGzesFD5AMzUlODZEWImh96aDiihSgWdI0wxyaZQcTuGxLQ1N05BMIySQxvtjT6f6iJjrRZEa82Naf7B-5o4VMKNm-hu7t55nhcdYsCABsT81Du_vhEmMqgWEz1GROYtiK8QQ1K3jSyzvfZFCOS43JNG1WWMQo3pxDrJ30vKmlG9KbWMRxr1wMk36ohzRvpYHg-VkmZQnCuksVPgkj8XNuLJtyIZosYJJMmIfxwy8UXsupEN85SVW9pg7as26y435Q5oZTgwvxPdnoh7SpXGJi0JN98A", "payload": "" } 2023-11-20 08:43:36,606:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612422406 HTTP/1.1" 200 801 2023-11-20 08:43:36,607:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:43:36 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQj8O8BbOORHBI_UphS5V7Ap2UpwhS7q23Y_TMLFqvUv3Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:04Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612422406/ky6kcw", "token": "-IL9_EB3uvFRDRErY0ET1SQxqNaHG_FMeRx1kbAjZLg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612422406/weBWyw", "token": "-IL9_EB3uvFRDRErY0ET1SQxqNaHG_FMeRx1kbAjZLg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612422406/I55gjQ", "token": "-IL9_EB3uvFRDRErY0ET1SQxqNaHG_FMeRx1kbAjZLg" } ] } 2023-11-20 08:43:36,607:DEBUG:acme.client:Storing nonce: SFMYLIQj8O8BbOORHBI_UphS5V7Ap2UpwhS7q23Y_TMLFqvUv3Q 2023-11-20 08:43:36,607:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-20 08:43:36,608:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2023-11-20 08:43:36,608:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-20 08:43:36,609:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-20 08:43:36,609:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 08:43:36,610:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-20 08:43:36,610:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-20 08:43:36,610:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-20 08:43:36,611:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 08:43:36,659:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-20 08:43:36,888:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-20 08:43:36,889:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-20 08:43:36,889:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-20 08:43:36,894:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:14 UTC. 2023-11-20 08:43:36,894:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 08:43:36,895:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-20 08:43:36,901:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-20 08:43:36,901:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-20 08:43:36,901:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-20 08:43:36,917:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-20 08:43:36,917:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-20 08:43:36,919:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-20 08:43:37,358:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-20 08:43:37,359:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:43:37 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "BTT_jG9jqw0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-20 08:43:37,359:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-20 08:43:41,039:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6925_key-certbot.pem 2023-11-20 08:43:44,635:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6923_csr-certbot.pem 2023-11-20 08:43:44,635:DEBUG:acme.client:Requesting fresh nonce 2023-11-20 08:43:44,636:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-20 08:43:44,785:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-20 08:43:44,785:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:43:44 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiP2hVnThfZyfHunJq-Ufz0_yk0kHC5RrOLImLCgN1J-U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-20 08:43:44,785:DEBUG:acme.client:Storing nonce: v0bMowfiP2hVnThfZyfHunJq-Ufz0_yk0kHC5RrOLImLCgN1J-U 2023-11-20 08:43:44,786:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2023-11-20 08:43:44,791:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlQMmhWblRoZlp5Zkh1bkpxLVVmejBfeWswa0hDNVJyT0xJbUxDZ04xSi1VIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "u0hJT_-Z-5u5mRECuhO73vs7hNSAAKWfS9Z7QbjVQ8dzpWr2_iY6nZtSS1nIaaGBb8mE7gAu1eiOsU85LyIVorMlFPdX3l7Izt3xgoCQT-xy9H31LCGnYBfrYwUb5_h28hrptkcliBdfzKu8hhPgX-koPy18mM-3xbDikKEl7dndYQxWUHsNtEZbzGvRtGVhKm9BfYsJ7ULYo15vRsFmKtXFoZT3g4mDz7mBkZpcqJcOtZkF-qu9owUbnk25TBSaQDBoEZf0jkz43feWWapar5iU-o9SewLbs-nm2AtULuBF7oQz7mPMyzzdLrKOFscWv9ak5gbewX84iVspYQyI6w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-20 08:43:44,951:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-20 08:43:44,951:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 20 Nov 2023 07:43:44 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054455886 Replay-Nonce: nbWKegf8BFqKPf_xOVKlw9vzthmHG_I6v2ijWT3VyiC8t5MsMD8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:13Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612463596" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054455886" } 2023-11-20 08:43:44,952:DEBUG:acme.client:Storing nonce: nbWKegf8BFqKPf_xOVKlw9vzthmHG_I6v2ijWT3VyiC8t5MsMD8 2023-11-20 08:43:44,952:DEBUG:acme.client:JWS payload: b'' 2023-11-20 08:43:44,957:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612463596: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhCRnFLUGZfeE9WS2x3OXZ6dGhtSEdfSTZ2MmlqV1QzVnlpQzh0NU1zTUQ4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI0NjM1OTYifQ", "signature": "SuoHaECDPRHct3J31Kek6tvJtE4QgYkA9TqyrACBpMOT0sMCfe9fG8PakZ-jYP8Fisvwxmsm8-jmuiI-eU634kJECjXfOegeQ_wuBVzU1CsFzqBJHCp9HFUQIqxqCzFOM1JY53zWWMLDd71qwXmJ5hA5UlxhOrY0qIhEvT8T_g2yP7JwIDig7Fcna-1WHwpzU9LuZ4OpCQzUrzn_D--2pNm4faT7Z2PleEsnDdzEcoAmZAfs50LofZ93x8ghOYL2kq1Y3KzTnZgZux0VMBstChtlXEbIbWIXJyq97ABtuWhxNMnjSTd_bWbXY_ANZV3LPsm45ua942N0RFRrFWEZ5Q", "payload": "" } 2023-11-20 08:43:45,112:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612463596 HTTP/1.1" 200 805 2023-11-20 08:43:45,113:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:43:45 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf881EHwt64ubrNcz9PfU4y7R7S35thSIWMDsf_yZPzQfU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:13Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612463596/6wvlBA", "token": "urpYTB_ISPnX0ZBqpybU40fCrJsoHs7T5gniMi-FKAI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612463596/WBsXnQ", "token": "urpYTB_ISPnX0ZBqpybU40fCrJsoHs7T5gniMi-FKAI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612463596/cdtfow", "token": "urpYTB_ISPnX0ZBqpybU40fCrJsoHs7T5gniMi-FKAI" } ] } 2023-11-20 08:43:45,113:DEBUG:acme.client:Storing nonce: nbWKegf881EHwt64ubrNcz9PfU4y7R7S35thSIWMDsf_yZPzQfU 2023-11-20 08:43:45,113:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-20 08:43:45,114:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2023-11-20 08:43:45,114:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-20 08:43:45,114:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-20 08:43:45,115:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 08:43:45,115:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-20 08:43:45,115:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-20 08:43:45,116:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-20 08:43:45,116:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 08:43:45,161:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-20 08:43:45,564:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-20 08:43:45,565:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-20 08:43:45,566:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-20 08:43:45,570:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:27 UTC. 2023-11-20 08:43:45,571:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 08:43:45,571:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-20 08:43:45,576:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-20 08:43:45,576:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-20 08:43:45,576:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-20 08:43:45,592:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-20 08:43:45,593:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-20 08:43:45,595:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-20 08:43:46,123:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-20 08:43:46,124:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:43:46 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "-57OEfmrf-M": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-20 08:43:46,125:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-20 08:43:49,850:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6926_key-certbot.pem 2023-11-20 08:43:53,347:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6924_csr-certbot.pem 2023-11-20 08:43:53,347:DEBUG:acme.client:Requesting fresh nonce 2023-11-20 08:43:53,347:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-20 08:43:53,538:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-20 08:43:53,538:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:43:53 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjBX9nWosyKI1CKdTNT-9yxtMfug0eMqACk-GjmFMXP40 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-20 08:43:53,539:DEBUG:acme.client:Storing nonce: SFMYLIQjBX9nWosyKI1CKdTNT-9yxtMfug0eMqACk-GjmFMXP40 2023-11-20 08:43:53,539:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2023-11-20 08:43:53,544:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpCWDluV29zeUtJMUNLZFROVC05eXh0TWZ1ZzBlTXFBQ2stR2ptRk1YUDQwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "GkO4c3F-lqpsQm7gDNaku8tUapQ1mCuRx7vqbFTyeIiljFsPoIN1CNmvuL5Ycqu05Pp_UvwRFnacQj4C6YcBAxVuDbP4mRgPfsfGflMrGokvmVipGmoYBA97u1EVIAkNfHgZHwv2GoIadAJeJEeiUvcGjuzQEIVP94j_PGSaog8qD0sZPXjgl5m1m_si_MOAB9pUC5ShiWOUaXZDn0hM0OFIrSTCFWDKuRt1w-H2k4Cvmndn3Db5SIKvQzk8NxKgfaFB5oE0DCMbrtgIriEZ_uh-54GobXzphKhv2Sj-nSziZIFps6ddBFWtrx0C2Pk4ZZ9j2VowsF5cZ1S6b44iCQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-20 08:43:53,812:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2023-11-20 08:43:53,813:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 20 Nov 2023 07:43:53 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054483926 Replay-Nonce: SFMYLIQjrb8TT5GjUimVIiuuMOW_KPNuqdcY_ZSLqJSfDMO-7kM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:23Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612503666" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054483926" } 2023-11-20 08:43:53,813:DEBUG:acme.client:Storing nonce: SFMYLIQjrb8TT5GjUimVIiuuMOW_KPNuqdcY_ZSLqJSfDMO-7kM 2023-11-20 08:43:53,813:DEBUG:acme.client:JWS payload: b'' 2023-11-20 08:43:53,819:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612503666: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpyYjhUVDVHalVpbVZJaXV1TU9XX0tQTnVxZGNZX1pTTHFKU2ZETU8tN2tNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI1MDM2NjYifQ", "signature": "UqwOMpbWXHUMpQHDxFW9Qr17MUHY6iOYJti22OmVhI9xk4Dpz1fK0OjzgAUgvHJyv4Ouwr1KGmDXRhygOoqoP4HgTtANmRt7sxQELX8ODhm6eLkyQ5L-iPwjihHdb4kg5bhv_zG1CxDQ4XYVfaoTA6ILGZtIOGu0TL_B1bRQWhtS30tNQINCJqFwGTqsTTt4FpTBesAxXm6WJ_T_zv-tZF9J7U7pW5MJ_bryYXXXuM2IYUPvx3AZmmceu_1NDEq__vMB3vK-j7Jz32xAI_x9OF4uEXGSao6nOp--GK6pCecjsSm5mJJkr_h5fcbp0WI8N8Y9MUpDPwSXcCB2EMB4MA", "payload": "" } 2023-11-20 08:43:54,012:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612503666 HTTP/1.1" 200 809 2023-11-20 08:43:54,013:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:43:53 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjHku0inacmLi1naQWHqUfWr86wWBqs_NXk3gsjZPimGw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:23Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612503666/EfdATg", "token": "t3ldTTjSTD5p1ZXdigrc7Y9ujwScKzlEFH7-_2FHjZc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612503666/HlUCsw", "token": "t3ldTTjSTD5p1ZXdigrc7Y9ujwScKzlEFH7-_2FHjZc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612503666/hGYrLw", "token": "t3ldTTjSTD5p1ZXdigrc7Y9ujwScKzlEFH7-_2FHjZc" } ] } 2023-11-20 08:43:54,013:DEBUG:acme.client:Storing nonce: SFMYLIQjHku0inacmLi1naQWHqUfWr86wWBqs_NXk3gsjZPimGw 2023-11-20 08:43:54,014:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-20 08:43:54,014:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2023-11-20 08:43:54,015:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-20 08:43:54,015:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-20 08:43:54,016:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 08:43:54,016:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-20 08:43:54,016:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-20 08:43:54,016:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-20 08:43:54,017:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 08:43:54,065:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-20 08:43:54,313:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-20 08:43:54,315:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-20 08:43:54,316:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-20 08:43:54,320:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:41 UTC. 2023-11-20 08:43:54,321:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 08:43:54,321:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-20 08:43:54,328:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-20 08:43:54,328:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-20 08:43:54,328:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-20 08:43:54,334:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-20 08:43:54,335:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-20 08:43:54,338:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-20 08:43:54,888:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-20 08:43:54,889:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:43:54 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "7GalzMe2BOM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-20 08:43:54,890:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-20 08:43:58,492:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6927_key-certbot.pem 2023-11-20 08:44:02,096:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6925_csr-certbot.pem 2023-11-20 08:44:02,097:DEBUG:acme.client:Requesting fresh nonce 2023-11-20 08:44:02,097:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-20 08:44:02,278:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-20 08:44:02,279:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:44:02 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQj-sOtoUXDER4jiGLNAoMJGErA_zMnpgEOMOs02UWBYd4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-20 08:44:02,279:DEBUG:acme.client:Storing nonce: SFMYLIQj-sOtoUXDER4jiGLNAoMJGErA_zMnpgEOMOs02UWBYd4 2023-11-20 08:44:02,279:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2023-11-20 08:44:02,284:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWotc090b1VYREVSNGppR0xOQW9NSkdFckFfek1ucGdFT01PczAyVVdCWWQ0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "JCbkWx8Je7seFuiyMoGzLd172bxy0tw_WcJY3b9g345NCSdMVrX1v0ZDrzeABCdbQmMGwvTrxq7tzpNBqYdWu83_kwjEsSGlYUJZjMoPMWbT3jSM79bXuArrXT-4ImXPIECVsNmnaTJEyyVoRMBMZUjUJgROyL5XkLjJPOZ81Z6Yg9A-TmOCfJAhvRRNogXZRY0XDbnvY4wodaD1t2w2rcfcp7FDCKSoAAK3jTF2VOEMlzY45tpPUDVC7QKeHaiw-Jeb5DOg3rDK1LmaM_m7XcZGCLwwqw-gNJ5_mrj7FERF1SEjFcJidEc0yncnG_hHwM4rcKkPpBjiAWXe41RnGQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-20 08:44:02,490:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2023-11-20 08:44:02,490:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 20 Nov 2023 07:44:02 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054508996 Replay-Nonce: SFMYLIQjV6piabF3chy3JYz2Moksl8lQ9apfVIF4t4gWA5YYIhE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:32Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612537686" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054508996" } 2023-11-20 08:44:02,491:DEBUG:acme.client:Storing nonce: SFMYLIQjV6piabF3chy3JYz2Moksl8lQ9apfVIF4t4gWA5YYIhE 2023-11-20 08:44:02,491:DEBUG:acme.client:JWS payload: b'' 2023-11-20 08:44:02,495:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612537686: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpWNnBpYWJGM2NoeTNKWXoyTW9rc2w4bFE5YXBmVklGNHQ0Z1dBNVlZSWhFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI1Mzc2ODYifQ", "signature": "k8wdyOVnzpyyk1Idt1dPV7HQfaKCMuuHJPNBcVDEhgEkCDv3Ye7SLeTb8qxBxw3ZuMtOIApYjHO-ZWzLGCpb8GMWd4YK0bkvR8HT9-U2pAoypYhKYqd2ccs6y-yS0cfir679E5X2GqFjK3pQSXUEDn_ArsCwHQyXMKXPRmPxyJ3nSzAEkHaj-o098-IsvXKg0vuEknCnQAh2BBhIoHNOfM8fYMth4p_pze6Px_yybJYYCPYLVexp5Y9oIS_tsThIgkVy1xFXXvNtetcQwbaqI81LZCG60Q1GPlVYHZE84vWQMVdJKSazLvMXQq3JuuGauQf6kHyGlUC9KhOiFW0RHg", "payload": "" } 2023-11-20 08:44:02,687:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612537686 HTTP/1.1" 200 806 2023-11-20 08:44:02,688:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:44:02 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjpQqay_7Zxok7RwfOly1l6eSAhT4t4csZVat0CjiXQR0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:32Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612537686/EQ01mA", "token": "Ljm0jeSPr8yxmsFdnztDCFHUg_abiozhTXTTTEUuJuY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612537686/E16lcw", "token": "Ljm0jeSPr8yxmsFdnztDCFHUg_abiozhTXTTTEUuJuY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612537686/vtzF_w", "token": "Ljm0jeSPr8yxmsFdnztDCFHUg_abiozhTXTTTEUuJuY" } ] } 2023-11-20 08:44:02,688:DEBUG:acme.client:Storing nonce: SFMYLIQjpQqay_7Zxok7RwfOly1l6eSAhT4t4csZVat0CjiXQR0 2023-11-20 08:44:02,688:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-20 08:44:02,689:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2023-11-20 08:44:02,689:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-20 08:44:02,689:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-20 08:44:02,690:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 08:44:02,690:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-20 08:44:02,690:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-20 08:44:02,691:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-20 08:44:02,692:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 08:44:02,738:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2023-11-20 08:44:02,738:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 08:44:02,739:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2023-11-20 08:44:02,746:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2023-11-20 08:44:02,748:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2023-11-20 08:44:02,748:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2023-11-20 08:44:02,748:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2023-11-20 08:44:02,749:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2023-11-20 08:44:02,751:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2023-11-20 08:44:02,787:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-20 08:44:03,012:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-20 08:44:03,014:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-20 08:44:03,014:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-20 08:44:03,017:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:56 UTC. 2023-11-20 08:44:03,017:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 08:44:03,018:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-20 08:44:03,022:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-20 08:44:03,022:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-20 08:44:03,022:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-20 08:44:03,027:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-20 08:44:03,028:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-20 08:44:03,031:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-20 08:44:03,561:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-20 08:44:03,561:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:44:03 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "bcQBWfe-PPQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-20 08:44:03,562:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-20 08:44:07,265:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6928_key-certbot.pem 2023-11-20 08:44:10,917:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6926_csr-certbot.pem 2023-11-20 08:44:10,918:DEBUG:acme.client:Requesting fresh nonce 2023-11-20 08:44:10,918:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-20 08:44:11,095:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-20 08:44:11,096:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:44:10 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsn2i8pbLXpE_QUG8p4Ky7Aq0ZWGcyC599UDbGVkk2vwb8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-20 08:44:11,096:DEBUG:acme.client:Storing nonce: jXyutbsn2i8pbLXpE_QUG8p4Ky7Aq0ZWGcyC599UDbGVkk2vwb8 2023-11-20 08:44:11,096:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2023-11-20 08:44:11,101:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic24yaThwYkxYcEVfUVVHOHA0S3k3QXEwWldHY3lDNTk5VURiR1ZrazJ2d2I4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "czgNxZ2ga3fvG7oLiix9kx3s1vqCDl-XO8Zmj8hKR42MjIaa5nLJZHxo_pKt7WbdQ8tC6htHlkJPnf2r8dMR-lTmJ0-GlpIdQHgHun2xRLc62DRSG7pZY1SyFetCkV331KzmjiKCJZv1bzf1yyCV5q6PfhbfamurcOXUJXOslcITVSy7krXnx2cT_Q5RcOjQxNGhXdSPOykdfq55SOrYdyMM3yrehsnQMy6MqZvlFMlpok04RQfixO3BZn1rVhElL0yEDSipDtnzwwHS0Yh0NfNYHk9OsiRowIs6CPo-agVIloK2Fruc-0I5ftfYeQbon8xqMAFKOEKewFH3MBDiqA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-20 08:44:11,291:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2023-11-20 08:44:11,292:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 20 Nov 2023 07:44:11 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054534246 Replay-Nonce: SFMYLIQj618P15TukS5uUtlShecysuXhQj8rlyEIAoxC_tLa1rs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:42Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612574526" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054534246" } 2023-11-20 08:44:11,292:DEBUG:acme.client:Storing nonce: SFMYLIQj618P15TukS5uUtlShecysuXhQj8rlyEIAoxC_tLa1rs 2023-11-20 08:44:11,292:DEBUG:acme.client:JWS payload: b'' 2023-11-20 08:44:11,300:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612574526: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWo2MThQMTVUdWtTNXVVdGxTaGVjeXN1WGhRajhybHlFSUFveENfdExhMXJzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI1NzQ1MjYifQ", "signature": "AF8_p80y0mNA04dznZCWnAF4qT3_ebGYYef_UkGHRW50huGiTXgSBf-_aNHxZjkWepYs9qIeDebIcGUlRoEMwgXo8EAZtAftlYz_-RBu1Gt696aqrk03i2htC4XXjiiuk7rXvIeleL-iBGHyVOt-9CVzRTgk6GGAKrL-JETii-OIlTwFc3CxTX4UYfNd6DDrhICTjBt0-HFbnx7K9MX3NnZmJrftBSfwvc6VII7Ydtt2B1r_dtvlIjFolxK_8JSyVXBQSseETxU4qv9c6mh8QR1-OVLh64dB7Np0I7qgVScD5vjDowzXc3PIOwpeydNus5ju1rmg4-G-zYbdqBBy4Q", "payload": "" } 2023-11-20 08:44:11,483:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612574526 HTTP/1.1" 200 811 2023-11-20 08:44:11,484:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:44:11 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnQFYUp-EgIQMMcquGhkVG3S2_YwUGox20gkWTftiy6Ro X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:42Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612574526/5letZQ", "token": "BHBPORVyrUrsGlhEnIrTc6lFdf8IW61JSn4cYnoDYfc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612574526/8PjU2A", "token": "BHBPORVyrUrsGlhEnIrTc6lFdf8IW61JSn4cYnoDYfc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612574526/O6CYAw", "token": "BHBPORVyrUrsGlhEnIrTc6lFdf8IW61JSn4cYnoDYfc" } ] } 2023-11-20 08:44:11,484:DEBUG:acme.client:Storing nonce: jXyutbsnQFYUp-EgIQMMcquGhkVG3S2_YwUGox20gkWTftiy6Ro 2023-11-20 08:44:11,485:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-20 08:44:11,485:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2023-11-20 08:44:11,486:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-20 08:44:11,486:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-20 08:44:11,486:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 08:44:11,487:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-20 08:44:11,487:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-20 08:44:11,487:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-20 08:44:11,487:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 08:44:11,534:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-20 08:44:11,920:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-20 08:44:11,921:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-20 08:44:11,922:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-20 08:44:11,926:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:09 UTC. 2023-11-20 08:44:11,926:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 08:44:11,927:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-20 08:44:11,931:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-20 08:44:11,932:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-20 08:44:11,932:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-20 08:44:11,937:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-20 08:44:11,938:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-20 08:44:11,940:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-20 08:44:12,379:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-20 08:44:12,379:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:44:12 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "QSotQJKkAeY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-20 08:44:12,380:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-20 08:44:16,390:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6929_key-certbot.pem 2023-11-20 08:44:20,051:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6927_csr-certbot.pem 2023-11-20 08:44:20,052:DEBUG:acme.client:Requesting fresh nonce 2023-11-20 08:44:20,052:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-20 08:44:20,198:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-20 08:44:20,198:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:44:20 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfipT5W_02eZjgQhZjU2iG9IkOEY5IYJ8ly9OlfeWwAyzs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-20 08:44:20,199:DEBUG:acme.client:Storing nonce: v0bMowfipT5W_02eZjgQhZjU2iG9IkOEY5IYJ8ly9OlfeWwAyzs 2023-11-20 08:44:20,202:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2023-11-20 08:44:20,207:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlwVDVXXzAyZVpqZ1FoWmpVMmlHOUlrT0VZNUlZSjhseTlPbGZlV3dBeXpzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "EiyZxcUNg4bnsqh8HqyYFFzPRReo2K33BNBc8HPGvH5Ma8vRWzVvchWfR5PMw2j4zdefiKydt1-60qbnZomADgbtDAgQjAlqUgXb1fPVJDecnmMDwHhkvxN8PNQlZpb2lNIBtrBFYSraD6HSkHmvfcTicDyq-GipfOMVneNOaYaTwXWk9jMuEQB5UOUQ7N8RJt9jnpWZjeed1X4EFHswixliJR8hRv-VvpW_5Pc0teH27n_nGP_9PJg5PMKveM0MQvbFTPD8MqOvzt066-I2XeHMu9NtNyBC_LytvE3cl5Z3cmU9Y1D3-aajZZK1-da-T8tOWRxsKLKP2Lb20dATYQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-20 08:44:20,455:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2023-11-20 08:44:20,456:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 20 Nov 2023 07:44:20 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054557496 Replay-Nonce: nbWKegf8L2OL3-euevufPWLOneYE93iJ_-fCXo955SG3OiLTib0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:51Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612606006" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054557496" } 2023-11-20 08:44:20,456:DEBUG:acme.client:Storing nonce: nbWKegf8L2OL3-euevufPWLOneYE93iJ_-fCXo955SG3OiLTib0 2023-11-20 08:44:20,456:DEBUG:acme.client:JWS payload: b'' 2023-11-20 08:44:20,461:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612606006: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhMMk9MMy1ldWV2dWZQV0xPbmVZRTkzaUpfLWZDWG85NTVTRzNPaUxUaWIwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI2MDYwMDYifQ", "signature": "XNpLjSJLaiIB-rhXvmSWwuH04Zql2N5-F4FSh7_LGdowdj3FZqffIgBHVOFjanxS-1O53ulYN-K-P5ohnKFbh-ld7lIPDL14fcD9d3w_6sTIfeYrvwA3OlC1rh2qL9bLf3o4AaAdHtO-g24JAIfmYcC8ArqeAhJNnGgIyKj9yyXSN4FlXswl0Zi1XBaBmQbG1em2LiZoOwMhfxcMKPMcF5W6aGeFdtfleqvjWn00H3qhYY_rPQl6hFisuE0pML4IucrtuqHTWelipubhsGLf0rNyKATkOXf3M5iUUEVEkc_UnUxY2SnlKHUT6Pr49rpU8iRf0RtODKa6ubXt0CjlQQ", "payload": "" } 2023-11-20 08:44:20,612:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612606006 HTTP/1.1" 200 810 2023-11-20 08:44:20,612:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:44:20 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf88FTTFbEorhXMdjwCJ7L5blUMfZU6Iqbi32mVmAuEL2w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:51Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612606006/8R9vlA", "token": "srB66M3oeWbzzvIHjdwngsK6CxnDqV_EXeQJth9kWQ4" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612606006/fgtMqQ", "token": "srB66M3oeWbzzvIHjdwngsK6CxnDqV_EXeQJth9kWQ4" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612606006/kOODDA", "token": "srB66M3oeWbzzvIHjdwngsK6CxnDqV_EXeQJth9kWQ4" } ] } 2023-11-20 08:44:20,612:DEBUG:acme.client:Storing nonce: nbWKegf88FTTFbEorhXMdjwCJ7L5blUMfZU6Iqbi32mVmAuEL2w 2023-11-20 08:44:20,613:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-20 08:44:20,613:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2023-11-20 08:44:20,614:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-20 08:44:20,614:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-20 08:44:20,615:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 08:44:20,615:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-20 08:44:20,615:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-20 08:44:20,615:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-20 08:44:20,616:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 08:44:20,662:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-20 08:44:20,881:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-20 08:44:20,883:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2023-11-20 08:44:20,883:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2023-11-20 08:44:20,888:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:22 UTC. 2023-11-20 08:44:20,888:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 08:44:20,889:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-20 08:44:20,899:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-20 08:44:20,900:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-20 08:44:20,900:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-20 08:44:20,916:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-20 08:44:20,917:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-20 08:44:20,919:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-20 08:44:21,374:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-20 08:44:21,375:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:44:21 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "CzYSlK_1yB8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-20 08:44:21,375:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-20 08:44:25,152:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6930_key-certbot.pem 2023-11-20 08:44:28,792:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6928_csr-certbot.pem 2023-11-20 08:44:28,793:DEBUG:acme.client:Requesting fresh nonce 2023-11-20 08:44:28,793:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-20 08:44:28,948:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-20 08:44:28,948:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:44:28 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiGBg9kMJfurvpMrvZQ8DCGvdXXJloDQ8k7HOcf2bNORc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-20 08:44:28,948:DEBUG:acme.client:Storing nonce: v0bMowfiGBg9kMJfurvpMrvZQ8DCGvdXXJloDQ8k7HOcf2bNORc 2023-11-20 08:44:28,948:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2023-11-20 08:44:28,953:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlHQmc5a01KZnVydnBNcnZaUThEQ0d2ZFhYSmxvRFE4azdIT2NmMmJOT1JjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "WekzHMS31XjXBRFIYyJWLBMQXQEtNGUiggdEMa5q4fm9xbSUBDZTUGsiWTs9lkKUXlI4MQ07AQ5fe5lnfrILhG7pck2u5lj9MTOGe10ccEOUL3CeWaN6PGO_XkbTNxK44yc4VtENrHNHieWwG2KVtndMXRSdVLJ3F_WpY6hMasvEqxjsb5XEwuRpHMACSAQ7qdvmcmcw_eZJWaLTY32ARbycbBaUvuIPkOipx96DHOpEEl4GU2RKWI4N7cI5Wrp1-F23E68Yt_5Hg5ml6mUhCRlYqwZEwA0GAYEZ20Lsrf9okSFrzpsGggyaRdBjnDa76gwB-TWWvJGGfWwpbBKJwA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-20 08:44:29,146:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2023-11-20 08:44:29,147:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 20 Nov 2023 07:44:29 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054581526 Replay-Nonce: v0bMowfiDQ27do2wc7BL1JiUZMj_NPKCEZxF6cVbe33Rv2pkchY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:42:01Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612638726" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054581526" } 2023-11-20 08:44:29,147:DEBUG:acme.client:Storing nonce: v0bMowfiDQ27do2wc7BL1JiUZMj_NPKCEZxF6cVbe33Rv2pkchY 2023-11-20 08:44:29,147:DEBUG:acme.client:JWS payload: b'' 2023-11-20 08:44:29,153:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612638726: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlEUTI3ZG8yd2M3QkwxSmlVWk1qX05QS0NFWnhGNmNWYmUzM1J2MnBrY2hZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI2Mzg3MjYifQ", "signature": "RlRcMm-OUVmaHgOmzPcOG2b9n84EpgKXC-4AErA5lyRfH6gdS_eX4h1r3dnFBQd9qIeCJ18T1ZCpBx38pKFtGoOlL5RCWGkapB9J9kcJKTVA0ixQmiXmitzD4eMEZuEMkqCCIqNQTMwl7BJHbYHo0qJtsUBS5MwcQbaw1UTs2ZEk0FCmDxejQZoEcumWmZfPA5AjQTMsCEmvO4q7jZH7Arky4Hb9bqIRwBGJJf2P2NA7YixKnuKp_D6vg1MDfbJ1ZC_bqPNq3WQnG7Dvg-T1Ql5How_QHh0abzgnUkhz_Qbo4EI1Atzep553RRrWbj5Zq0yyfIDSu6rUy378h9j_6A", "payload": "" } 2023-11-20 08:44:29,308:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612638726 HTTP/1.1" 200 809 2023-11-20 08:44:29,308:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:44:29 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8wpw-MGoIHWrxZz57QyxMNWaz2pqcnfgPqhs7zeVqyww X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:42:01Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612638726/NNBnvg", "token": "YtLscuYTUghWYv3C17nxbU_cYAHfqS3iJAb6EzBv31Y" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612638726/Mo2Oxw", "token": "YtLscuYTUghWYv3C17nxbU_cYAHfqS3iJAb6EzBv31Y" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612638726/wNN3rQ", "token": "YtLscuYTUghWYv3C17nxbU_cYAHfqS3iJAb6EzBv31Y" } ] } 2023-11-20 08:44:29,309:DEBUG:acme.client:Storing nonce: nbWKegf8wpw-MGoIHWrxZz57QyxMNWaz2pqcnfgPqhs7zeVqyww 2023-11-20 08:44:29,309:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-20 08:44:29,310:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2023-11-20 08:44:29,310:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-20 08:44:29,311:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-20 08:44:29,312:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 08:44:29,312:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-20 08:44:29,312:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-20 08:44:29,312:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-20 08:44:29,313:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 08:44:29,351:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-20 08:44:29,760:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-20 08:44:29,761:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2023-11-20 08:44:29,762:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2023-11-20 08:44:29,766:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:34 UTC. 2023-11-20 08:44:29,766:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 08:44:29,766:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-20 08:44:29,771:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-20 08:44:29,771:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-20 08:44:29,771:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-20 08:44:29,787:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-20 08:44:29,788:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-20 08:44:29,791:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-20 08:44:30,319:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-20 08:44:30,320:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:44:30 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "QTDH6bFn_TM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-20 08:44:30,320:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-20 08:44:34,338:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6931_key-certbot.pem 2023-11-20 08:44:37,999:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6929_csr-certbot.pem 2023-11-20 08:44:37,999:DEBUG:acme.client:Requesting fresh nonce 2023-11-20 08:44:37,999:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-20 08:44:38,175:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-20 08:44:38,176:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:44:38 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnNgHkKpi51m80K-MFf-PMrFhcBZKhMlwzyu0LCSjHjxs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-20 08:44:38,176:DEBUG:acme.client:Storing nonce: jXyutbsnNgHkKpi51m80K-MFf-PMrFhcBZKhMlwzyu0LCSjHjxs 2023-11-20 08:44:38,177:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2023-11-20 08:44:38,184:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25OZ0hrS3BpNTFtODBLLU1GZi1QTXJGaGNCWktoTWx3enl1MExDU2pIanhzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "V97EqXer79bj_o2H1kUB4NGHh8eGjmQj0qBB7NAdUCch9ALUWQdtapH0a37l8Zu8wSBY59sf3ejwmMwFo78qCWow4a-zMip4lTkxQoHVNYhTnB1WWTiRs1SVpKlKiWTRG0e9DQvbKgT6TIyIWP6epLfwdGN_Yum8SDwOKXIgcPkwBgbEpE9yryc1UHmjlpte8qR8D7TWERHqpXkCPqEh7_HBMVlpT-Sh6pBxvFWZLlQjnV2NVw8N2GheTLFVlZzy0WSQy-sMQw22Vc1dmzGvk8xIufA9BUcGu_9C5NDWRd9ek7D3z4AQuI2uZQyyRRrO9Je34oz_RFwwVPnA1qYj9g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-20 08:44:38,391:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-20 08:44:38,392:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 20 Nov 2023 07:44:38 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054620886 Replay-Nonce: SFMYLIQj843RV_K_H5wfxJEoiAD1rm52p6aMfGcnM4q2ka4_vx8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:42:10Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612689796" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054620886" } 2023-11-20 08:44:38,392:DEBUG:acme.client:Storing nonce: SFMYLIQj843RV_K_H5wfxJEoiAD1rm52p6aMfGcnM4q2ka4_vx8 2023-11-20 08:44:38,392:DEBUG:acme.client:JWS payload: b'' 2023-11-20 08:44:38,397:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612689796: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWo4NDNSVl9LX0g1d2Z4SkVvaUFEMXJtNTJwNmFNZkdjbk00cTJrYTRfdng4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI2ODk3OTYifQ", "signature": "cbLzcDL3NsKVkidIdOJp8-NBvOX29qvU_rokga5_ldXzBubvDG0S8IEgGwmsv0ksH_p5nZ-UEnXeBJUdwuUGYfDcmWRz4wgpajK6RoJMWCuBHfE2ndN4Ng2WJkOSVR1pHmAeZ6UlagQXZYWMvJdfZLlwbCr9osdWOB3MGKaGYA6EeOEbuY9_wGknAup422QO_fd55sgEs5PVC7c_Tt8nJCTR-534w4YLw3ylE3qKmr4_0RqJ0HjbHqfE30EV6d277MHCSMT3PLcSuvItQetsTWIyQi3iigiElusjWquuXa8RoVyuLKJlk5lF4GlNTxxN6Wevs-qIpQPJ7mPqOvCQaA", "payload": "" } 2023-11-20 08:44:38,575:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612689796 HTTP/1.1" 200 805 2023-11-20 08:44:38,575:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:44:38 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnhqaSUt6035kurOnuD3WGVytELfTQOQnW8EZttZmGEdY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:42:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612689796/q81CXQ", "token": "dD3h4qBbL0oo-gEVD5KIIoE28_8_ZHTsPoThE2SmgpA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612689796/RA9KcA", "token": "dD3h4qBbL0oo-gEVD5KIIoE28_8_ZHTsPoThE2SmgpA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612689796/phjqOQ", "token": "dD3h4qBbL0oo-gEVD5KIIoE28_8_ZHTsPoThE2SmgpA" } ] } 2023-11-20 08:44:38,575:DEBUG:acme.client:Storing nonce: jXyutbsnhqaSUt6035kurOnuD3WGVytELfTQOQnW8EZttZmGEdY 2023-11-20 08:44:38,576:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-20 08:44:38,576:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2023-11-20 08:44:38,577:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-20 08:44:38,577:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-20 08:44:38,578:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 08:44:38,578:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-20 08:44:38,578:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-20 08:44:38,579:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-20 08:44:38,580:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 08:44:38,615:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-20 08:44:39,027:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-20 08:44:39,028:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-20 08:44:39,028:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-20 08:44:39,033:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:48 UTC. 2023-11-20 08:44:39,033:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 08:44:39,033:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-20 08:44:39,039:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-20 08:44:39,040:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-20 08:44:39,040:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-20 08:44:39,055:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-20 08:44:39,055:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-20 08:44:39,057:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-20 08:44:39,506:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-20 08:44:39,506:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:44:39 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "jcGbrvYrXkM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-20 08:44:39,507:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-20 08:44:43,632:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6932_key-certbot.pem 2023-11-20 08:44:47,306:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6930_csr-certbot.pem 2023-11-20 08:44:47,306:DEBUG:acme.client:Requesting fresh nonce 2023-11-20 08:44:47,306:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-20 08:44:47,457:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-20 08:44:47,458:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:44:47 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf87gjAEC4oKS3EEP_mhsF-FhzYByj2NwQ5TSFj6lSqE38 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-20 08:44:47,458:DEBUG:acme.client:Storing nonce: nbWKegf87gjAEC4oKS3EEP_mhsF-FhzYByj2NwQ5TSFj6lSqE38 2023-11-20 08:44:47,458:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2023-11-20 08:44:47,465:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjg3Z2pBRUM0b0tTM0VFUF9taHNGLUZoellCeWoyTndRNVRTRmo2bFNxRTM4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "RLRC4wHcpZtca6hi0bqRsrzQrbO42_qn9p6V_2KpbWcHH3I59xhYTw_XmfsBndicKVtRDmtwal5-hnhgCqNLIshpiObUE8vnbDdrjY0qWtuIioyGRcFREZ9hAIZvDir9prQhJQmkVEzjAWb6hgBrz-k-TlfLz_PRin1j1FjtEdX2F2p1zALUmHUkq5hnOxudTQKyZuePOdiBgJHUcBA20pgDoRQ7MgpQ-ZpT1UO0QCskxlz9E6FjEbUUoF4Ew_Aia8XIPxbW5BPHrxk5C-CDy09a68kSUp1S2J3G37QpAytpWId7oNk5x6ZhAaBMhHpU2uz6zkYO-EmeR4V1NWXoeg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-20 08:44:47,701:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-20 08:44:47,702:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 20 Nov 2023 07:44:47 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054650586 Replay-Nonce: v0bMowfiRH6V9PKw4v-Y4DIQdz-WPwtUpcXBPTpRCHyS7Dh7CpM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:42:20Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612731716" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054650586" } 2023-11-20 08:44:47,703:DEBUG:acme.client:Storing nonce: v0bMowfiRH6V9PKw4v-Y4DIQdz-WPwtUpcXBPTpRCHyS7Dh7CpM 2023-11-20 08:44:47,703:DEBUG:acme.client:JWS payload: b'' 2023-11-20 08:44:47,708:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612731716: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlSSDZWOVBLdzR2LVk0RElRZHotV1B3dFVwY1hCUFRwUkNIeVM3RGg3Q3BNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI3MzE3MTYifQ", "signature": "ZfVcd2uh2ULX7fl71kAnD037nYyk7iju95JQzMcfNeYEVjgzplaSkZXnk5Vm3KCB4k82wTdtLPQdV-zKagN2-v1iXV0v50xqKfy0my1qF964cuxuBqg_ptEoOXG0lT-gkwD2WC8Z_j8TparDjaw7VjCPQCx1j2IAF2kQtvjH_QrJVDH5P9hkc9WgzvTqxKqePjBjzCHK6NN-cLiDMQ6Xa0hgCuOZC0ZI_OX3TCEBf30nlumuusenQGnmaC_iWRzyq9mkihCXV0C8LsblINTka0BN5Yk9B1iGKGld_rr3LQN3mOHGEfnaGZGgD2M2KEFobYvf8Emn806IGpfTsqEVmA", "payload": "" } 2023-11-20 08:44:47,861:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612731716 HTTP/1.1" 200 805 2023-11-20 08:44:47,861:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:44:47 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf899bR1PEU9D2nNfmmOM5npPnXR_k-YW8USJFuUTc1nJ4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:42:20Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612731716/vs9hIA", "token": "6C6a5wxSVRoWYNwzinMlWR0pwxBViZEyUzdFtpz8okw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612731716/C3Z5fA", "token": "6C6a5wxSVRoWYNwzinMlWR0pwxBViZEyUzdFtpz8okw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612731716/Qu4skQ", "token": "6C6a5wxSVRoWYNwzinMlWR0pwxBViZEyUzdFtpz8okw" } ] } 2023-11-20 08:44:47,861:DEBUG:acme.client:Storing nonce: nbWKegf899bR1PEU9D2nNfmmOM5npPnXR_k-YW8USJFuUTc1nJ4 2023-11-20 08:44:47,862:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-20 08:44:47,862:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2023-11-20 08:44:47,863:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-20 08:44:47,863:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-20 08:44:47,864:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 08:44:47,864:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-20 08:44:47,865:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-20 08:44:47,865:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-20 08:44:47,866:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 08:44:47,913:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-20 08:44:48,133:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-20 08:44:48,134:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-20 08:44:48,135:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-20 08:44:48,139:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:31:01 UTC. 2023-11-20 08:44:48,139:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-20 08:44:48,140:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-20 08:44:48,145:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-20 08:44:48,145:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-20 08:44:48,145:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-20 08:44:48,150:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-20 08:44:48,151:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-20 08:44:48,153:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-20 08:44:48,683:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-20 08:44:48,684:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:44:48 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "hlMb9oA5z8k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-20 08:44:48,684:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-20 08:44:52,536:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6933_key-certbot.pem 2023-11-20 08:44:56,214:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6931_csr-certbot.pem 2023-11-20 08:44:56,215:DEBUG:acme.client:Requesting fresh nonce 2023-11-20 08:44:56,215:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-20 08:44:56,392:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-20 08:44:56,392:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:44:56 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsn6TS_S4Kxg4Ru-0Tk2JEDHcUqB8G1mHvsYzMU2kHOz7o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-20 08:44:56,393:DEBUG:acme.client:Storing nonce: jXyutbsn6TS_S4Kxg4Ru-0Tk2JEDHcUqB8G1mHvsYzMU2kHOz7o 2023-11-20 08:44:56,393:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2023-11-20 08:44:56,399:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic242VFNfUzRLeGc0UnUtMFRrMkpFREhjVXFCOEcxbUh2c1l6TVUya0hPejdvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "O8etLBXxawwZd1S5WF-dwCTUIL0MIOG1bFGJX9H67Qei0VRgtDOt4Xo98FPPgX-BA-RHe-jVrvm4QsvLzNum1g779T39hjnXaROL2ul80rDcQmbimuh0EnY-ly8NbRa0aqZfOOSHmv17dv6BCgfrTC13vCErGqgoTQD5jide6nHUEsULOyYiGrF7pc86u81j7Ra8ucYZftWLPS7W1sxVK9BCsmYCAFZqsSKYI-wYuiKU6W1XBRf-FMviERfvJXpNu7oDTsoh_SbvUJioitDJZL8QwcpI_N_3dxgPQ3CK9C8xK_RWGlkHTK-HKUcaa7tOeW2Oquj9vpZb6w0dXfyyXA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-20 08:44:56,597:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-20 08:44:56,598:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Mon, 20 Nov 2023 07:44:56 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054677986 Replay-Nonce: jXyutbsn0CaNsRDxFJnrYFTAQ2NW3meQ7evRDDBHSMWhMyKw3nk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:42:29Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612771016" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054677986" } 2023-11-20 08:44:56,598:DEBUG:acme.client:Storing nonce: jXyutbsn0CaNsRDxFJnrYFTAQ2NW3meQ7evRDDBHSMWhMyKw3nk 2023-11-20 08:44:56,598:DEBUG:acme.client:JWS payload: b'' 2023-11-20 08:44:56,604:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612771016: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic24wQ2FOc1JEeEZKbnJZRlRBUTJOVzNtZVE3ZXZSRERCSFNNV2hNeUt3M25rIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI3NzEwMTYifQ", "signature": "L4hxwRnhe0Cii__f9tmmq7VtQ7SxjQPz-jlWgY3QOr-Rz9dBT-rol8R3376Ms1GDQ9QMNBETe-Mi13BDOosDpCmb1glcs3jhAClnOYM9vEG9BNALpxrwpwDBUoQPUFQl0i6EhBsm-fa0eOJdDheVco7MJk5c5hO1wajangwGGL9D48WknBj7VxxnTFm5nm4wf8jZZNm6F7SfuChgL8Uy4x75ySLBYrivk-ZhLjElqF7wOMgjoxbfMTb4uVx0O6DpDHkSoQUVoDKCPHgmVC28EWqPKTlCCqJQ8qTA3W2LS-GnxXbgvHFDf3dg9Ar_wQgtSecU-fDnNulMAMhfV5Nr3Q", "payload": "" } 2023-11-20 08:44:56,784:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612771016 HTTP/1.1" 200 805 2023-11-20 08:44:56,784:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Mon, 20 Nov 2023 07:44:56 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnFUdUJz1me2kzf5jn37BnAkFHBoJeIvzPTg2nl0fwAKI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:42:29Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612771016/NXssXA", "token": "fBQUbQwPgLxd5Q_xY3yj1324L93-p0HcHbbwXfA2ky8" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612771016/srEC8w", "token": "fBQUbQwPgLxd5Q_xY3yj1324L93-p0HcHbbwXfA2ky8" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612771016/pqGTdw", "token": "fBQUbQwPgLxd5Q_xY3yj1324L93-p0HcHbbwXfA2ky8" } ] } 2023-11-20 08:44:56,785:DEBUG:acme.client:Storing nonce: jXyutbsnFUdUJz1me2kzf5jn37BnAkFHBoJeIvzPTg2nl0fwAKI 2023-11-20 08:44:56,785:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-20 08:44:56,786:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2023-11-20 08:44:56,786:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-20 08:44:56,787:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-20 08:44:56,788:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 08:44:56,788:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-20 08:44:56,788:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-20 08:44:56,789:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-20 08:44:56,790:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-20 08:44:56,790:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2023-11-20 08:44:56,791:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2023-11-20 08:44:56,802:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2023-11-20 08:44:56,804:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)