2023-11-18 11:20:33,800:DEBUG:certbot._internal.main:certbot version: 1.6.0 2023-11-18 11:20:33,800:DEBUG:certbot._internal.main:Arguments: [] 2023-11-18 11:20:33,800:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2023-11-18 11:20:34,595:DEBUG:certbot._internal.log:Root logging level set at 20 2023-11-18 11:20:34,596:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2023-11-18 11:20:34,631:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2023-11-18 11:20:34,667:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-18 11:20:34,933:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-18 11:20:34,935:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is signed by the certificate's issuer. 2023-11-18 11:20:34,951:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is: OCSPCertStatus.GOOD 2023-11-18 11:20:34,959:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:23 UTC. 2023-11-18 11:20:34,960:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-18 11:20:34,960:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-18 11:20:34,964:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-18 11:20:34,965:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-18 11:20:34,965:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-18 11:20:34,972:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-18 11:20:34,973:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-18 11:20:34,975:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-18 11:20:35,445:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-18 11:20:35,446:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:20:39 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "fSNgHyzuZR8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-18 11:20:35,446:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-18 11:20:39,749:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6882_key-certbot.pem 2023-11-18 11:20:43,666:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6880_csr-certbot.pem 2023-11-18 11:20:43,667:DEBUG:acme.client:Requesting fresh nonce 2023-11-18 11:20:43,667:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-18 11:20:43,820:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-18 11:20:43,820:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:20:47 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfitKFPGx4BM4Xd_o3KNsPXPtXGf6ctMijVAmT2F74YGN4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-18 11:20:43,820:DEBUG:acme.client:Storing nonce: v0bMowfitKFPGx4BM4Xd_o3KNsPXPtXGf6ctMijVAmT2F74YGN4 2023-11-18 11:20:43,821:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2023-11-18 11:20:43,826:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93Zml0S0ZQR3g0Qk00WGRfbzNLTnNQWFB0WEdmNmN0TWlqVkFtVDJGNzRZR040IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "A1IV7Jjhw6KbtgSFpy44yJUeCHd1SHoXVvvU-_gSBmsJvCYF3B-Bej83CKwC7ngbPgeufnxeWWtXtgf5lue7R_0BAhLbW3cj_4u4M9vYdp0st0p3GS9pAs55avbDntM4W_Jt0dR8c-yFElx0NDKLn-aeInph0ZHfidcQYOIWK4xyd9PNnc6BhpYUHM4dShsOozUM7ZKmWnRK5CrviOwpu2pBDjEsf_cykqXuqDwnq9ReQen0BR0T5owAg6VcJywpj3CjVJl-qM-yVwRWXjzEdcM-L5GEHnMk5SmZUukkw4fCOQ-kLM_USzybKYBHPBL7Ql7QPyK00zGIBomVOTDkVQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-18 11:20:44,016:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2023-11-18 11:20:44,017:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 18 Nov 2023 10:20:47 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054336746 Replay-Nonce: nbWKegf8lkpUEZnoxJ8Yalkja7QWqnRwF_YIf3kNDkJ2xCNBoOQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:40:34Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612303016" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054336746" } 2023-11-18 11:20:44,017:DEBUG:acme.client:Storing nonce: nbWKegf8lkpUEZnoxJ8Yalkja7QWqnRwF_YIf3kNDkJ2xCNBoOQ 2023-11-18 11:20:44,017:DEBUG:acme.client:JWS payload: b'' 2023-11-18 11:20:44,023:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612303016: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhsa3BVRVpub3hKOFlhbGtqYTdRV3FuUndGX1lJZjNrTkRrSjJ4Q05Cb09RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTIzMDMwMTYifQ", "signature": "pUkjdssOmju4lDRFdd1jdG_Q82h6lCeQNK1_554WJHKZs7bS_85cVLTIh5nmdabiQNYpHtUeTgwLWv6zzbgY5fu-0picRGcXZvGlvlJS6u_qGksWc4n05WwUue7NZVbTqwZHyMkp2EkR7WDOu-g7Me2Pfo-AMjQhHsQ06XXrPcI1qDPGG1tXcqsGguAI69PApc9TXIQ---0-JuMYnXk3CEuMeYM5Yp0AXuTc4a6iyTl4ksyS1baiC1P2h2_0drhYc3twpbvog9fionh-l4VtmBRPwo405Kway30V8R1p5uZXcXjgxBCl1Z33aQGv6yWNupf4L_oi8xCFKw8cg4K6Bg", "payload": "" } 2023-11-18 11:20:44,194:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612303016 HTTP/1.1" 200 810 2023-11-18 11:20:44,196:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:20:47 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiNDKmAaFeWyGCfdyhhESl_nlgK3JfwvLe56vpk8UehAY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:40:34Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612303016/SE_DLA", "token": "pQaTT9XorHa5ZWDeypT0Hc0yUXwYdMo60L_Xs22rZ0Q" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612303016/Wku45g", "token": "pQaTT9XorHa5ZWDeypT0Hc0yUXwYdMo60L_Xs22rZ0Q" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612303016/hUBGgQ", "token": "pQaTT9XorHa5ZWDeypT0Hc0yUXwYdMo60L_Xs22rZ0Q" } ] } 2023-11-18 11:20:44,196:DEBUG:acme.client:Storing nonce: v0bMowfiNDKmAaFeWyGCfdyhhESl_nlgK3JfwvLe56vpk8UehAY 2023-11-18 11:20:44,197:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-18 11:20:44,198:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2023-11-18 11:20:44,198:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-18 11:20:44,198:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-18 11:20:44,202:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-18 11:20:44,202:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-18 11:20:44,202:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-18 11:20:44,202:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-18 11:20:44,207:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-18 11:20:44,244:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-18 11:20:44,660:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-18 11:20:44,662:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-18 11:20:44,663:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-18 11:20:44,667:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:36 UTC. 2023-11-18 11:20:44,667:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-18 11:20:44,667:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-18 11:20:44,671:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-18 11:20:44,671:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-18 11:20:44,672:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-18 11:20:44,675:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-18 11:20:44,676:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-18 11:20:44,678:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-18 11:20:45,130:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-18 11:20:45,131:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:20:48 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "5Q5U4H3Vntg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-18 11:20:45,131:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-18 11:20:48,881:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6883_key-certbot.pem 2023-11-18 11:20:52,203:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6881_csr-certbot.pem 2023-11-18 11:20:52,204:DEBUG:acme.client:Requesting fresh nonce 2023-11-18 11:20:52,204:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-18 11:20:52,354:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-18 11:20:52,356:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:20:56 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf83N6A_S68VoKhuUikEYTGujX7kQ79GrrphKMqEj3E0Cs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-18 11:20:52,356:DEBUG:acme.client:Storing nonce: nbWKegf83N6A_S68VoKhuUikEYTGujX7kQ79GrrphKMqEj3E0Cs 2023-11-18 11:20:52,356:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2023-11-18 11:20:52,362:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjgzTjZBX1M2OFZvS2h1VWlrRVlUR3VqWDdrUTc5R3JycGhLTXFFajNFMENzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Mh85kONd-r2K-gjLAPI_pXT_LGybIElv4rW_e-W-Oe7RuVufh3L7qcBvEYhvsLy5uKFCwvTJhHjbh8iENNAwjqwHcl1DCv-jpzVBwD698m6RiKEWVWZIa7kFl_fDsw74Vym7IcCnVmpALlCGsp5OP6MK0Rx-m6khtEbs8P74y_7JhYV_m4EE_HFYhVxPtJynJ_QlmKDRJcDDT4syYmiYf-pHfvXGh9emhxa9feKIgDwOKG3ImX2-G1Jm1juNPjn8WdoyvlaPhLxDT1ANftZ7z0ThGUCljey92rI-iSLvzAcdve6ePP81w2UHVBh9XtMqNx6-Dn3xwDydm7VaFWr8jQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-18 11:20:52,620:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2023-11-18 11:20:52,621:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 18 Nov 2023 10:20:56 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054364216 Replay-Nonce: v0bMowfiY7B6BKfCTZOID3WdlVEVdWtapEleFuI3wlefCCUHO3M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:40:44Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612339826" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054364216" } 2023-11-18 11:20:52,622:DEBUG:acme.client:Storing nonce: v0bMowfiY7B6BKfCTZOID3WdlVEVdWtapEleFuI3wlefCCUHO3M 2023-11-18 11:20:52,622:DEBUG:acme.client:JWS payload: b'' 2023-11-18 11:20:52,630:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612339826: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlZN0I2QktmQ1RaT0lEM1dkbFZFVmRXdGFwRWxlRnVJM3dsZWZDQ1VITzNNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTIzMzk4MjYifQ", "signature": "x-Pl3WSc9B7CUomDjk01sNafSsjmRAEjVKMjzPZFuqi4fzTAcUuIiXCgM7spBAECp0daujrCH77wivuY6FBQ3RD4Vi-isORQFwHAJrwLpPKxXpxcgtw4lz1wQgHvlCQpJ1QtoEHBIWxDxqfrzSBX3ze6R0yYBq3TF_V_DC1mIWVLduOKvGnQ7Tgc0Ncvhl7G_RMRkWt9sZVwFhwUXS9Q-He0s05S9c6ghe7fp94caDvfqzahIRUQkq0nD1VfV5rfc_YRWsdIdaTxUC6r6AcqLPRC-8Dzld06ihcZ2Mugc01kzaLJrtpG9t4MpLX886VwGuCI9dv8QJQZGpCdvXpexA", "payload": "" } 2023-11-18 11:20:52,788:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612339826 HTTP/1.1" 200 804 2023-11-18 11:20:52,789:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:20:56 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8zwN5JkRjjpQIkIkR6sONgbg2ib5FlX0FsvBIueHk4Jg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:40:44Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612339826/iaWzYw", "token": "lZ4sjyuE91eCR82aOexpOm4No3LJXeuqBiMNXsnHG7w" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612339826/b2lhHw", "token": "lZ4sjyuE91eCR82aOexpOm4No3LJXeuqBiMNXsnHG7w" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612339826/4q2BkQ", "token": "lZ4sjyuE91eCR82aOexpOm4No3LJXeuqBiMNXsnHG7w" } ] } 2023-11-18 11:20:52,790:DEBUG:acme.client:Storing nonce: nbWKegf8zwN5JkRjjpQIkIkR6sONgbg2ib5FlX0FsvBIueHk4Jg 2023-11-18 11:20:52,791:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-18 11:20:52,792:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2023-11-18 11:20:52,792:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-18 11:20:52,793:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-18 11:20:52,794:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-18 11:20:52,795:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-18 11:20:52,795:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-18 11:20:52,796:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-18 11:20:52,798:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-18 11:20:52,847:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-18 11:20:53,197:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-18 11:20:53,198:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-18 11:20:53,199:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-18 11:20:53,203:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:49 UTC. 2023-11-18 11:20:53,203:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-18 11:20:53,203:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-18 11:20:53,207:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-18 11:20:53,207:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-18 11:20:53,208:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-18 11:20:53,212:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-18 11:20:53,212:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-18 11:20:53,214:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-18 11:20:53,744:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-18 11:20:53,745:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:20:57 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "RStNTefY6Po": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-18 11:20:53,747:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-18 11:20:57,247:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6884_key-certbot.pem 2023-11-18 11:21:00,631:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6882_csr-certbot.pem 2023-11-18 11:21:00,632:DEBUG:acme.client:Requesting fresh nonce 2023-11-18 11:21:00,632:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-18 11:21:00,809:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-18 11:21:00,810:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:21:04 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnYpJtf-IW7VvhUftDzctcEuI6cRZTv7KmTdQMnL1Db2A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-18 11:21:00,810:DEBUG:acme.client:Storing nonce: jXyutbsnYpJtf-IW7VvhUftDzctcEuI6cRZTv7KmTdQMnL1Db2A 2023-11-18 11:21:00,810:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2023-11-18 11:21:00,817:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25ZcEp0Zi1JVzdWdmhVZnREemN0Y0V1STZjUlpUdjdLbVRkUU1uTDFEYjJBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "aytNlX6RfGPfEYpeC7jQc2cg-jPyTVdkB8q6tyQ-0efd_J0J0iY4MR2gG0lWSi_buh7bVkg4My_3JHFoNfSjyXRC8JdTbcg7NjHozyWHD827ppy9aAV197p2LsK-QuhRuy40vXJm0C4s16mz0KSjkQF_imxwWwJyW6v88euI3d1EWbj3jgZDE41la7NFRsZM3eqqX9JzU9Dak0zmCOhVrOZtDVnRdtiUfHKrRxCdVFrbde_ATtiukdWmRdLuFsaPzf_inw1pJ5Ea8K8tlIY02lfbOFr9mUpYYQOFMS5P3GhRvQn56RXcOtnM5e5iKfj5eN-IENhBVJF4FQLf728V4Q", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-18 11:21:01,018:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2023-11-18 11:21:01,019:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 18 Nov 2023 10:21:04 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054392386 Replay-Nonce: jXyutbsn2AGcN8MVEIt8NOQLB8VNt64Kg2V0aAW4YH_PysURtlE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:40:54Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612379486" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054392386" } 2023-11-18 11:21:01,019:DEBUG:acme.client:Storing nonce: jXyutbsn2AGcN8MVEIt8NOQLB8VNt64Kg2V0aAW4YH_PysURtlE 2023-11-18 11:21:01,020:DEBUG:acme.client:JWS payload: b'' 2023-11-18 11:21:01,030:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612379486: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic24yQUdjTjhNVkVJdDhOT1FMQjhWTnQ2NEtnMlYwYUFXNFlIX1B5c1VSdGxFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTIzNzk0ODYifQ", "signature": "pIo1BRxY1qkUVu-aEn63fYwaws6bpAx7PoMH7cdEoAElHiKelOzuDrpUj0aaEC6bxNtLnr9zCSL4RliXcAliLmiz26XMVX2FoXTJlvqFtwUflIzGX672vazw_qhoz5wvnpi8rt7EchpOBI1-xzVqbfl9YFo74-hJJHZK-qiUMmLcVdVeG-mQraJsmOKc7U9naNPesHvowaIWcGIvhV7shsB0rq5H9Ct-4Dw02hvrrnCIiB3fBK4wThD5i3aAWKo42AYD9FBNHtXyxxBwTadnSpXLV_UF1cszvjxmmFKaxFNMgYthDPfbaBP3gfi0A3DP1RKrstYuBaQYAiKLOWtW4w", "payload": "" } 2023-11-18 11:21:01,211:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612379486 HTTP/1.1" 200 807 2023-11-18 11:21:01,211:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:21:04 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsndculOTHlibYwLheuVLXXm1e5UyneQhTrHy0rlV3fglU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:40:54Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612379486/az4Vdg", "token": "cudl-UJkA1ZG6E5Za_MtH1igwT5c-ctyXDfDcgUpCmc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612379486/Zk1DuA", "token": "cudl-UJkA1ZG6E5Za_MtH1igwT5c-ctyXDfDcgUpCmc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612379486/MleojA", "token": "cudl-UJkA1ZG6E5Za_MtH1igwT5c-ctyXDfDcgUpCmc" } ] } 2023-11-18 11:21:01,212:DEBUG:acme.client:Storing nonce: jXyutbsndculOTHlibYwLheuVLXXm1e5UyneQhTrHy0rlV3fglU 2023-11-18 11:21:01,212:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-18 11:21:01,212:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2023-11-18 11:21:01,213:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-18 11:21:01,213:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-18 11:21:01,214:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-18 11:21:01,214:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-18 11:21:01,214:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-18 11:21:01,214:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-18 11:21:01,215:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-18 11:21:01,263:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-18 11:21:01,286:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-18 11:21:01,288:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-18 11:21:01,288:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-18 11:21:01,293:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:02 UTC. 2023-11-18 11:21:01,293:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-18 11:21:01,293:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-18 11:21:01,298:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-18 11:21:01,298:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-18 11:21:01,298:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-18 11:21:01,302:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-18 11:21:01,303:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-18 11:21:01,305:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-18 11:21:01,763:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-18 11:21:01,764:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:21:05 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "-iZSVB35b3U": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-18 11:21:01,764:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-18 11:21:05,319:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6885_key-certbot.pem 2023-11-18 11:21:08,708:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6883_csr-certbot.pem 2023-11-18 11:21:08,709:DEBUG:acme.client:Requesting fresh nonce 2023-11-18 11:21:08,709:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-18 11:21:08,862:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-18 11:21:08,863:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:21:12 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiNHOuZazp6IufDwOr4RWvpNSJgQ1GDz5mozBz8YD5p-Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-18 11:21:08,864:DEBUG:acme.client:Storing nonce: v0bMowfiNHOuZazp6IufDwOr4RWvpNSJgQ1GDz5mozBz8YD5p-Q 2023-11-18 11:21:08,864:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2023-11-18 11:21:08,874:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlOSE91WmF6cDZJdWZEd09yNFJXdnBOU0pnUTFHRHo1bW96Qno4WUQ1cC1RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ffIFZ0ozwZOgySyxvJY42Ke93SGBhSBFoAACxLLyIJNNgX6tTdiXV5aXfvhPleK5UNSf4umlIxkX5afOKOWBNg_DqivuY1LhRNiiYQwbUrES9mWOY_MZa7SxRZmPHDWrm8o7FnmRIg4Isb33wFUqfodE5ePu2dXOvAqBtpnCehcu848l37jUc83SPIY-fAL-1sbzmFu0BmnV7w6q4STUJrG3ur46dWeNkFvU-TkR36nuJBC3a2E176RkKGFfvEz4z_eamw9lDbRYkHnPrGfcc6caD4nLqfsCKCyv-IJBPLhV4gb_Y2aLOj_XmBHKXFknl7uCoxYbeoeNN3IYz6tvKQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-18 11:21:09,056:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2023-11-18 11:21:09,056:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 18 Nov 2023 10:21:12 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054424916 Replay-Nonce: v0bMowfiI6CBc2BxHhcK8n0xd7tOxNVwFwZM4cLRBz6WfIKeBPo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:04Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612422406" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054424916" } 2023-11-18 11:21:09,057:DEBUG:acme.client:Storing nonce: v0bMowfiI6CBc2BxHhcK8n0xd7tOxNVwFwZM4cLRBz6WfIKeBPo 2023-11-18 11:21:09,057:DEBUG:acme.client:JWS payload: b'' 2023-11-18 11:21:09,063:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612422406: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlJNkNCYzJCeEhoY0s4bjB4ZDd0T3hOVndGd1pNNGNMUkJ6NldmSUtlQlBvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI0MjI0MDYifQ", "signature": "G5k7E104DspbBPDxeB8cFDW5940UQ2D6X6CmJh9AJsV4GA_tN5cktSuS34aYFWi7O7mRAiIsl6RqGUz8_qXtT7TE37w4_yBZqip0aXPwQMqbbcW-JGYmh9pTc84EunxYwy5MTLqzFF7zdHoKDFD0-OkFZ3IfDnp4gFsBa2QQu1dwl2Zpd4iuPMghqkrHT-Bb7pno4VwSxlK9_UINx5QMmHiO-_td_2Yb4ToWcxsaOiUQLFPn_JufW7xL5FHCqWsZmpkqsAiJa-AETeXJhDtAM3M9f-JX7s6mq39_lqZaH0gNMrmaeDtmknj7Dh4xk_8qnkAnIO-cTqYlo1K09WrkCQ", "payload": "" } 2023-11-18 11:21:09,220:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612422406 HTTP/1.1" 200 801 2023-11-18 11:21:09,220:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:21:12 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfixk_h3_LHWlKGstp6rzMjAzFdpsWxpqTxy5Lys4Q4Bwk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:04Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612422406/ky6kcw", "token": "-IL9_EB3uvFRDRErY0ET1SQxqNaHG_FMeRx1kbAjZLg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612422406/weBWyw", "token": "-IL9_EB3uvFRDRErY0ET1SQxqNaHG_FMeRx1kbAjZLg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612422406/I55gjQ", "token": "-IL9_EB3uvFRDRErY0ET1SQxqNaHG_FMeRx1kbAjZLg" } ] } 2023-11-18 11:21:09,221:DEBUG:acme.client:Storing nonce: v0bMowfixk_h3_LHWlKGstp6rzMjAzFdpsWxpqTxy5Lys4Q4Bwk 2023-11-18 11:21:09,221:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-18 11:21:09,221:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2023-11-18 11:21:09,222:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-18 11:21:09,222:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-18 11:21:09,222:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-18 11:21:09,223:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-18 11:21:09,223:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-18 11:21:09,223:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-18 11:21:09,224:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-18 11:21:09,271:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-18 11:21:09,527:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-18 11:21:09,529:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-18 11:21:09,529:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-18 11:21:09,534:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:14 UTC. 2023-11-18 11:21:09,534:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-18 11:21:09,534:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-18 11:21:09,539:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-18 11:21:09,539:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-18 11:21:09,539:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-18 11:21:09,543:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-18 11:21:09,544:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-18 11:21:09,546:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-18 11:21:10,069:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-18 11:21:10,070:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:21:13 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "WY0gnq1tpK0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-18 11:21:10,070:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-18 11:21:13,767:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6886_key-certbot.pem 2023-11-18 11:21:17,111:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6884_csr-certbot.pem 2023-11-18 11:21:17,111:DEBUG:acme.client:Requesting fresh nonce 2023-11-18 11:21:17,111:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-18 11:21:17,286:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-18 11:21:17,287:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:21:21 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsncBrzN9NylWenjE5Ye92NHsNEDLFzHkUWGjhoNUf_r5M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-18 11:21:17,287:DEBUG:acme.client:Storing nonce: jXyutbsncBrzN9NylWenjE5Ye92NHsNEDLFzHkUWGjhoNUf_r5M 2023-11-18 11:21:17,288:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2023-11-18 11:21:17,293:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25jQnJ6TjlOeWxXZW5qRTVZZTkyTkhzTkVETEZ6SGtVV0dqaG9OVWZfcjVNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "c_vjUPY0y1ip7Jg-v0AvJvXmR8M6tghnsiJZsZ4MYT6E2KJlNnF6WubYR53BSy9DkpFVg8FiB-Ngj3umbnTOPHvvlDVlwR62kpSlmVAYk0mGXWcFU05AS5ZdAvLqu6olnU7KVPEc53BCHFIPZRvkvnA5-EQH75nC0HTWy_H8xvinvtLkuLsg2UohkSYETHEYHXJI2sFU24oNjtbgXNe_oRGeO7quv4PF47JfNCmSEw5VsSiGfNymLVwJdoRP9FUZlNQkMh1166_DzxzM0l8y19lK7Ldm674UL8CmHHs6d2BT9GQJ6okHjRUVmQrn0cI0d8bIwgTRp2MWeak1ebP4mg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-18 11:21:17,488:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-18 11:21:17,489:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 18 Nov 2023 10:21:21 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054455886 Replay-Nonce: jXyutbsnxGsuIDRQzfbQkXqwLULK73qi7YoUR6qYYcg_CIO9F7Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:13Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612463596" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054455886" } 2023-11-18 11:21:17,489:DEBUG:acme.client:Storing nonce: jXyutbsnxGsuIDRQzfbQkXqwLULK73qi7YoUR6qYYcg_CIO9F7Y 2023-11-18 11:21:17,489:DEBUG:acme.client:JWS payload: b'' 2023-11-18 11:21:17,496:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612463596: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic254R3N1SURSUXpmYlFrWHF3TFVMSzczcWk3WW9VUjZxWVljZ19DSU85RjdZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI0NjM1OTYifQ", "signature": "qXSGwqh4tfv4Q5oH1Xs4ffi_pzWVV4oH1zXtOyhOKKk2q5U_kd_dJyIpBAYd-bazRi8v_wZSOqunN3S1dAt85lcs4baTr8JwkAK3Ziq3QgCJJJWZW1rR4spsaInv99Ax2juKCFhdbIsoHGvdyHAzhFKEjfxPez27qroGrA6HTHfxSYr6eHDI9uIHrfn20ZZEeh69BuVjYlYJMo_N7ZxSJVY7WvG5lWxFOv_yayLgB6ckXcLRmeCST8TrSDLIYxuGjlbsA-oQko4FV1d4nOfWQlj0ar5P5et6jRlWUAYqXO2EyWIwRDrd5USiJv2-uB5S_66MMWJw1jvZenLrn2tCoQ", "payload": "" } 2023-11-18 11:21:17,673:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612463596 HTTP/1.1" 200 805 2023-11-18 11:21:17,674:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:21:21 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnomEyhLxMsWpeZoYROSnxLsJoqxpTrCFxpObmbwLYP3k X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:13Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612463596/6wvlBA", "token": "urpYTB_ISPnX0ZBqpybU40fCrJsoHs7T5gniMi-FKAI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612463596/WBsXnQ", "token": "urpYTB_ISPnX0ZBqpybU40fCrJsoHs7T5gniMi-FKAI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612463596/cdtfow", "token": "urpYTB_ISPnX0ZBqpybU40fCrJsoHs7T5gniMi-FKAI" } ] } 2023-11-18 11:21:17,674:DEBUG:acme.client:Storing nonce: jXyutbsnomEyhLxMsWpeZoYROSnxLsJoqxpTrCFxpObmbwLYP3k 2023-11-18 11:21:17,675:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-18 11:21:17,675:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2023-11-18 11:21:17,676:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-18 11:21:17,676:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-18 11:21:17,677:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-18 11:21:17,677:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-18 11:21:17,677:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-18 11:21:17,678:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-18 11:21:17,679:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-18 11:21:17,728:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-18 11:21:17,955:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-18 11:21:17,956:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-18 11:21:17,957:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-18 11:21:17,962:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:27 UTC. 2023-11-18 11:21:17,962:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-18 11:21:17,962:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-18 11:21:17,968:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-18 11:21:17,968:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-18 11:21:17,968:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-18 11:21:17,973:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-18 11:21:17,973:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-18 11:21:17,975:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-18 11:21:18,416:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-18 11:21:18,416:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:21:22 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "lreDDhbzqDM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-18 11:21:18,417:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-18 11:21:21,856:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6887_key-certbot.pem 2023-11-18 11:21:25,241:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6885_csr-certbot.pem 2023-11-18 11:21:25,242:DEBUG:acme.client:Requesting fresh nonce 2023-11-18 11:21:25,242:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-18 11:21:25,388:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-18 11:21:25,390:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:21:29 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8P-W7ZMo4wZCcIJH0SQoZRacUPCsscl2B3yV9bBx33nk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-18 11:21:25,390:DEBUG:acme.client:Storing nonce: nbWKegf8P-W7ZMo4wZCcIJH0SQoZRacUPCsscl2B3yV9bBx33nk 2023-11-18 11:21:25,391:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2023-11-18 11:21:25,403:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhQLVc3Wk1vNHdaQ2NJSkgwU1FvWlJhY1VQQ3NzY2wyQjN5VjliQngzM25rIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "KmWBTNVRQZTxg4fPn9hsl5vVTZWYnLlZHcQxhyKrP1QR4gP_FqbbRUVrLPtREtpHP3AZWijGqhIvM_qT_ZFpmN-PV4euF3SLNO0DuwunfqRGl1JkrPZH4lyyg7hVKLeTvH0iWZMh6IF_n3QA9JGLxlQdgBBcDqyW4BZHOvvKAyyWBjZU3ywzw-_TzLspZQYQJ77hoo5F6016W5ACS9fUBjljmWuAxwy5iziwKVWdNkvDGZJaMiyVVe6YfV-NPARnq5Thq82yswtJ2EB7wF9rUpAOraPpLMdJuCgzlN5UjIBuFrTkJmLh_GVTFn4Sl0q7kNUBdWulrJYxCQM1o6OjEw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-18 11:21:25,566:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2023-11-18 11:21:25,567:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 18 Nov 2023 10:21:29 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054483926 Replay-Nonce: v0bMowfirp8vhNuRH2pA90SqWuXBuBHISZmgycK2jqT3wHKVOTE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:23Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612503666" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054483926" } 2023-11-18 11:21:25,567:DEBUG:acme.client:Storing nonce: v0bMowfirp8vhNuRH2pA90SqWuXBuBHISZmgycK2jqT3wHKVOTE 2023-11-18 11:21:25,567:DEBUG:acme.client:JWS payload: b'' 2023-11-18 11:21:25,572:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612503666: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlycDh2aE51UkgycEE5MFNxV3VYQnVCSElTWm1neWNLMmpxVDN3SEtWT1RFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI1MDM2NjYifQ", "signature": "J6t43d__MnWL1s-KSu8pHGCDw2mmDkBlq7kUcpxvXYq3njIgtlXyqQ16E1j-sWI9rduLhmMCiDl61M24FdUMtBEwJ9WFqJe6Z40CqPwD7sljgnOAGXx656jRWWSH37GZsIteLfNNAe3RsK5zSipPrs0EUp_2K9cNtrqFuMk0wU3Y8aK7F1OlPnLNsrDQ8ZuRaZ--cZ89blLb3o0FW-CMOnmAS2iwJun0Mo3oEfdSLQf8owRCBZzr9YIWD7cC91yx0Fo7zpj1XeEMLpQW9-2wnUdrWVZxqNWqORG6iGBeHLQzv2jJxGjkDvEsDCI_g1cV5V21kpcU6Ycf48-jWsyB_A", "payload": "" } 2023-11-18 11:21:25,723:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612503666 HTTP/1.1" 200 809 2023-11-18 11:21:25,724:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:21:29 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiI4iooE8v9aH8ZpmJkZ5-W0Suu7hWzcjUjV7bCRlFYTk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:23Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612503666/EfdATg", "token": "t3ldTTjSTD5p1ZXdigrc7Y9ujwScKzlEFH7-_2FHjZc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612503666/HlUCsw", "token": "t3ldTTjSTD5p1ZXdigrc7Y9ujwScKzlEFH7-_2FHjZc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612503666/hGYrLw", "token": "t3ldTTjSTD5p1ZXdigrc7Y9ujwScKzlEFH7-_2FHjZc" } ] } 2023-11-18 11:21:25,724:DEBUG:acme.client:Storing nonce: v0bMowfiI4iooE8v9aH8ZpmJkZ5-W0Suu7hWzcjUjV7bCRlFYTk 2023-11-18 11:21:25,725:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-18 11:21:25,726:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2023-11-18 11:21:25,726:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-18 11:21:25,727:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-18 11:21:25,727:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-18 11:21:25,728:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-18 11:21:25,728:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-18 11:21:25,728:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-18 11:21:25,730:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-18 11:21:25,772:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-18 11:21:26,159:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-18 11:21:26,161:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-18 11:21:26,161:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-18 11:21:26,166:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:41 UTC. 2023-11-18 11:21:26,167:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-18 11:21:26,167:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-18 11:21:26,177:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-18 11:21:26,178:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-18 11:21:26,178:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-18 11:21:26,182:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-18 11:21:26,183:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-18 11:21:26,185:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-18 11:21:26,634:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-18 11:21:26,635:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:21:30 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "A-Hmg3Ua1kE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-18 11:21:26,635:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-18 11:21:30,186:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6888_key-certbot.pem 2023-11-18 11:21:33,536:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6886_csr-certbot.pem 2023-11-18 11:21:33,536:DEBUG:acme.client:Requesting fresh nonce 2023-11-18 11:21:33,536:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-18 11:21:33,686:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-18 11:21:33,687:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:21:37 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiuzzQ4OvL0RPQycB-TGomTsVgQmEmzPglEDGUnCqdU5g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-18 11:21:33,687:DEBUG:acme.client:Storing nonce: v0bMowfiuzzQ4OvL0RPQycB-TGomTsVgQmEmzPglEDGUnCqdU5g 2023-11-18 11:21:33,687:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2023-11-18 11:21:33,693:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93Zml1enpRNE92TDBSUFF5Y0ItVEdvbVRzVmdRbUVtelBnbEVER1VuQ3FkVTVnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "NAr7KM1nyku-ccrok5QBNhqkVZ-zbXKNiCuFQkwy9RT1cQGVleMX9o8p9UV2H75tWUV5diBHsDzbHa2EbuwkQzV5bDWbquf-NnAvRRE6wGbP11kauaSOfvM5qQOg3xsXx8O44mrOAqAlpSYIJKApiWW5E9w9JZB5p6hwgwx2iAN3AGeE1Ve_zSMSsDVXwj4gZG9Su5rcelS28VHvwq8ocQjGx2BT_u5yyAbf249J0dyyQFQLukeE71SIlkB_sfuxVMKy4yTpydB0CDlr-_R8qkkSFc5X6GjokZ6k1sJCo-9cAa-82QLPQ1qMNKOs5JroaaFiaSIL4MYIaldf32jofQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-18 11:21:33,859:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2023-11-18 11:21:33,860:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 18 Nov 2023 10:21:37 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054508996 Replay-Nonce: nbWKegf8WA7LteB3O_LAzpoMrw34k4cQiRv_zAFVu64EDQYrJ1o X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:32Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612537686" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054508996" } 2023-11-18 11:21:33,860:DEBUG:acme.client:Storing nonce: nbWKegf8WA7LteB3O_LAzpoMrw34k4cQiRv_zAFVu64EDQYrJ1o 2023-11-18 11:21:33,861:DEBUG:acme.client:JWS payload: b'' 2023-11-18 11:21:33,868:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612537686: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjhXQTdMdGVCM09fTEF6cG9NcnczNGs0Y1FpUnZfekFGVnU2NEVEUVlySjFvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI1Mzc2ODYifQ", "signature": "sglwk-2XjOXUMJd3lCWGdys81Z_X9BoH8jLFlnY2wHPE2Ui3JPaokx8LJDpyp_gB70CnmQIdfKOJDWLT5gE2tgmAnLIg0u8sFfaxb7d65p2Y-cHY7zKcsz-53aTZdjSmi1eKD8y3kZnXQKoUstNdiQ0zYZYkIDpP32ZQE_SRnuFEDWeSyAS0EAfVhtCJPKuGRJTMhpdjFG21cM4L53ygnMrVLNCyi-LTm6aD56V2yJIHWeEwRHOYVHkguRd_4V64dKGa5c06KjTfBTf8GiFTENaFpVYD0fhbQVEHSiGSyjj0MBsvLhroiTWdOJhOcAZWyVrzR0q3fvqVZR32xdVt_A", "payload": "" } 2023-11-18 11:21:34,023:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612537686 HTTP/1.1" 200 806 2023-11-18 11:21:34,024:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:21:37 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8coKHuEyvRnxnAQRd15D4AINYBWfhG08yfJ5LF8KK2Is X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:32Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612537686/EQ01mA", "token": "Ljm0jeSPr8yxmsFdnztDCFHUg_abiozhTXTTTEUuJuY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612537686/E16lcw", "token": "Ljm0jeSPr8yxmsFdnztDCFHUg_abiozhTXTTTEUuJuY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612537686/vtzF_w", "token": "Ljm0jeSPr8yxmsFdnztDCFHUg_abiozhTXTTTEUuJuY" } ] } 2023-11-18 11:21:34,024:DEBUG:acme.client:Storing nonce: nbWKegf8coKHuEyvRnxnAQRd15D4AINYBWfhG08yfJ5LF8KK2Is 2023-11-18 11:21:34,025:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-18 11:21:34,026:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2023-11-18 11:21:34,026:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-18 11:21:34,026:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-18 11:21:34,027:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-18 11:21:34,027:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-18 11:21:34,028:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-18 11:21:34,028:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-18 11:21:34,029:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-18 11:21:34,075:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2023-11-18 11:21:34,075:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-18 11:21:34,075:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2023-11-18 11:21:34,082:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2023-11-18 11:21:34,084:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2023-11-18 11:21:34,084:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2023-11-18 11:21:34,084:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2023-11-18 11:21:34,084:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2023-11-18 11:21:34,086:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2023-11-18 11:21:34,124:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-18 11:21:34,548:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-18 11:21:34,549:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-18 11:21:34,550:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-18 11:21:34,554:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:56 UTC. 2023-11-18 11:21:34,554:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-18 11:21:34,555:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-18 11:21:34,559:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-18 11:21:34,559:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-18 11:21:34,560:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-18 11:21:34,564:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-18 11:21:34,565:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-18 11:21:34,567:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-18 11:21:35,138:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-18 11:21:35,139:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:21:38 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "KVhyV8UMGFE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-18 11:21:35,139:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-18 11:21:38,735:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6889_key-certbot.pem 2023-11-18 11:21:42,090:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6887_csr-certbot.pem 2023-11-18 11:21:42,091:DEBUG:acme.client:Requesting fresh nonce 2023-11-18 11:21:42,091:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-18 11:21:42,268:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-18 11:21:42,269:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:21:46 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjIuzNntO914qFhyyWIYZhVQZ4IU0v45nVArG9BmDvxR8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-18 11:21:42,269:DEBUG:acme.client:Storing nonce: SFMYLIQjIuzNntO914qFhyyWIYZhVQZ4IU0v45nVArG9BmDvxR8 2023-11-18 11:21:42,269:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2023-11-18 11:21:42,276:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpJdXpObnRPOTE0cUZoeXlXSVlaaFZRWjRJVTB2NDVuVkFyRzlCbUR2eFI4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "TNvBsDYh3cNqaLeXcJtX53O2Uq2Pt8Xuicv4IgpeYRbTBEuJUA1SwP_2hl6ZgeLrgDW0-uAxP7yWKypuHr6-7cQxhvAIxu91eYiXR4wEQFpDJ_w9FWqlyQQ3umwsDmbtMabw-WquC_Lw2BU-gcIluFuibDr5xPc4lwLBsNQpnlsliyaHUurtshA4d9hqhgs4bvLzXKgdRKnJdERFsD0r4A7RLSQ8GbcmmLMEfNEiT0zjl7NN0t5poCHuR2-qKmpRS77VCULIqC2-2qaDa4Q7Uk-8vh51z2qQpFEWa2cPJVZU4FXHEQhb5KlLhEDuc2n_FnZjah9_yWq95QV4yDe3Mw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-18 11:21:42,482:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2023-11-18 11:21:42,483:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 18 Nov 2023 10:21:46 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054534246 Replay-Nonce: SFMYLIQjbCvBtnlx88HMw8IbnAbNGSB_WpzoiDxHLupApQ71qxE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:42Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612574526" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054534246" } 2023-11-18 11:21:42,483:DEBUG:acme.client:Storing nonce: SFMYLIQjbCvBtnlx88HMw8IbnAbNGSB_WpzoiDxHLupApQ71qxE 2023-11-18 11:21:42,483:DEBUG:acme.client:JWS payload: b'' 2023-11-18 11:21:42,488:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612574526: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpiQ3ZCdG5seDg4SE13OElibkFiTkdTQl9XcHpvaUR4SEx1cEFwUTcxcXhFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI1NzQ1MjYifQ", "signature": "urf9LNWZH9PN-dBLxUZ3W-4z_1kG21XAEoczYvju6GqPrvu6zEgyY8HbMvF2Gnkmpa8CB_gQyW_ZvxSoKsPpSKZUN8PUxsUet6bl0tyeA-wkqOkKtwdlfyL7guWVs-BFsQx_oj9MB7Rf5J0dSZbopJlBMUxD5MUr2JF2Cqdh4n-HnmQD0A59guiRkJ8Uc3mnNHgm52PiLna1gfNetgFWjNfoqKUuiwatHOaqGjYI-TQ_GdxbOwspRlg19H-dohsNHuM_p_EMOIECKwWK5MnKWP-nUJ1CqEfpHlv4yT9v6qw0K6kw9fPsK_JK74I7AAROPiLWI8XUhlC8u9t8UB9_2g", "payload": "" } 2023-11-18 11:21:42,670:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612574526 HTTP/1.1" 200 811 2023-11-18 11:21:42,670:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:21:46 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnPKhlzHpqlJsb1Rsvuje8752PA7k1Ir1nSDwRYXFzPmk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:42Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612574526/5letZQ", "token": "BHBPORVyrUrsGlhEnIrTc6lFdf8IW61JSn4cYnoDYfc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612574526/8PjU2A", "token": "BHBPORVyrUrsGlhEnIrTc6lFdf8IW61JSn4cYnoDYfc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612574526/O6CYAw", "token": "BHBPORVyrUrsGlhEnIrTc6lFdf8IW61JSn4cYnoDYfc" } ] } 2023-11-18 11:21:42,670:DEBUG:acme.client:Storing nonce: jXyutbsnPKhlzHpqlJsb1Rsvuje8752PA7k1Ir1nSDwRYXFzPmk 2023-11-18 11:21:42,671:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-18 11:21:42,671:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2023-11-18 11:21:42,672:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-18 11:21:42,672:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-18 11:21:42,673:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-18 11:21:42,673:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-18 11:21:42,673:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-18 11:21:42,673:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-18 11:21:42,674:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-18 11:21:42,711:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-18 11:21:42,992:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-18 11:21:42,993:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-18 11:21:42,994:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-18 11:21:42,998:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:09 UTC. 2023-11-18 11:21:42,999:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-18 11:21:42,999:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-18 11:21:43,003:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-18 11:21:43,004:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-18 11:21:43,004:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-18 11:21:43,008:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-18 11:21:43,008:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-18 11:21:43,010:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-18 11:21:43,461:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-18 11:21:43,463:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:21:47 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "zDsswpq-_eg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2023-11-18 11:21:43,464:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-18 11:21:47,179:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6890_key-certbot.pem 2023-11-18 11:21:50,633:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6888_csr-certbot.pem 2023-11-18 11:21:50,634:DEBUG:acme.client:Requesting fresh nonce 2023-11-18 11:21:50,634:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-18 11:21:50,783:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-18 11:21:50,784:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:21:54 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfi32WKtYsFHL4gpa10rMFd79cE5ffMcI4OznbzCXtEqo4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-18 11:21:50,784:DEBUG:acme.client:Storing nonce: v0bMowfi32WKtYsFHL4gpa10rMFd79cE5ffMcI4OznbzCXtEqo4 2023-11-18 11:21:50,784:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2023-11-18 11:21:50,792:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmkzMldLdFlzRkhMNGdwYTEwck1GZDc5Y0U1ZmZNY0k0T3puYnpDWHRFcW80IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "koWs-wIT2Poeim9GMtMPR7MK9db2iuZ_Gy6EIFQ1dwieyI2uyjKqDxBklQJf3hdUW8ajnoIIghK4ThmxE0tBZ7bITATnL6UrZjQ70LYE6spxgMtQ1Rd1K2YE_ad_FtaN6DZFxwZbD_h01m9u84uphxk8xofxzLaEbQG6LFUty7UYX7Po-fkUgzuggzBkfQ9HC_rF9pHZhn7wt2pbj1-_DR6I5ubjCOAdR8-B46xsG9pHx7fHBuV7OTR32EvSGJh8XRiSAWtiQe30EqCkl556mIq_CTutxNAmxpcvrxf9EdhpQ5yjBdyN7nImtyS8clj0dvf2CK6nTlQ1UXJT3uB4lg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-18 11:21:50,959:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2023-11-18 11:21:50,960:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 18 Nov 2023 10:21:54 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054557496 Replay-Nonce: v0bMowfiLCctcefSKy-MMmaKGE5OOKktcf3xwA8jA91ATr6CYvU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:51Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612606006" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054557496" } 2023-11-18 11:21:50,960:DEBUG:acme.client:Storing nonce: v0bMowfiLCctcefSKy-MMmaKGE5OOKktcf3xwA8jA91ATr6CYvU 2023-11-18 11:21:50,961:DEBUG:acme.client:JWS payload: b'' 2023-11-18 11:21:50,966:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612606006: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlMQ2N0Y2VmU0t5LU1NbWFLR0U1T09La3RjZjN4d0E4akE5MUFUcjZDWXZVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI2MDYwMDYifQ", "signature": "sYqi6dIG73eXtdmwfUoBwurtjzEH-1zukQMtWr1mdfTN6mP_O1jyFrZoa-NCS2fxt6hi4HrTPaTGN1u57lCfpZgHHIAVGW1aK8LYdyYBvFWuch7LVfD2IVvOiHYzG7812UXHuhbjWh3eFGpDhPlDyTio4dR39KnvHfJG8JHFYvA_fIk0e4tILTkarx_ZPVwJ0lxyOaDcVwom7JQbP5hz4wno3rpDp50jd99H_ULDUWccBuWW3H1uLqYLTw-Y7cGsH-p3JmhvmjUcgjPj9Q0Igro964MH5KXvDobGLpLMCPcILz0WsBcQ7TCavzpXvt0cUWBapDN4DcbiGRiXNBTbOA", "payload": "" } 2023-11-18 11:21:51,118:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612606006 HTTP/1.1" 200 810 2023-11-18 11:21:51,119:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:21:54 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: nbWKegf8YHm-CPnwFt-7SS_70gijk0oXhz_UNq0LryDaBA2wr14 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:51Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612606006/8R9vlA", "token": "srB66M3oeWbzzvIHjdwngsK6CxnDqV_EXeQJth9kWQ4" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612606006/fgtMqQ", "token": "srB66M3oeWbzzvIHjdwngsK6CxnDqV_EXeQJth9kWQ4" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612606006/kOODDA", "token": "srB66M3oeWbzzvIHjdwngsK6CxnDqV_EXeQJth9kWQ4" } ] } 2023-11-18 11:21:51,119:DEBUG:acme.client:Storing nonce: nbWKegf8YHm-CPnwFt-7SS_70gijk0oXhz_UNq0LryDaBA2wr14 2023-11-18 11:21:51,120:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-18 11:21:51,120:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2023-11-18 11:21:51,120:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-18 11:21:51,121:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-18 11:21:51,121:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-18 11:21:51,121:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-18 11:21:51,122:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-18 11:21:51,122:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-18 11:21:51,123:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-18 11:21:51,169:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-18 11:21:51,437:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-18 11:21:51,440:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2023-11-18 11:21:51,442:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2023-11-18 11:21:51,446:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:22 UTC. 2023-11-18 11:21:51,446:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-18 11:21:51,447:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-18 11:21:51,453:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-18 11:21:51,453:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-18 11:21:51,454:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-18 11:21:51,459:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-18 11:21:51,459:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-18 11:21:51,461:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-18 11:21:51,990:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-18 11:21:51,991:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:21:55 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "_VyXOpNoYoI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-18 11:21:51,992:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-18 11:21:55,580:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6891_key-certbot.pem 2023-11-18 11:21:58,963:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6889_csr-certbot.pem 2023-11-18 11:21:58,964:DEBUG:acme.client:Requesting fresh nonce 2023-11-18 11:21:58,965:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-18 11:21:59,142:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-18 11:21:59,142:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:22:02 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjKKXQwlJ4soLa2elSTNtEDDMc42dekgCjQKAGogNCvFA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-18 11:21:59,142:DEBUG:acme.client:Storing nonce: SFMYLIQjKKXQwlJ4soLa2elSTNtEDDMc42dekgCjQKAGogNCvFA 2023-11-18 11:21:59,143:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2023-11-18 11:21:59,148:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpLS1hRd2xKNHNvTGEyZWxTVE50RURETWM0MmRla2dDalFLQUdvZ05DdkZBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "otNKtDgsFrwrG-AE71g84kPGnUu4v1MX5AUi8GpCIkSBBNo51mu1lH2B6jIgFlDpPFIx_jFWWfK0PaMqOZSZOv3MFFq3bxnXbXypATn5sSi814Bxr57M5OTfg5hYO7kN4Ayh4ezNx3F9e0caNAW1_Bv6poTnGHcwyXYyg31ow5M-p2Tjvegj531NLt8fY3ptx1Jf1GT8JK5lck1vM0n-fuK7H5xRv58QY2jZqdZzWyg0eKlVCEzr0Gj5G2feVIxcH5JUghJllcIMjLZj8iPO-Po3m0TnKP8Rq-dsi8VKCVEYUVnXjenSuQEkfz7BNzOO7Q9bn1to5PTwCYjaqOc1Mg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-18 11:21:59,353:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2023-11-18 11:21:59,354:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 18 Nov 2023 10:22:03 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054581526 Replay-Nonce: SFMYLIQjNP_6d27XF4gSo1CeuPBA2kLnU7mzbMFfc0-Lj0Zf-78 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:42:01Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612638726" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054581526" } 2023-11-18 11:21:59,354:DEBUG:acme.client:Storing nonce: SFMYLIQjNP_6d27XF4gSo1CeuPBA2kLnU7mzbMFfc0-Lj0Zf-78 2023-11-18 11:21:59,355:DEBUG:acme.client:JWS payload: b'' 2023-11-18 11:21:59,360:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612638726: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWpOUF82ZDI3WEY0Z1NvMUNldVBCQTJrTG5VN216Yk1GZmMwLUxqMFpmLTc4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI2Mzg3MjYifQ", "signature": "UNdfl-amiBigAbeoPfFpWvt091EmO7PVi17beEbG0MvB1TweOCnAzbQcZ4i7TI3EZId1htYAhGlBRmavSMh8pbG7Y6BzUt0e0qkyYEpi5kxpVzI6Ab7eGiF6nrhoNnKUEzmFhc_X9Uxmt6gUEzKy2eed0ipMW6yWXm4YXzRUFJjANJH4Tk5tIEJPrwOXXaAIWI6ZdMb4INss4J2HNijyr3JdsCEY91ygtg49vHhBRtnz7NR4pKB7QH33GBcTpCn9lg5PMYNaCL4H9Ubg2jnxIzGtZeJXSUlCe3CXNxGbk951rV1yepQVqt5BhdWvcOxiZyN1aRmhsMTRReyp7eVAVg", "payload": "" } 2023-11-18 11:21:59,541:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612638726 HTTP/1.1" 200 809 2023-11-18 11:21:59,542:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:22:03 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnl9YGfRF1OCYj7mjPIZr6HKwii_FwGMpWR-UQujl_ed8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:42:01Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612638726/NNBnvg", "token": "YtLscuYTUghWYv3C17nxbU_cYAHfqS3iJAb6EzBv31Y" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612638726/Mo2Oxw", "token": "YtLscuYTUghWYv3C17nxbU_cYAHfqS3iJAb6EzBv31Y" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612638726/wNN3rQ", "token": "YtLscuYTUghWYv3C17nxbU_cYAHfqS3iJAb6EzBv31Y" } ] } 2023-11-18 11:21:59,542:DEBUG:acme.client:Storing nonce: jXyutbsnl9YGfRF1OCYj7mjPIZr6HKwii_FwGMpWR-UQujl_ed8 2023-11-18 11:21:59,542:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-18 11:21:59,542:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2023-11-18 11:21:59,543:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-18 11:21:59,544:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-18 11:21:59,545:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-18 11:21:59,546:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-18 11:21:59,546:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-18 11:21:59,546:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-18 11:21:59,547:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-18 11:21:59,597:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-18 11:22:00,046:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-18 11:22:00,047:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2023-11-18 11:22:00,048:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2023-11-18 11:22:00,052:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:34 UTC. 2023-11-18 11:22:00,052:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-18 11:22:00,052:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-18 11:22:00,057:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-18 11:22:00,057:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-18 11:22:00,057:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-18 11:22:00,061:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-18 11:22:00,062:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-18 11:22:00,064:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-18 11:22:00,595:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-18 11:22:00,595:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:22:04 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "9seD5OjY6Ks": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-18 11:22:00,596:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-18 11:22:04,593:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6892_key-certbot.pem 2023-11-18 11:22:07,984:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6890_csr-certbot.pem 2023-11-18 11:22:07,985:DEBUG:acme.client:Requesting fresh nonce 2023-11-18 11:22:07,985:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-18 11:22:08,162:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-18 11:22:08,162:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:22:11 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: jXyutbsnjSn7H-FWMfkdFHsnOp6qWfRO7HjPpUrIVXKrGczDEy8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-18 11:22:08,163:DEBUG:acme.client:Storing nonce: jXyutbsnjSn7H-FWMfkdFHsnOp6qWfRO7HjPpUrIVXKrGczDEy8 2023-11-18 11:22:08,163:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2023-11-18 11:22:08,168:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAialh5dXRic25qU243SC1GV01ma2RGSHNuT3A2cVdmUk83SGpQcFVySVZYS3JHY3pERXk4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "J-DVD5q1ua1ioH0kQDYbJFaE3iGW9S485-IfxXgXNHdeJDr2v8-UufODqm9AOubFblxF5brtyLlu7rmEkS2a4AkDvWSLvyhPWzRXJX5eoHcDBNodjnfqdDYi_qLShKDikGCw0OS9VIOLBT2V83xSwOub3sRBHT1whFofqAnEg9QW0baxfhNcaF2vEyBBJ8N04YrDOzhANnych4HWQBkR9T904cNjlDqchv_ZBkduGcU5U7yW-Kww-OfnmYUhYH5UPN82WrAzI4Sk_X7KBTMCS_TInKJm4CRv0hwFIHl_2iBra9CZ-hLRpPjxLYD2ORazJTHGFmJuzf1PxMy-WqieDA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-18 11:22:08,372:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-18 11:22:08,374:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 18 Nov 2023 10:22:12 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054620886 Replay-Nonce: SFMYLIQjuqziiv-jBtZBOkLmQoRpuQ2WxwEWNB3A9FwqYWKlNw8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:42:10Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612689796" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054620886" } 2023-11-18 11:22:08,374:DEBUG:acme.client:Storing nonce: SFMYLIQjuqziiv-jBtZBOkLmQoRpuQ2WxwEWNB3A9FwqYWKlNw8 2023-11-18 11:22:08,375:DEBUG:acme.client:JWS payload: b'' 2023-11-18 11:22:08,380:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612689796: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiU0ZNWUxJUWp1cXppaXYtakJ0WkJPa0xtUW9ScHVRMld4d0VXTkIzQTlGd3FZV0tsTnc4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI2ODk3OTYifQ", "signature": "bAEc5qZpZozqto55hL0uY5-E1xlA9LdezzqwVui-wLhwGtyOtr3L0NfYkEpyhPM7opuUoKEiZNsCg33Iagot3vXHsg8mMaIGLNmHRkPHRJH9SdSYv6ZvY_nWryKzpcQ4i8IIPG9lnkf7_CRRguyz0dwjzIdWXYQb5Kwf4VLMcFOK4NNPqrZ8U1inIMc-QxQ9nV4eUxfYZkeYRpr4_4eNsqrJrd2FhPI1sxFzMXnSHJm0QnHyMW9uN6aryOZhMsG1GgGo9hRqlEb1NLPHU0DlljG4zF7dviWtuAHCFDn0Be81BN9y-lOSi_z_t2ks-JsfAclMh8P1Ipb0fURFfFm50A", "payload": "" } 2023-11-18 11:22:08,560:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612689796 HTTP/1.1" 200 805 2023-11-18 11:22:08,561:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:22:12 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: SFMYLIQjBs7vOs6YITmfQx4sszsPhfvaAaIBYQBvjTq-mZ2S9To X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:42:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612689796/q81CXQ", "token": "dD3h4qBbL0oo-gEVD5KIIoE28_8_ZHTsPoThE2SmgpA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612689796/RA9KcA", "token": "dD3h4qBbL0oo-gEVD5KIIoE28_8_ZHTsPoThE2SmgpA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612689796/phjqOQ", "token": "dD3h4qBbL0oo-gEVD5KIIoE28_8_ZHTsPoThE2SmgpA" } ] } 2023-11-18 11:22:08,561:DEBUG:acme.client:Storing nonce: SFMYLIQjBs7vOs6YITmfQx4sszsPhfvaAaIBYQBvjTq-mZ2S9To 2023-11-18 11:22:08,562:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-18 11:22:08,562:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2023-11-18 11:22:08,563:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-18 11:22:08,563:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-18 11:22:08,564:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-18 11:22:08,564:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-18 11:22:08,564:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-18 11:22:08,565:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-18 11:22:08,566:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-18 11:22:08,602:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-18 11:22:09,001:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-18 11:22:09,002:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-18 11:22:09,003:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-18 11:22:09,009:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:48 UTC. 2023-11-18 11:22:09,009:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-18 11:22:09,009:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-18 11:22:09,016:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-18 11:22:09,016:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-18 11:22:09,016:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-18 11:22:09,022:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-18 11:22:09,023:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-18 11:22:09,026:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-18 11:22:09,473:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-18 11:22:09,474:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:22:13 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "joq_l9GEjX8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-18 11:22:09,474:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-18 11:22:13,089:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6893_key-certbot.pem 2023-11-18 11:22:16,568:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6891_csr-certbot.pem 2023-11-18 11:22:16,568:DEBUG:acme.client:Requesting fresh nonce 2023-11-18 11:22:16,568:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-18 11:22:16,717:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-18 11:22:16,718:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:22:20 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiQQZYeAfO0-x_oAcR7VvOnWXB54dz3XbB-9HboXGWdww X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-18 11:22:16,719:DEBUG:acme.client:Storing nonce: v0bMowfiQQZYeAfO0-x_oAcR7VvOnWXB54dz3XbB-9HboXGWdww 2023-11-18 11:22:16,719:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2023-11-18 11:22:16,729:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93ZmlRUVpZZUFmTzAteF9vQWNSN1Z2T25XWEI1NGR6M1hiQi05SGJvWEdXZHd3IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "xhL0THIPg3w936NPyyxoTA1aoMfNQTZ2RouQwth2H1K6TIFdDf6B414hedwefujXhTE6m274eVnSjprOKYtli5Pe-Px4VqNMz0Jm6yeHmjf3HPrS6sTq4AYjcEoL8J7CiDlge8PI-ZgGRF0HJUgLcLTBpBrctBIYxc9_yPQD0khjrMA6S45cZUFQjEEAcCBIUkSbGWqnvPcjAUTfcLMlieY-gEP-4njYnKrdzCDDVgHh-Q8oMpO7bgqXA3BTdrhHKrfr2QIx-TBjeiCFjgs6gab5lpUz-EBpRr-iB5KdZ9H7XNjvVz6iHFtNy8ZTif77NFVlCA9f9ldWjbJBJc9Ycw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-18 11:22:16,909:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-18 11:22:16,910:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 18 Nov 2023 10:22:20 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054650586 Replay-Nonce: nbWKegf86yB0JV4mMSyfi9ZAPJcL_97Po4_Lj2C8cy_wBIWsQmg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:42:20Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612731716" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054650586" } 2023-11-18 11:22:16,910:DEBUG:acme.client:Storing nonce: nbWKegf86yB0JV4mMSyfi9ZAPJcL_97Po4_Lj2C8cy_wBIWsQmg 2023-11-18 11:22:16,911:DEBUG:acme.client:JWS payload: b'' 2023-11-18 11:22:16,917:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612731716: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjg2eUIwSlY0bU1TeWZpOVpBUEpjTF85N1BvNF9MajJDOGN5X3dCSVdzUW1nIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI3MzE3MTYifQ", "signature": "NUTjY8GnsCGwpfZO2-ozVLe1DbACDClJZn8Jjnx9HlFHQ3ShBvhbfGox4VByGqbeip8T-W-j4nir4cP2UaKKgA_-wf8qBiq-ULAbZkVB7BIxXcO7LazjHAmens0F48AxW1TGlITjgwdi-WmFNL3tvVkbUuK57_NUJHyyZUXi9Ylkh3XooDYsbUxuf3L0x5nbnNhw4L0Nb9x95QBH0paDa7ISNUBjeM8myFChGjL11KB1DxkTCaUtp1FCnddIDX18qf4CMiEcARWbtxUVFSQkokquD28purbiEFEqCchdUWtK47rvlfeu22Zz-c5I_0SNtfE-8FTkq2yOAFYJ25hegA", "payload": "" } 2023-11-18 11:22:17,068:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612731716 HTTP/1.1" 200 805 2023-11-18 11:22:17,069:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:22:20 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiP0Ag_jmzUKKgFa-o5FbcknqINP6c1NbzYqKFK2ydvSE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:42:20Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612731716/vs9hIA", "token": "6C6a5wxSVRoWYNwzinMlWR0pwxBViZEyUzdFtpz8okw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612731716/C3Z5fA", "token": "6C6a5wxSVRoWYNwzinMlWR0pwxBViZEyUzdFtpz8okw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612731716/Qu4skQ", "token": "6C6a5wxSVRoWYNwzinMlWR0pwxBViZEyUzdFtpz8okw" } ] } 2023-11-18 11:22:17,070:DEBUG:acme.client:Storing nonce: v0bMowfiP0Ag_jmzUKKgFa-o5FbcknqINP6c1NbzYqKFK2ydvSE 2023-11-18 11:22:17,071:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-18 11:22:17,071:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2023-11-18 11:22:17,072:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-18 11:22:17,073:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-18 11:22:17,073:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-18 11:22:17,074:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-18 11:22:17,074:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-18 11:22:17,075:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-18 11:22:17,077:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-18 11:22:17,122:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-18 11:22:17,361:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-18 11:22:17,363:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-18 11:22:17,363:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-18 11:22:17,367:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:31:01 UTC. 2023-11-18 11:22:17,367:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-18 11:22:17,368:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-18 11:22:17,372:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-18 11:22:17,373:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-18 11:22:17,373:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-18 11:22:17,377:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-18 11:22:17,378:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-18 11:22:17,380:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-18 11:22:17,844:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-18 11:22:17,845:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:22:21 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "L3QPU0YcPZg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-18 11:22:17,845:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-18 11:22:21,391:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6894_key-certbot.pem 2023-11-18 11:22:24,826:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6892_csr-certbot.pem 2023-11-18 11:22:24,827:DEBUG:acme.client:Requesting fresh nonce 2023-11-18 11:22:24,827:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-18 11:22:24,980:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-18 11:22:24,981:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:22:28 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfi52rr48J-b0pMsX1gdkGn9wX-_mybtoZZ-xfqVpLlcqE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-18 11:22:24,981:DEBUG:acme.client:Storing nonce: v0bMowfi52rr48J-b0pMsX1gdkGn9wX-_mybtoZZ-xfqVpLlcqE 2023-11-18 11:22:24,981:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2023-11-18 11:22:24,988:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAidjBiTW93Zmk1MnJyNDhKLWIwcE1zWDFnZGtHbjl3WC1fbXlidG9aWi14ZnFWcExsY3FFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "ZAmYovN6uNam1RBI2HsLz2QD09Y69_kaH8jQwUCzqcwcpjaflANOqrD2nsOcGMZ-wd9v0PNjzL3CStj1GlExptBQQ5dcMlhb7wiOpNb4YXSviT7kVH_PYVonuWQ-yaVeSfqfsqjE1uU7lM-GzrGpcqNtKYez3qvTaT7hWCJ8kxf_Fxm1JZzCr0Cq2hS1VlP640cXBEgqjc0iimnva2J9wqS53dSqVZJZIFZ5kyR5xWRSZYTkOCNCTdxF2g56iNwUKmdDM_Ha2UQyjsG8EpiUAu1DFGJqWqXTiwXAXP6ryL5T13aa6GMu1dAhKbZACdEBkppysynt0k1w2acNTlCvCA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-18 11:22:25,160:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-18 11:22:25,160:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 18 Nov 2023 10:22:28 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054677986 Replay-Nonce: nbWKegf8uVefebOcuUka11SjjBpdrWqT4SPtTrKZZjo1H85_X-w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:42:29Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612771016" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054677986" } 2023-11-18 11:22:25,161:DEBUG:acme.client:Storing nonce: nbWKegf8uVefebOcuUka11SjjBpdrWqT4SPtTrKZZjo1H85_X-w 2023-11-18 11:22:25,161:DEBUG:acme.client:JWS payload: b'' 2023-11-18 11:22:25,171:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612771016: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAibmJXS2VnZjh1VmVmZWJPY3VVa2ExMVNqakJwZHJXcVQ0U1B0VHJLWlpqbzFIODVfWC13IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI3NzEwMTYifQ", "signature": "L173LYKKquPo0T0168nK0ALk_K4HGHP7WDc_9c8eGlaEHXP2Kuy8WDh1n9LJgL4ZlyyMg7vbDaxkFP60kItOHOrn3nYGnTGIeablrAts_Pvj_CaME4FWpoVNk8UX2x2nPo9_bco-APhc2dVu4lImY1dIWoxZxEYmavavn4YBz5v1pC7TwpxbpGxtbzc8YCdNw886VWrrsrm2rr9CBo4-yIA-KFinrYqjbyeM2s8ven1LvcfcsBMPN__1L8j2pZiekuaPJc1DulyDriRQwZGy98p9pjtU2Xt2MDlVvDbJxPvDQmucAZBEsmsMLg41y6nQGFqy2kKTU22oVHY0qqPLDg", "payload": "" } 2023-11-18 11:22:25,330:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612771016 HTTP/1.1" 200 805 2023-11-18 11:22:25,332:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 18 Nov 2023 10:22:29 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: v0bMowfiH5I-5jMe2ojhCoBfpwPkCHFVb-HMkrpwfM8T4SJL8SU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:42:29Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612771016/NXssXA", "token": "fBQUbQwPgLxd5Q_xY3yj1324L93-p0HcHbbwXfA2ky8" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612771016/srEC8w", "token": "fBQUbQwPgLxd5Q_xY3yj1324L93-p0HcHbbwXfA2ky8" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612771016/pqGTdw", "token": "fBQUbQwPgLxd5Q_xY3yj1324L93-p0HcHbbwXfA2ky8" } ] } 2023-11-18 11:22:25,332:DEBUG:acme.client:Storing nonce: v0bMowfiH5I-5jMe2ojhCoBfpwPkCHFVb-HMkrpwfM8T4SJL8SU 2023-11-18 11:22:25,333:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-18 11:22:25,334:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2023-11-18 11:22:25,335:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-18 11:22:25,336:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-18 11:22:25,337:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-18 11:22:25,338:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-18 11:22:25,338:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-18 11:22:25,339:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-18 11:22:25,341:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-18 11:22:25,341:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2023-11-18 11:22:25,342:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2023-11-18 11:22:25,343:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2023-11-18 11:22:25,344:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)