2023-11-16 00:18:07,109:DEBUG:certbot._internal.main:certbot version: 1.6.0 2023-11-16 00:18:07,109:DEBUG:certbot._internal.main:Arguments: [] 2023-11-16 00:18:07,109:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2023-11-16 00:18:07,932:DEBUG:certbot._internal.log:Root logging level set at 20 2023-11-16 00:18:07,932:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2023-11-16 00:18:07,970:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2023-11-16 00:18:08,030:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-16 00:18:08,065:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-16 00:18:08,066:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is signed by the certificate's issuer. 2023-11-16 00:18:08,070:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert7.pem is: OCSPCertStatus.GOOD 2023-11-16 00:18:08,077:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:23 UTC. 2023-11-16 00:18:08,078:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-16 00:18:08,078:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-16 00:18:08,082:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-16 00:18:08,083:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-16 00:18:08,083:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-16 00:18:08,089:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-16 00:18:08,090:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-16 00:18:08,091:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-16 00:18:08,538:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-16 00:18:08,539:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:18:07 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "LZrLXk6_coc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-16 00:18:08,539:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-16 00:18:12,864:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6830_key-certbot.pem 2023-11-16 00:18:16,605:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6828_csr-certbot.pem 2023-11-16 00:18:16,606:DEBUG:acme.client:Requesting fresh nonce 2023-11-16 00:18:16,606:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-16 00:18:16,750:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-16 00:18:16,751:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:18:16 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4JwdIh9VFvPfzcjAwKEA-DOmBXth9jom0Pj4cL1BcXTnRi4GeJY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-16 00:18:16,751:DEBUG:acme.client:Storing nonce: 4JwdIh9VFvPfzcjAwKEA-DOmBXth9jom0Pj4cL1BcXTnRi4GeJY 2023-11-16 00:18:16,751:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2023-11-16 00:18:16,757:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNEp3ZEloOVZGdlBmemNqQXdLRUEtRE9tQlh0aDlqb20wUGo0Y0wxQmNYVG5SaTRHZUpZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "xG5YwYKv8yomY5CWvnvpV2jgMXcmodocqOOMpjAEUehrTBf-48I060lCmy_ncpJJ7e_9vMaHVGNoOmiCBCMSWXvdg4GjD2p0yetJjftNKEjPXCkVRJ5pAdtC30vYoiTcrYE-N8Ah9GrrigdCHsqFIxinDhqaHNQizMxF3p0dyY0bmXmDcG8qq_3ZowWiwJcKoP2qIIzOb4iTg9RVVDLkUW8taqqk99AJtgWZX5j8nEP2fXj5J73eNPilP5rLhWGSaY5exPKbj5k4iBmpnuWfh-VPJZabdUnew1bRA4ufmjOFjcFbM0qKh_ElCy-8ztMOQgPUXtWSq2Qi1JXwOPAj4g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-16 00:18:16,916:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2023-11-16 00:18:16,917:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 15 Nov 2023 23:18:16 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054336746 Replay-Nonce: 2xLQop3epEyX_mtxJYbed190TPeRNXk3Jhpvo1Lvb0i4ISIHLTA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:40:34Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612303016" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054336746" } 2023-11-16 00:18:16,917:DEBUG:acme.client:Storing nonce: 2xLQop3epEyX_mtxJYbed190TPeRNXk3Jhpvo1Lvb0i4ISIHLTA 2023-11-16 00:18:16,918:DEBUG:acme.client:JWS payload: b'' 2023-11-16 00:18:16,925:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612303016: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMnhMUW9wM2VwRXlYX210eEpZYmVkMTkwVFBlUk5YazNKaHB2bzFMdmIwaTRJU0lITFRBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTIzMDMwMTYifQ", "signature": "unLA6Iy1dqWaGfwhxPPAio_RaEkk14VUg6CbjvdsnNUufrWa0alN6_s7a5F80aspu36agdx8zAcR2s0kpA8BwWxfBHgiNpOaYmswDo9Pprq1pxIWkZejfWm5gUPRQKOhOb69wR57JGnyQgnq2hZLYHvWiksNG0umV4mrnghF_Z2y_9iaeTi0YhlkHGD1bV_45bBYzWF9J8L9Ckx1fqRzXCyKx8KZhyfQ1c1hrIfi2k2yR_plPwHI846vd17z2139iboWY16LiPtugz0kQzjNo3aRteRL9ZSwsTYJcntfbrRLlKqB_Nc-alZSmhu3CwrMqT-G_lTVpqsj1hiXolkPqg", "payload": "" } 2023-11-16 00:18:17,072:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612303016 HTTP/1.1" 200 810 2023-11-16 00:18:17,073:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:18:16 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2xLQop3eZvl_6OHAOQqXrsqX-fqOR9ZBNzjDyt2SPyO3uZhR9L4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:40:34Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612303016/SE_DLA", "token": "pQaTT9XorHa5ZWDeypT0Hc0yUXwYdMo60L_Xs22rZ0Q" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612303016/Wku45g", "token": "pQaTT9XorHa5ZWDeypT0Hc0yUXwYdMo60L_Xs22rZ0Q" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612303016/hUBGgQ", "token": "pQaTT9XorHa5ZWDeypT0Hc0yUXwYdMo60L_Xs22rZ0Q" } ] } 2023-11-16 00:18:17,073:DEBUG:acme.client:Storing nonce: 2xLQop3eZvl_6OHAOQqXrsqX-fqOR9ZBNzjDyt2SPyO3uZhR9L4 2023-11-16 00:18:17,074:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-16 00:18:17,074:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2023-11-16 00:18:17,075:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-16 00:18:17,075:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-16 00:18:17,088:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-16 00:18:17,088:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-16 00:18:17,088:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-16 00:18:17,089:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-16 00:18:17,093:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-16 00:18:17,129:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-16 00:18:17,361:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-16 00:18:17,362:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-16 00:18:17,363:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-16 00:18:17,366:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:36 UTC. 2023-11-16 00:18:17,367:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-16 00:18:17,367:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-16 00:18:17,371:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-16 00:18:17,371:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-16 00:18:17,372:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-16 00:18:17,375:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-16 00:18:17,376:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-16 00:18:17,378:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-16 00:18:17,899:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-16 00:18:17,899:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:18:17 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "MG4JVikWkkQ": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-16 00:18:17,900:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-16 00:18:21,546:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6831_key-certbot.pem 2023-11-16 00:18:24,935:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6829_csr-certbot.pem 2023-11-16 00:18:24,936:DEBUG:acme.client:Requesting fresh nonce 2023-11-16 00:18:24,936:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-16 00:18:25,111:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-16 00:18:25,111:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:18:24 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: GEqhmX18LImxZM0Y2l4HxAnvKaLgMpQAqjAys3wGP0Cx-JJ2XR0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-16 00:18:25,112:DEBUG:acme.client:Storing nonce: GEqhmX18LImxZM0Y2l4HxAnvKaLgMpQAqjAys3wGP0Cx-JJ2XR0 2023-11-16 00:18:25,112:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2023-11-16 00:18:25,119:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiR0VxaG1YMThMSW14Wk0wWTJsNEh4QW52S2FMZ01wUUFxakF5czN3R1AwQ3gtSkoyWFIwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "tqe2gVhtWRYXOv1QZyVeGrsSmhJNdGvrnvx7Mi_g9W7H8pIuv2Ql6fjR1sMsfp6uN-Z7eM2aJ9Z7AqWd3LA2mN_c8RtDByOYDghZnmpi0o3f26lC6KLTTkzkomwWE9G3Nz_XRr_SElxYyOAVM1lYzFuveZYqY8d7vr37bKrT3DMGQQw7Ow0QnX8Ui3pMZMxtzV65_d2iucKCXOOyD6XFpB_mrdbnrTaEEMZi8iL-33tX0RFFJ1SVChN_Af6Cvb1ODUG5iUkGVBzXtmoWCFfyoewhkT1pHsmuumkdjqjAeBvOGBU-S1VWTTzGYWPZafOZ7sJX4AAJkvGWEKGrDbIvRQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-16 00:18:25,317:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2023-11-16 00:18:25,317:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 15 Nov 2023 23:18:24 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054364216 Replay-Nonce: fTELRHZhAkfSpeFoHOoEM72dJOT303z1YaPi2_pO5TStyOidiLg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:40:44Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612339826" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054364216" } 2023-11-16 00:18:25,317:DEBUG:acme.client:Storing nonce: fTELRHZhAkfSpeFoHOoEM72dJOT303z1YaPi2_pO5TStyOidiLg 2023-11-16 00:18:25,318:DEBUG:acme.client:JWS payload: b'' 2023-11-16 00:18:25,323:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612339826: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZlRFTFJIWmhBa2ZTcGVGb0hPb0VNNzJkSk9UMzAzejFZYVBpMl9wTzVUU3R5T2lkaUxnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTIzMzk4MjYifQ", "signature": "LLh0LMAfT-0HDHrL2HEKHKCOPkTT3uQol0mOrI56NoCKxsm3sHdghnN0niwRWkjIJc8fmcuKUrHPNo6sedKsE1L4clI8VtA7afs3xNXaH_VPDUuQqP7WvAlA0ioHgYeUL-Fwox6ff3Fo4wiZIKjS5Y8B6TbmSHEqgTWxmR0hpiWhkcXEU81Yx-49on3RAfil7_Y3FctZLh3QPbuoNhqwoZQTOZ_bNJYYP2j4Clk9a-Se1NilV_oBIc50JuszkZHpDwbevveygOjkdGYQUvph1vdUPAiFoiKMDhOlt0MJCo5Vd4vMXdgnFQgdNh5HXh3p76eC2HFHltJNg2gJ_A4aEw", "payload": "" } 2023-11-16 00:18:25,514:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612339826 HTTP/1.1" 200 804 2023-11-16 00:18:25,514:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:18:24 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: GEqhmX18Mp0KJMa1bGfniTRRTAqzoGG-NkU8eCAA1zV4JFUNJ08 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:40:44Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612339826/iaWzYw", "token": "lZ4sjyuE91eCR82aOexpOm4No3LJXeuqBiMNXsnHG7w" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612339826/b2lhHw", "token": "lZ4sjyuE91eCR82aOexpOm4No3LJXeuqBiMNXsnHG7w" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612339826/4q2BkQ", "token": "lZ4sjyuE91eCR82aOexpOm4No3LJXeuqBiMNXsnHG7w" } ] } 2023-11-16 00:18:25,515:DEBUG:acme.client:Storing nonce: GEqhmX18Mp0KJMa1bGfniTRRTAqzoGG-NkU8eCAA1zV4JFUNJ08 2023-11-16 00:18:25,515:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-16 00:18:25,515:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2023-11-16 00:18:25,516:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-16 00:18:25,516:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-16 00:18:25,517:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-16 00:18:25,517:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-16 00:18:25,517:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-16 00:18:25,518:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-16 00:18:25,519:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-16 00:18:25,577:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-16 00:18:25,827:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-16 00:18:25,830:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-16 00:18:25,832:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-16 00:18:25,841:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:28:49 UTC. 2023-11-16 00:18:25,842:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-16 00:18:25,842:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-16 00:18:25,848:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-16 00:18:25,848:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-16 00:18:25,848:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-16 00:18:25,852:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-16 00:18:25,853:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-16 00:18:25,855:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-16 00:18:26,373:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-16 00:18:26,373:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:18:25 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "F_Jy4JFVNkg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-16 00:18:26,374:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-16 00:18:29,869:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6832_key-certbot.pem 2023-11-16 00:18:33,220:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6830_csr-certbot.pem 2023-11-16 00:18:33,220:DEBUG:acme.client:Requesting fresh nonce 2023-11-16 00:18:33,220:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-16 00:18:33,392:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-16 00:18:33,392:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:18:32 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fTELRHZhCSzwBxsHmHzpWJgGnRBss_mTmMItNwymerH4Iil8Gzs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-16 00:18:33,393:DEBUG:acme.client:Storing nonce: fTELRHZhCSzwBxsHmHzpWJgGnRBss_mTmMItNwymerH4Iil8Gzs 2023-11-16 00:18:33,393:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2023-11-16 00:18:33,400:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZlRFTFJIWmhDU3p3QnhzSG1IenBXSmdHblJCc3NfbVRtTUl0Tnd5bWVySDRJaWw4R3pzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "LmCrcqd7s0HB9jBiPAQ4XJ9ZrAvoikgTMpcKHvETkEb1vl9rRVf8fDYGkUuf_jE0-m0NkQL8Qr3SRFRG30Cd7dermCBjTfJGzO0AZmc0dsaXJbIeVirzUKjO-XEFHeuCI0qRDpE_0MMm1jttSYM1tzaTnB9_tG-Rr_8zo58oTC_btSUxOvV29KQyQG6ROl1WnSePe0twSio_AD6EfPbRsAkAK_-qaELdOZwCBDbKNDlQIQp_CeiCgboi6NtEIM3m-WD81hCD766HI38ZRAKl_5sF8wLcCMyM2SBP5vrUbvxxbbPUqrFxwRuTuCAVZEYkzFND6iSnMpKbqbm5NBgrWQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-16 00:18:33,591:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2023-11-16 00:18:33,592:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 15 Nov 2023 23:18:32 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054392386 Replay-Nonce: fTELRHZhs6uP46a6X3O4QTVfKkya4J1C8C0A6RM1gWzNDWkgvFQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:40:54Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612379486" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054392386" } 2023-11-16 00:18:33,593:DEBUG:acme.client:Storing nonce: fTELRHZhs6uP46a6X3O4QTVfKkya4J1C8C0A6RM1gWzNDWkgvFQ 2023-11-16 00:18:33,593:DEBUG:acme.client:JWS payload: b'' 2023-11-16 00:18:33,601:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612379486: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZlRFTFJIWmhzNnVQNDZhNlgzTzRRVFZmS2t5YTRKMUM4QzBBNlJNMWdXek5EV2tndkZRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTIzNzk0ODYifQ", "signature": "NmNqF9MrUByv0pB2BzsXBsKt_26lW0vVhTLOqHi-bkjGjxacp9fSzlW3J0IYoRoVacmn6YvsvaUo3AGQlQnc4YDU4STC_YKM-c_ZMc3MMwAES97ubv6nUNefwUV8bgmO1b9AST0ouzDbmvCCIN79tC2zkrbQPbC7jzuViifvC1NIwAZN4OZQxaFx3xuBqxhhX-fvPgYDHatImDgPf-US12yH6nn8VI-2tKf8PvhozmwTwPoVtmt8niMxb1TJSIUudBfMEgaRUJxz13GOna8XHDXy_7DPMnXieQEQKp1D-z1ZHuUcVmVcW9Keh18qeHC8zbg0Z0j4rMhHsqCLovGsng", "payload": "" } 2023-11-16 00:18:33,776:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612379486 HTTP/1.1" 200 807 2023-11-16 00:18:33,777:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:18:33 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fTELRHZhfQL2MFSm83JrHK3m8v5IuI91o48p1KCvbZFzXBn2okY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:40:54Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612379486/az4Vdg", "token": "cudl-UJkA1ZG6E5Za_MtH1igwT5c-ctyXDfDcgUpCmc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612379486/Zk1DuA", "token": "cudl-UJkA1ZG6E5Za_MtH1igwT5c-ctyXDfDcgUpCmc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612379486/MleojA", "token": "cudl-UJkA1ZG6E5Za_MtH1igwT5c-ctyXDfDcgUpCmc" } ] } 2023-11-16 00:18:33,778:DEBUG:acme.client:Storing nonce: fTELRHZhfQL2MFSm83JrHK3m8v5IuI91o48p1KCvbZFzXBn2okY 2023-11-16 00:18:33,779:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-16 00:18:33,780:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2023-11-16 00:18:33,780:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-16 00:18:33,781:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-16 00:18:33,783:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-16 00:18:33,783:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-16 00:18:33,783:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-16 00:18:33,784:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-16 00:18:33,787:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-16 00:18:33,835:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-16 00:18:33,843:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-16 00:18:33,844:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-16 00:18:33,844:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-16 00:18:33,848:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:02 UTC. 2023-11-16 00:18:33,849:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-16 00:18:33,849:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-16 00:18:33,853:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-16 00:18:33,854:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-16 00:18:33,854:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-16 00:18:33,858:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-16 00:18:33,859:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-16 00:18:33,860:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-16 00:18:34,299:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-16 00:18:34,300:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:18:33 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "TXJbBqolTDs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-16 00:18:34,301:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-16 00:18:38,101:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6833_key-certbot.pem 2023-11-16 00:18:41,450:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6831_csr-certbot.pem 2023-11-16 00:18:41,450:DEBUG:acme.client:Requesting fresh nonce 2023-11-16 00:18:41,451:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-16 00:18:41,596:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-16 00:18:41,597:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:18:40 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4JwdIh9VvZgwDg9RWsKkmOooBZT-BZnJJcXpGIMHsrCegshUimQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-16 00:18:41,597:DEBUG:acme.client:Storing nonce: 4JwdIh9VvZgwDg9RWsKkmOooBZT-BZnJJcXpGIMHsrCegshUimQ 2023-11-16 00:18:41,598:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2023-11-16 00:18:41,606:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNEp3ZEloOVZ2Wmd3RGc5UldzS2ttT29vQlpULUJabkpKY1hwR0lNSHNyQ2Vnc2hVaW1RIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "DVxATv6qU91k5IJ59MtCnolc4g5IXnttiLEFyuHLXZzBsg9g0NCkku2Kt68pRm3Vu7pfEFihBeONTK6jfEjrEbKw4NdKEIF-Z6LgaBDeBoAxRtHFg9A6WTyJPvRHS3SftfDOh__KaM0TfJuAT6AVfQ5jEWZHDh7aLWV0fFGAtnpP7nNTjZ_F9w1FMu6NO85a19_6Qu4oqr3pw4IsCQu8XtgE8MKvvdxRxPEfL2goZw0XwqqfbJ8kKUJdLHLnoUG_h6PU1K1BKIPjWY11c2jXViFGv02v5un-Ppx0W4OqVwWjAEY1ftEsQv3Jc4FkeqtSzJzoJ6qDnod6BN1hgSgAcQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-16 00:18:41,775:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2023-11-16 00:18:41,776:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 15 Nov 2023 23:18:41 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054424916 Replay-Nonce: 2xLQop3eotSrfRoS9hK_KkIqfPCVhBfLTjTFvq_ZDaE93H65vDo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:04Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612422406" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054424916" } 2023-11-16 00:18:41,776:DEBUG:acme.client:Storing nonce: 2xLQop3eotSrfRoS9hK_KkIqfPCVhBfLTjTFvq_ZDaE93H65vDo 2023-11-16 00:18:41,776:DEBUG:acme.client:JWS payload: b'' 2023-11-16 00:18:41,781:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612422406: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMnhMUW9wM2VvdFNyZlJvUzloS19La0lxZlBDVmhCZkxUalRGdnFfWkRhRTkzSDY1dkRvIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI0MjI0MDYifQ", "signature": "fvhKF1Abqf0igxK1BnpgTaQwaOvgsgA7uVe3j1Ao9c4y7AI5apAcLpvtVIdKRrk5l8pTadm8kUmAjKtJWzgeejtDwyG7ferZD35tRu8bmGI94xWbHa7DHmbIGRoh0VyrwXKtAt6fZDqoNvSOaV--C9qbMhwUcUQdPwGpHjeRIxelzAOaOooW6WAks0pO6lkXnR5xhzp87Sk2ZuhWjjXna3T20X_Yc1EIgQ7amBxr1l9eAhEIG6U83Wa_-P6O3sDehtguHoD-9j9h2xHrZzu-m7yPOlJnDwnMcs4TC1UGlAa5lqo2ogO-xBF2L4CaVcXctNlfB3aWur_J7tFpt7IgNA", "payload": "" } 2023-11-16 00:18:41,934:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612422406 HTTP/1.1" 200 801 2023-11-16 00:18:41,935:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:18:41 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2xLQop3ezRLkETl74iReGWLL_k1__zu4-Bk3Z7P9rVbaRraiv0s X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:04Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612422406/ky6kcw", "token": "-IL9_EB3uvFRDRErY0ET1SQxqNaHG_FMeRx1kbAjZLg" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612422406/weBWyw", "token": "-IL9_EB3uvFRDRErY0ET1SQxqNaHG_FMeRx1kbAjZLg" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612422406/I55gjQ", "token": "-IL9_EB3uvFRDRErY0ET1SQxqNaHG_FMeRx1kbAjZLg" } ] } 2023-11-16 00:18:41,936:DEBUG:acme.client:Storing nonce: 2xLQop3ezRLkETl74iReGWLL_k1__zu4-Bk3Z7P9rVbaRraiv0s 2023-11-16 00:18:41,937:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-16 00:18:41,938:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2023-11-16 00:18:41,938:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-16 00:18:41,939:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-16 00:18:41,939:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-16 00:18:41,939:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-16 00:18:41,940:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-16 00:18:41,940:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-16 00:18:41,941:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-16 00:18:41,985:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-16 00:18:42,235:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-16 00:18:42,236:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-16 00:18:42,237:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-16 00:18:42,241:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:14 UTC. 2023-11-16 00:18:42,241:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-16 00:18:42,241:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-16 00:18:42,246:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-16 00:18:42,246:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-16 00:18:42,246:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-16 00:18:42,250:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-16 00:18:42,251:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-16 00:18:42,253:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-16 00:18:42,783:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-16 00:18:42,783:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:18:42 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "vYUiwxWiczY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2023-11-16 00:18:42,784:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-16 00:18:46,385:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6834_key-certbot.pem 2023-11-16 00:18:49,798:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6832_csr-certbot.pem 2023-11-16 00:18:49,799:DEBUG:acme.client:Requesting fresh nonce 2023-11-16 00:18:49,799:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-16 00:18:49,975:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-16 00:18:49,975:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:18:49 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: GEqhmX18VaIXjUNtrL1fNjELiSXkuWVyF5LrF6KS_vmkgybwj0U X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-16 00:18:49,975:DEBUG:acme.client:Storing nonce: GEqhmX18VaIXjUNtrL1fNjELiSXkuWVyF5LrF6KS_vmkgybwj0U 2023-11-16 00:18:49,976:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2023-11-16 00:18:49,981:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiR0VxaG1YMThWYUlYalVOdHJMMWZOakVMaVNYa3VXVnlGNUxyRjZLU192bWtneWJ3ajBVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "OsqleDsTS5ZFUvGwZ_h8pZuIFbXVxzTAD3yL6Ab2XHG6v-mQtBQRyR3IebBwlfxq7IphpkZamM_8jxGI_n5PepdKcAMjgqBIPDHvGoMGR_2lHejQML6CwgLWOku24oEqe9B6QojWLWrNYkKv_MLBpEFxknmu6bkb_6YF4ujjmOtkQHkmwr6Ncu1RUi8kFQvBeVCjqXG3L6cf_3E9v7NUWPPfATxBJTqID-TjB0SSYyhgbXdI0HyohznMOgcT6gehhYqzC9GGBb17eVeyY6l3vROhbWbkkBxuhk5yvORUiFi3w7Gxj3lpbx0wNIJ6N7OQKsN2s5Knx4BOse99z1nOxg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-16 00:18:50,180:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-16 00:18:50,181:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 15 Nov 2023 23:18:49 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054455886 Replay-Nonce: fTELRHZh8dtg95o5MHjoQto2Wh8D3NoPWQyk5cgHDaVvUxlJOrQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:13Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612463596" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054455886" } 2023-11-16 00:18:50,181:DEBUG:acme.client:Storing nonce: fTELRHZh8dtg95o5MHjoQto2Wh8D3NoPWQyk5cgHDaVvUxlJOrQ 2023-11-16 00:18:50,181:DEBUG:acme.client:JWS payload: b'' 2023-11-16 00:18:50,186:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612463596: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZlRFTFJIWmg4ZHRnOTVvNU1Iam9RdG8yV2g4RDNOb1BXUXlrNWNnSERhVnZVeGxKT3JRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI0NjM1OTYifQ", "signature": "WMFB5Otmv-XNbnwOGFEZa1GIEYG_PZDlksjItUAL2M3MqPDQP5JfsEorlyMtj49ogs-p3ebeMvDFeFMYq9XpM3pNRwVf-TBuQyhYnNrki_tfdgcNRIdqYVLW4SS1j7x7LwRrv1-QaC4FU_d8kA5UaKars9N6Sl_kdcT7VA2Oli0z_mtnkLngesNSrauGSkfJpr6A8GcHMFaoDG5LSiTszIUDB72uwMmDMFrkg162vUptnl2uSmdwIoVisdm1nT6ZRuhQECHLOU3CIj1VzTs-PQr_WniL60OM0SRH1wi3C5gcuzzF8Zc_luQon0ygZXwptDEebDFRL7UPLFVQ9byYkQ", "payload": "" } 2023-11-16 00:18:50,366:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612463596 HTTP/1.1" 200 805 2023-11-16 00:18:50,367:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:18:49 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: GEqhmX182eMxHxhbuBwepiC_HjLRbalUpYBdyjx_1yLJGEJk92A X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:13Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612463596/6wvlBA", "token": "urpYTB_ISPnX0ZBqpybU40fCrJsoHs7T5gniMi-FKAI" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612463596/WBsXnQ", "token": "urpYTB_ISPnX0ZBqpybU40fCrJsoHs7T5gniMi-FKAI" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612463596/cdtfow", "token": "urpYTB_ISPnX0ZBqpybU40fCrJsoHs7T5gniMi-FKAI" } ] } 2023-11-16 00:18:50,367:DEBUG:acme.client:Storing nonce: GEqhmX182eMxHxhbuBwepiC_HjLRbalUpYBdyjx_1yLJGEJk92A 2023-11-16 00:18:50,367:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-16 00:18:50,368:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2023-11-16 00:18:50,368:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-16 00:18:50,368:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-16 00:18:50,369:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-16 00:18:50,369:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-16 00:18:50,369:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-16 00:18:50,370:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-16 00:18:50,371:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-16 00:18:50,407:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-16 00:18:50,792:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-16 00:18:50,793:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-16 00:18:50,794:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-16 00:18:50,798:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:27 UTC. 2023-11-16 00:18:50,798:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-16 00:18:50,798:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-16 00:18:50,803:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-16 00:18:50,803:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-16 00:18:50,803:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-16 00:18:50,807:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-16 00:18:50,808:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-16 00:18:50,810:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-16 00:18:51,244:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-16 00:18:51,245:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:18:50 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "NDIP7mxcP_Y": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-16 00:18:51,246:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-16 00:18:54,907:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6835_key-certbot.pem 2023-11-16 00:18:58,238:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6833_csr-certbot.pem 2023-11-16 00:18:58,239:DEBUG:acme.client:Requesting fresh nonce 2023-11-16 00:18:58,239:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-16 00:18:58,383:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-16 00:18:58,384:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:18:57 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2xLQop3eMTNftN3wXvH6HevhuOeQyYqIcmKgvF-l6fZI7mHXfrI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-16 00:18:58,384:DEBUG:acme.client:Storing nonce: 2xLQop3eMTNftN3wXvH6HevhuOeQyYqIcmKgvF-l6fZI7mHXfrI 2023-11-16 00:18:58,384:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2023-11-16 00:18:58,390:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMnhMUW9wM2VNVE5mdE4zd1h2SDZIZXZodU9lUXlZcUljbUtndkYtbDZmWkk3bUhYZnJJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "i-h4stMl7RDpHMqpmSCBweGljnsEZOtcdlSP10SUd-SbU46_yuzU3TTgER0CsOOLi75pJL77-OF5_Aml4MPxjJGuYWjcO5jaH6QcAgPgZuZyz6C_EJzjaCxbYpDhJv3vl2sAUs8tAknsbyqh6-7_j3S-QbnQkxUXGn4LgX3TfIeR0lDlAALnlo-P2PmUQa-3Hp-xM8JLKUqitoK-Q9flMJYb9vQT5F6KiRkjJ3lbnzbaHSc--LPDlv2Cm8O2FiEAj2QaVxIVdf8Jdz7-NxAbB0psCCwQ2WsGERXxbYsIbfSpdlgQR8CNBVflcX8v6WvM9T4m3aTe0JIuwDz0ohoHFg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-16 00:18:58,555:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2023-11-16 00:18:58,556:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 15 Nov 2023 23:18:57 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054483926 Replay-Nonce: 2xLQop3eqYAqBPz4UqbsP4-iY1mgqbU5MuafaxlM7TLW9o27pUY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:23Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612503666" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054483926" } 2023-11-16 00:18:58,556:DEBUG:acme.client:Storing nonce: 2xLQop3eqYAqBPz4UqbsP4-iY1mgqbU5MuafaxlM7TLW9o27pUY 2023-11-16 00:18:58,556:DEBUG:acme.client:JWS payload: b'' 2023-11-16 00:18:58,561:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612503666: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMnhMUW9wM2VxWUFxQlB6NFVxYnNQNC1pWTFtZ3FiVTVNdWFmYXhsTTdUTFc5bzI3cFVZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI1MDM2NjYifQ", "signature": "dvLZWEh60t4U341_N7-3Bo4qC0zrQwXPvW4e7tYM3DcuferexsMUCbGaF8ZNf4iRN-pz7I967ldC_714meJODyRqXpkpEMCf59ghLacHmpnwIkIsLmqJfVz-EEjPmhWaUemAE3gFlFgfTuRul-KdFWfROTlE6OsgxTU41jtKkzr6v_HRMEbk6mHZjnZvR43k4x2Ce3cRiWVWdhgCcxjPHoSuq2CCFv6t5UD4OdwyuAoaFLTs6Vgbj8Ced7Mp981_1i0Q29qeRE-Ug-WPrxkp5MUEMULtLuvgYjz-09HDHvh9Lgl3NbfbLF1FoK2CfElVBcxejoZXpkg99ro7hRN0RA", "payload": "" } 2023-11-16 00:18:58,711:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612503666 HTTP/1.1" 200 809 2023-11-16 00:18:58,712:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:18:57 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2xLQop3eKdADqHiHrF5S1nffC9jDEkBTpkQ5SoovO2hPrY-VxRw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:23Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612503666/EfdATg", "token": "t3ldTTjSTD5p1ZXdigrc7Y9ujwScKzlEFH7-_2FHjZc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612503666/HlUCsw", "token": "t3ldTTjSTD5p1ZXdigrc7Y9ujwScKzlEFH7-_2FHjZc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612503666/hGYrLw", "token": "t3ldTTjSTD5p1ZXdigrc7Y9ujwScKzlEFH7-_2FHjZc" } ] } 2023-11-16 00:18:58,712:DEBUG:acme.client:Storing nonce: 2xLQop3eKdADqHiHrF5S1nffC9jDEkBTpkQ5SoovO2hPrY-VxRw 2023-11-16 00:18:58,713:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-16 00:18:58,713:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2023-11-16 00:18:58,714:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-16 00:18:58,715:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-16 00:18:58,717:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-16 00:18:58,717:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-16 00:18:58,717:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-16 00:18:58,718:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-16 00:18:58,719:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-16 00:18:58,772:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-16 00:18:59,156:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-16 00:18:59,157:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-16 00:18:59,158:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-16 00:18:59,162:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:41 UTC. 2023-11-16 00:18:59,162:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-16 00:18:59,162:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-16 00:18:59,167:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-16 00:18:59,167:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-16 00:18:59,167:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-16 00:18:59,172:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-16 00:18:59,172:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-16 00:18:59,174:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-16 00:18:59,688:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-16 00:18:59,689:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:18:58 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "jY0KuJpAQKs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-16 00:18:59,689:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-16 00:19:03,507:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6836_key-certbot.pem 2023-11-16 00:19:06,843:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6834_csr-certbot.pem 2023-11-16 00:19:06,844:DEBUG:acme.client:Requesting fresh nonce 2023-11-16 00:19:06,844:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-16 00:19:07,015:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-16 00:19:07,016:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:19:06 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: GEqhmX18L7guFcYSnefAw71MjxHUHRn-gGqgg31t9VNYLXwEEMI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-16 00:19:07,016:DEBUG:acme.client:Storing nonce: GEqhmX18L7guFcYSnefAw71MjxHUHRn-gGqgg31t9VNYLXwEEMI 2023-11-16 00:19:07,017:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2023-11-16 00:19:07,022:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiR0VxaG1YMThMN2d1RmNZU25lZkF3NzFNanhIVUhSbi1nR3FnZzMxdDlWTllMWHdFRU1JIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "fUlwnISac8KIHmq2TOlKqAxx7PbRcVod2Rvuc1YLZEUgj_lyTCJKIUcdHanyd7q0mMH1kShywpkHYEoQH2B6NkOARuZuyPPEkXdYGOd5Xf2tBPMasiTO31h3r1eln6baZy3B23EdbMCgypsbJzS93LuSUfzVM6dGdYXD0jyKdLGJ5789zmT_52-PemPp_G1a2sKDOWDwb5shbUFsYdWdUeugWO9DTFWoOEd5KUijz3Wu7DnIGFbBA0IKKLiVTfI-KexKNFECJOl942pJCJ1H-sE8rhNtF6aWwZy8ssDepOGtR5NBGAO1SbR-0KgcwDcPTvaWl7A8TS-M23SGnonoAw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-16 00:19:07,209:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2023-11-16 00:19:07,210:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 15 Nov 2023 23:19:06 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054508996 Replay-Nonce: GEqhmX18OzdgceOkw7rCaSgZW2FYTAzkoDv_tumiR3Q6CHyzibg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:32Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612537686" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054508996" } 2023-11-16 00:19:07,211:DEBUG:acme.client:Storing nonce: GEqhmX18OzdgceOkw7rCaSgZW2FYTAzkoDv_tumiR3Q6CHyzibg 2023-11-16 00:19:07,211:DEBUG:acme.client:JWS payload: b'' 2023-11-16 00:19:07,218:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612537686: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiR0VxaG1YMThPemRnY2VPa3c3ckNhU2daVzJGWVRBemtvRHZfdHVtaVIzUTZDSHl6aWJnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI1Mzc2ODYifQ", "signature": "jjjiWugV_XkgnHgXpK1C_yH3YkWIHAvd_QoNw53NxUw19rYX3HgpVNgHy7BA_N7ymECQ_v4AY5plKkHdKA5A99VFPlIARz2KP3dMvgVXFyKWBvoiSkl79XU5mvU1wQ2_Qkr1zAMDJ7E6iu-Flema2Dz27tAto-ymFzG9SPf2tVXZ-HIluopxIxPJRm6TdTNjEeG3vX9qk_hYXOsBnzA2WJcXK7tEKum9aEEHKUeziQhuviVRHF9dKwTwxh9uwjkCfgLZ3nQTtF1MO1cl1qTGLlyIqiO_P6JYQ9ERo0rbL9RRcvluMhmgRqPDX0EHgFahKZAaQoZ14Tq085qvZSxysg", "payload": "" } 2023-11-16 00:19:07,393:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612537686 HTTP/1.1" 200 806 2023-11-16 00:19:07,394:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:19:06 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: GEqhmX18aHv99zUGMAARIbuYQZIFsVEz7UkDJslf14vdK6NLvR8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:32Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612537686/EQ01mA", "token": "Ljm0jeSPr8yxmsFdnztDCFHUg_abiozhTXTTTEUuJuY" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612537686/E16lcw", "token": "Ljm0jeSPr8yxmsFdnztDCFHUg_abiozhTXTTTEUuJuY" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612537686/vtzF_w", "token": "Ljm0jeSPr8yxmsFdnztDCFHUg_abiozhTXTTTEUuJuY" } ] } 2023-11-16 00:19:07,394:DEBUG:acme.client:Storing nonce: GEqhmX18aHv99zUGMAARIbuYQZIFsVEz7UkDJslf14vdK6NLvR8 2023-11-16 00:19:07,395:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-16 00:19:07,395:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2023-11-16 00:19:07,395:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-16 00:19:07,396:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-16 00:19:07,396:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-16 00:19:07,396:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-16 00:19:07,396:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-16 00:19:07,397:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-16 00:19:07,398:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-16 00:19:07,442:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2023-11-16 00:19:07,442:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-16 00:19:07,443:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2023-11-16 00:19:07,453:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2023-11-16 00:19:07,455:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2023-11-16 00:19:07,455:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2023-11-16 00:19:07,455:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2023-11-16 00:19:07,455:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2023-11-16 00:19:07,457:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2023-11-16 00:19:07,493:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-16 00:19:07,914:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-16 00:19:07,916:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-16 00:19:07,917:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-16 00:19:07,921:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:29:56 UTC. 2023-11-16 00:19:07,921:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-16 00:19:07,921:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-16 00:19:07,926:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-16 00:19:07,926:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-16 00:19:07,926:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-16 00:19:07,930:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-16 00:19:07,931:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-16 00:19:07,933:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-16 00:19:08,377:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-16 00:19:08,377:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:19:07 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "aUBZ1HoFxNg": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-16 00:19:08,378:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-16 00:19:12,271:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6837_key-certbot.pem 2023-11-16 00:19:15,626:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6835_csr-certbot.pem 2023-11-16 00:19:15,627:DEBUG:acme.client:Requesting fresh nonce 2023-11-16 00:19:15,627:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-16 00:19:15,774:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-16 00:19:15,774:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:19:15 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2xLQop3eMEhYxRjxo4_1puL1k964Mzy-dlVUHA3DjmcPkjTImeA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-16 00:19:15,775:DEBUG:acme.client:Storing nonce: 2xLQop3eMEhYxRjxo4_1puL1k964Mzy-dlVUHA3DjmcPkjTImeA 2023-11-16 00:19:15,775:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2023-11-16 00:19:15,780:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMnhMUW9wM2VNRWhZeFJqeG80XzFwdUwxazk2NE16eS1kbFZVSEEzRGptY1BralRJbWVBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "pdxrLoeBRkU6uTzsJh9rHI6m9YZn4RLPMKG2ou4XOHloFBc1XqV4ix2uZwxa77YnS-9vYbdSed6M4MQ6qYj3yqvHgihsklRTBSG32-GY6l2pzjhCvRNIi0_X6L8iM0koAgEHiNarGSfrsZNCx3-ioUpVDMj6Lgmyl-2ObV50z8v30xUm2eCbS8zyPbl17XrXqrGQdRGTT2WiroOdCefMwL8K-ox7y61jAcCsa-QlrS-KeI3OODg1LRNkhEmDaVgBl-ne3yOsnH9mjGI4LZK8I1z2HTq-emDT4NLwFg9mGSreZ5upiTcQdc2a70_R7q6ewCWPBgTCOjMJRwGzoNmIDA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-16 00:19:15,955:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2023-11-16 00:19:15,956:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 15 Nov 2023 23:19:15 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054534246 Replay-Nonce: 4JwdIh9Vrk-IE7kPvA2smUJY0ogZFR9UksgQ_Am7HYnYhinBxms X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:42Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612574526" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054534246" } 2023-11-16 00:19:15,956:DEBUG:acme.client:Storing nonce: 4JwdIh9Vrk-IE7kPvA2smUJY0ogZFR9UksgQ_Am7HYnYhinBxms 2023-11-16 00:19:15,957:DEBUG:acme.client:JWS payload: b'' 2023-11-16 00:19:15,963:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612574526: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNEp3ZEloOVZyay1JRTdrUHZBMnNtVUpZMG9nWkZSOVVrc2dRX0FtN0hZblloaW5CeG1zIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI1NzQ1MjYifQ", "signature": "MyxnztjITzfupnWSHRXPPoZiyfke0LLwccNKk5_YPy1YdUDv6HmTyNpP42dDDkOyEx8q7W3iQkcBOp9GbVc5IHSZhEFA1HEcA-099OGNtgvlSGsg1HN8rzJgu4HAcLho4LsZ3qGXfHRCEhSPJ1LPS-iBFKQO4hEvXjEbWfBJLQiIVY-CKs6Y917-GTDWaVceTNooEjYPc7EYkL3p4RdBJL1AOevLf-T4b-RUXPoncC5qEZQeEfJM3D4tKpmxIfFuG5ho84sCguIzX-KAc445iCy56-SQCOMO_frRB2S_AD2JNQnFRXLBu91Q7UgTLf8E5wykKf0_G9YouFWLAN3RCw", "payload": "" } 2023-11-16 00:19:16,115:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612574526 HTTP/1.1" 200 811 2023-11-16 00:19:16,116:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:19:15 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2xLQop3eEiFUP6Zj4cjtbbGaS_hXYYubiLhZKz6CAgsIKgrDvlo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:42Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612574526/5letZQ", "token": "BHBPORVyrUrsGlhEnIrTc6lFdf8IW61JSn4cYnoDYfc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612574526/8PjU2A", "token": "BHBPORVyrUrsGlhEnIrTc6lFdf8IW61JSn4cYnoDYfc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612574526/O6CYAw", "token": "BHBPORVyrUrsGlhEnIrTc6lFdf8IW61JSn4cYnoDYfc" } ] } 2023-11-16 00:19:16,116:DEBUG:acme.client:Storing nonce: 2xLQop3eEiFUP6Zj4cjtbbGaS_hXYYubiLhZKz6CAgsIKgrDvlo 2023-11-16 00:19:16,117:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-16 00:19:16,117:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2023-11-16 00:19:16,118:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-16 00:19:16,118:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-16 00:19:16,119:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-16 00:19:16,119:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-16 00:19:16,120:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-16 00:19:16,120:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-16 00:19:16,121:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-16 00:19:16,170:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-16 00:19:16,380:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-16 00:19:16,381:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-16 00:19:16,382:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-16 00:19:16,386:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:09 UTC. 2023-11-16 00:19:16,386:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-16 00:19:16,386:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-16 00:19:16,391:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-16 00:19:16,391:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-16 00:19:16,391:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-16 00:19:16,395:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-16 00:19:16,395:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-16 00:19:16,397:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-16 00:19:16,830:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-16 00:19:16,830:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:19:16 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "ooiis5rOqIk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-16 00:19:16,831:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-16 00:19:20,339:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6838_key-certbot.pem 2023-11-16 00:19:23,693:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6836_csr-certbot.pem 2023-11-16 00:19:23,693:DEBUG:acme.client:Requesting fresh nonce 2023-11-16 00:19:23,693:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-16 00:19:23,837:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-16 00:19:23,837:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:19:23 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2xLQop3eIzjJ4uMTfMs6VYxenP6xX6x3q8oqo_zgeDuLW3Qurc8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-16 00:19:23,838:DEBUG:acme.client:Storing nonce: 2xLQop3eIzjJ4uMTfMs6VYxenP6xX6x3q8oqo_zgeDuLW3Qurc8 2023-11-16 00:19:23,838:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2023-11-16 00:19:23,844:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMnhMUW9wM2VJempKNHVNVGZNczZWWXhlblA2eFg2eDNxOG9xb196Z2VEdUxXM1F1cmM4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "mNHnvMYqq6PhTK0AcnitZmLY17zFSSgLv_C_OQlJqjPPcLg-6_bRQAPJly7xSAKE9rf0FVPUA17ycduqARKR_irmLTiXuupFDIKVZ2Q_E8HZ8yBDu2qkTkN4B0h3L9CVT5siJYUINIr5MSRHyCsFFhbNNycDVGCvQGuOfUFNOhJibNbj-qlQbALbbOGO0u3wad9V0CnisazlbGTSEdKcUuDsxeOuWsA5vhH_gOFbF7_9CJ48mY_8mTFddKljbXNiA0bKrWTSr3vF7yuvdMehFdTkaKOW-f6vAeMLo_mS5Dc5rzoGAFeNBMylgavwF-oA9y32oS81Rxhpy0S13NSlVg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2023-11-16 00:19:24,254:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2023-11-16 00:19:24,255:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 15 Nov 2023 23:19:23 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054557496 Replay-Nonce: 2xLQop3eoEoD3pc5CrIA70Vh808q6A1M51u0pHDQZmlLdI45-U8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:41:51Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612606006" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054557496" } 2023-11-16 00:19:24,255:DEBUG:acme.client:Storing nonce: 2xLQop3eoEoD3pc5CrIA70Vh808q6A1M51u0pHDQZmlLdI45-U8 2023-11-16 00:19:24,256:DEBUG:acme.client:JWS payload: b'' 2023-11-16 00:19:24,263:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612606006: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMnhMUW9wM2VvRW9EM3BjNUNySUE3MFZoODA4cTZBMU01MXUwcEhEUVptbExkSTQ1LVU4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI2MDYwMDYifQ", "signature": "vh6O7AnHhMEaotNiX7-D7J1hLoMmCUv7BzxYTbQf95TwosSIRujGMxLqSpQio5N9pMH5gtTT3s7NN1uZAWrQjfKS6Rz5CQAm2SBLxXC22mzW-mzgclPCG1v3oNiuNU_gruWRP7PAd1QmDeUoz-13q8rvgK-Q0QaDKb8fOEswXvvjEw1lKgAKsMNDgUbqLt8372uq0VT0nzWofcnmTgjoMFPQ8Fas8GVbf0Q30fOSj9toGkKUdZA7G6hjYijapcWBqe2V2Kv0Pw0pM-tfs5FIxsbpbhLSI0mWMVvqNOddTrUUUjj7Sp-WZQf1gpxc2xYzjt4t4ae4qKPqsKwsGyMZcg", "payload": "" } 2023-11-16 00:19:24,412:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612606006 HTTP/1.1" 200 810 2023-11-16 00:19:24,413:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:19:23 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2xLQop3eE82fZYAO3oeAu1Uh7USsrliZxPt4l4Zj9WZqvwrdMHA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:41:51Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612606006/8R9vlA", "token": "srB66M3oeWbzzvIHjdwngsK6CxnDqV_EXeQJth9kWQ4" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612606006/fgtMqQ", "token": "srB66M3oeWbzzvIHjdwngsK6CxnDqV_EXeQJth9kWQ4" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612606006/kOODDA", "token": "srB66M3oeWbzzvIHjdwngsK6CxnDqV_EXeQJth9kWQ4" } ] } 2023-11-16 00:19:24,413:DEBUG:acme.client:Storing nonce: 2xLQop3eE82fZYAO3oeAu1Uh7USsrliZxPt4l4Zj9WZqvwrdMHA 2023-11-16 00:19:24,413:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-16 00:19:24,414:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2023-11-16 00:19:24,414:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-16 00:19:24,415:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-16 00:19:24,415:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-16 00:19:24,415:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-16 00:19:24,416:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-16 00:19:24,416:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-16 00:19:24,417:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-16 00:19:24,468:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-16 00:19:24,710:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-16 00:19:24,711:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is signed by the certificate's issuer. 2023-11-16 00:19:24,712:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert12.pem is: OCSPCertStatus.GOOD 2023-11-16 00:19:24,716:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:22 UTC. 2023-11-16 00:19:24,716:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-16 00:19:24,716:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-16 00:19:24,721:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-16 00:19:24,721:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-16 00:19:24,721:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-16 00:19:24,725:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-16 00:19:24,726:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-16 00:19:24,728:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-16 00:19:25,175:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-16 00:19:25,176:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:19:24 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "GMtgnCBa4WY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-16 00:19:25,176:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-16 00:19:28,780:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6839_key-certbot.pem 2023-11-16 00:19:32,177:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6837_csr-certbot.pem 2023-11-16 00:19:32,178:DEBUG:acme.client:Requesting fresh nonce 2023-11-16 00:19:32,178:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-16 00:19:32,328:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-16 00:19:32,329:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:19:31 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 4JwdIh9VEUhfo7Ek5DTCzMfc6vCSSR3p41rgqrE2gSXQnTB9y-M X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-16 00:19:32,329:DEBUG:acme.client:Storing nonce: 4JwdIh9VEUhfo7Ek5DTCzMfc6vCSSR3p41rgqrE2gSXQnTB9y-M 2023-11-16 00:19:32,329:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2023-11-16 00:19:32,336:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNEp3ZEloOVZFVWhmbzdFazVEVEN6TWZjNnZDU1NSM3A0MXJncXJFMmdTWFFuVEI5eS1NIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "Or_IubuIsw9Qj0aV1lmg7JH3IWARzN-VlvbDi0EsvPSwL-hxP52kqEnvOq0xtTViWcUr6-S-QBjqG_S-H8lTrx6OgkDysMBBa9aHA5HzfVhc6d4PNLZecPyefOuRG_cgPrPPENXMiRbaIP6S-nSHYHHFFjOrvBlpp_Khb5Ad-6F0QeqwMrwRhNFDBMLNgdq1RX0_FUQfEomZz3VssK7vgqnwzR6pUiQuxmURzK-GxZTIzD2mN18j4HSJcv5Hw0R0GyzEdCjitM823LMMPp_bw0_XwcY2aGEZjt_YsTonqsIRo4ZbBzrwL8eQSgGDwblknTWDf4oTrPBDeIVs-sf2DA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2023-11-16 00:19:32,527:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2023-11-16 00:19:32,529:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 15 Nov 2023 23:19:31 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054581526 Replay-Nonce: 2xLQop3e4MadYeHjpjpRjWCeoUple0xUJZkp4QFOvaBmS6jK_oM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:42:01Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612638726" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054581526" } 2023-11-16 00:19:32,529:DEBUG:acme.client:Storing nonce: 2xLQop3e4MadYeHjpjpRjWCeoUple0xUJZkp4QFOvaBmS6jK_oM 2023-11-16 00:19:32,530:DEBUG:acme.client:JWS payload: b'' 2023-11-16 00:19:32,537:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612638726: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMnhMUW9wM2U0TWFkWWVIanBqcFJqV0Nlb1VwbGUweFVKWmtwNFFGT3ZhQm1TNmpLX29NIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI2Mzg3MjYifQ", "signature": "AAmQaUzZhtEQXoMrji10kg5TuXLfzVfriWsap-dwOgGZ4iErkVZBx-1XHs1bLhX-HNhlK3XlXMgQUioqd7PwHgnRLx8_iMP6jCD-T558NGcJ_7TVKHYb_GhGdsrl2v7Zssvyjj3d82xShJfLhxuSdBAOM9zkHWesJA2c9QN7mel50gVzcA--4b0drhl3ckqoN_EvlXI-UcW2pxn9MDgeEVgwPY0Jer1aIeNnDDKzyxxHpy_wvKT3JCXZLpb0ClMFhlwWbH8YEwf2J511BHWR0tgERN7pqD0QiX_ns9BulmfSFse0m-sKHaBtONDB9GDonXuiAB7GLmqrC7eCPxi6Xw", "payload": "" } 2023-11-16 00:19:32,695:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612638726 HTTP/1.1" 200 809 2023-11-16 00:19:32,696:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:19:31 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2xLQop3eUjiev_MRuI5MQZYSUbd8aXotlqhAarK8u39ZKkqU-_E X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:42:01Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612638726/NNBnvg", "token": "YtLscuYTUghWYv3C17nxbU_cYAHfqS3iJAb6EzBv31Y" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612638726/Mo2Oxw", "token": "YtLscuYTUghWYv3C17nxbU_cYAHfqS3iJAb6EzBv31Y" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612638726/wNN3rQ", "token": "YtLscuYTUghWYv3C17nxbU_cYAHfqS3iJAb6EzBv31Y" } ] } 2023-11-16 00:19:32,696:DEBUG:acme.client:Storing nonce: 2xLQop3eUjiev_MRuI5MQZYSUbd8aXotlqhAarK8u39ZKkqU-_E 2023-11-16 00:19:32,697:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-16 00:19:32,697:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2023-11-16 00:19:32,698:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-16 00:19:32,698:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-16 00:19:32,699:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-16 00:19:32,699:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-16 00:19:32,699:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-16 00:19:32,700:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-16 00:19:32,701:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-16 00:19:32,737:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-16 00:19:32,962:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-16 00:19:32,963:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2023-11-16 00:19:32,964:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2023-11-16 00:19:32,968:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:34 UTC. 2023-11-16 00:19:32,968:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-16 00:19:32,968:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-16 00:19:32,973:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-16 00:19:32,973:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-16 00:19:32,973:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-16 00:19:32,978:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-16 00:19:32,978:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-16 00:19:32,980:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-16 00:19:33,486:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-16 00:19:33,487:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:19:32 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "ZCat-nVWO-Y": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-16 00:19:33,488:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-16 00:19:37,407:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6840_key-certbot.pem 2023-11-16 00:19:40,780:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6838_csr-certbot.pem 2023-11-16 00:19:40,781:DEBUG:acme.client:Requesting fresh nonce 2023-11-16 00:19:40,781:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-16 00:19:40,949:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-16 00:19:40,950:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:19:40 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: fTELRHZhRdng79VoheeytHoTUlfzn1rp6dyrRerqrejj16SDeAs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-16 00:19:40,950:DEBUG:acme.client:Storing nonce: fTELRHZhRdng79VoheeytHoTUlfzn1rp6dyrRerqrejj16SDeAs 2023-11-16 00:19:40,951:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2023-11-16 00:19:40,964:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZlRFTFJIWmhSZG5nNzlWb2hlZXl0SG9UVWxmem4xcnA2ZHlyUmVycXJlamoxNlNEZUFzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "nXkmY_5SrqL7vt4m7bIg4AIfLTm8RznLUi4gxoboliq6jTMyvyxv3uHQi0kncMwji-TucKMD9u4bNxaD3gLtXzdo2YMvpTP01nLq3X6bdIr7onc-K3X-boH6Aa-sdqrUraSDCNx9-rMolgZdRbPu0RgtgwigLM2q2sBJJWRxahuWrTIXLt47MpaAdrOIJmLLwyUemFPcAt1W8tn6xcqo_7Hws8cdM01zj-gB1m57GfA11e4SPKZSGFJhH3ZjhAfmpPjulwFKaFSOOTU6Leq6o20XsUSpqme3uhGBI8XizPJPmKUfqg9uNaLCn_2CWeIQ3RNLAW4z9IhRS8JNbW-mHA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-16 00:19:41,157:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-16 00:19:41,158:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 15 Nov 2023 23:19:40 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054620886 Replay-Nonce: fTELRHZhARWj1gCtO3WmboJW95AeJxCOGZIJZNmLX_OexT5rYQg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:42:10Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612689796" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054620886" } 2023-11-16 00:19:41,158:DEBUG:acme.client:Storing nonce: fTELRHZhARWj1gCtO3WmboJW95AeJxCOGZIJZNmLX_OexT5rYQg 2023-11-16 00:19:41,158:DEBUG:acme.client:JWS payload: b'' 2023-11-16 00:19:41,164:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612689796: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZlRFTFJIWmhBUldqMWdDdE8zV21ib0pXOTVBZUp4Q09HWklKWk5tTFhfT2V4VDVyWVFnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI2ODk3OTYifQ", "signature": "u8kx3Q2PNpi8fFvLh8X2yBRAVC4boi6uxXUI8-yUobt9R9NRHKDw1UeqErpN_s640eyB_x75WbY8ZYhIS9kNYz4hpU6ZQu-oqYeow5cEzmpqARPKsQg76dQ3X0GlBo61ornPVGAF4c9xCQPPYDG6w9g76uJBaYUjBi0Zcm9IwyscH7XNf_KnxAxXMv55B-hwtSNhhNdLMsKiYp_fmttpGq3PAPnaZRTb_vlSX4EYC71F89gU6mvcs2dRgVgOS_WNE-SU5Hx9RNDmdyyzWsh-BmDl1M9yDwdRbVJqcZS_4OHAEGfbe0HQeBYrkeVohm1jZZ4uPuFSxOHKOzXIuctPmQ", "payload": "" } 2023-11-16 00:19:41,336:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612689796 HTTP/1.1" 200 805 2023-11-16 00:19:41,337:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:19:40 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: GEqhmX18k3R3aehodPws7RzHxexJkhTTymcs4vAcJU23S8sUW_I X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:42:10Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612689796/q81CXQ", "token": "dD3h4qBbL0oo-gEVD5KIIoE28_8_ZHTsPoThE2SmgpA" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612689796/RA9KcA", "token": "dD3h4qBbL0oo-gEVD5KIIoE28_8_ZHTsPoThE2SmgpA" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612689796/phjqOQ", "token": "dD3h4qBbL0oo-gEVD5KIIoE28_8_ZHTsPoThE2SmgpA" } ] } 2023-11-16 00:19:41,337:DEBUG:acme.client:Storing nonce: GEqhmX18k3R3aehodPws7RzHxexJkhTTymcs4vAcJU23S8sUW_I 2023-11-16 00:19:41,338:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-16 00:19:41,338:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2023-11-16 00:19:41,338:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-16 00:19:41,339:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-16 00:19:41,339:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-16 00:19:41,340:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-16 00:19:41,340:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-16 00:19:41,340:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-16 00:19:41,341:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-16 00:19:41,387:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-16 00:19:41,771:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-16 00:19:41,772:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2023-11-16 00:19:41,773:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2023-11-16 00:19:41,777:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:30:48 UTC. 2023-11-16 00:19:41,778:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-16 00:19:41,778:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-16 00:19:41,782:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-16 00:19:41,783:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-16 00:19:41,783:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-16 00:19:41,787:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-16 00:19:41,788:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-16 00:19:41,789:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-16 00:19:42,210:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-16 00:19:42,211:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:19:41 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "jGfXhlAhb8s": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-16 00:19:42,212:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-16 00:19:45,749:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6841_key-certbot.pem 2023-11-16 00:19:49,146:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6839_csr-certbot.pem 2023-11-16 00:19:49,146:DEBUG:acme.client:Requesting fresh nonce 2023-11-16 00:19:49,147:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-16 00:19:49,288:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-16 00:19:49,288:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:19:48 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2xLQop3eBbih8Pt1GTYW4hqA8U7K8V9DRuPn52A1rcvxXUCGyMY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-16 00:19:49,289:DEBUG:acme.client:Storing nonce: 2xLQop3eBbih8Pt1GTYW4hqA8U7K8V9DRuPn52A1rcvxXUCGyMY 2023-11-16 00:19:49,289:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2023-11-16 00:19:49,295:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiMnhMUW9wM2VCYmloOFB0MUdUWVc0aHFBOFU3SzhWOURSdVBuNTJBMXJjdnhYVUNHeU1ZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "h3a3eQMaxFKVhavfwQAAx07EDUDG5dJroPPXnNKTxv9j4SZXGj4uCLeqbb9HW1XAw6qTLYt69e5mCBWe0n1HCp2HXu_k7_onLkdYm2RgdYjTEE43NR1_mvLI-c7vorUgQQXdGc7TgX3vxOZooRi7hHxYZ6RpdOsgHPIHLhjCHbKdUYw2rLT1XnmlSAIegRSRnwOUJ99Zs6WhaK95evq5plt1MvPOcJqvicxXDRqjeZcdfM89TRpCxApk2WkmrjX4uNPjZftL49F_NP64dOyzyZhXHGIW3kqD6Ve8WGHrovRy1J0OGZO90REOzI0QMeWYs0KR0-j-DoI4Q9Bgsh0yNA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-16 00:19:49,451:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-16 00:19:49,452:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 15 Nov 2023 23:19:48 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054650586 Replay-Nonce: 4JwdIh9VRAsS-ZJCLLV_94At_Vd2Y0nq5cq733Kwq6e46Jk9RzI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:42:20Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612731716" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054650586" } 2023-11-16 00:19:49,452:DEBUG:acme.client:Storing nonce: 4JwdIh9VRAsS-ZJCLLV_94At_Vd2Y0nq5cq733Kwq6e46Jk9RzI 2023-11-16 00:19:49,453:DEBUG:acme.client:JWS payload: b'' 2023-11-16 00:19:49,458:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612731716: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiNEp3ZEloOVZSQXNTLVpKQ0xMVl85NEF0X1ZkMlkwbnE1Y3E3MzNLd3E2ZTQ2Sms5UnpJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI3MzE3MTYifQ", "signature": "KM4FN04xSX8OhlQWUIHjckkR-fQi7U-vQGTwT-ksnVrQrqqTInpXw-I84V_kUSeoOK-t77BgWlLXGSPPMlnSJrE9c4NB7wleGHrRQJcfb512r5SAViiJ058kQIHGcVeCb0v20BcNCnBKxARbqYXy_hfwWFumh6n2ioXjoElQJS515mkpPey7QGDDvNbZMjeHNNPu9ucBIdkN3FDkleb73hJ0QqTgXq_oxpND17vRqyAgmOJBG-YsXObI6OQgJ9Si-erJ5JfJA4y_Ip47PeaLwwEQavn8yF9H2FnddnBaPe3CQ0zcrw-VVWpFmU7NnAF3bCTox9wT1AtBFCHjSNY5Uw", "payload": "" } 2023-11-16 00:19:49,602:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612731716 HTTP/1.1" 200 805 2023-11-16 00:19:49,603:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:19:48 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 2xLQop3ee_kuCcGkX3Ysm12C6wKt_vS9yf5TPcfjU3gzcRmQzjY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:42:20Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612731716/vs9hIA", "token": "6C6a5wxSVRoWYNwzinMlWR0pwxBViZEyUzdFtpz8okw" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612731716/C3Z5fA", "token": "6C6a5wxSVRoWYNwzinMlWR0pwxBViZEyUzdFtpz8okw" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612731716/Qu4skQ", "token": "6C6a5wxSVRoWYNwzinMlWR0pwxBViZEyUzdFtpz8okw" } ] } 2023-11-16 00:19:49,603:DEBUG:acme.client:Storing nonce: 2xLQop3ee_kuCcGkX3Ysm12C6wKt_vS9yf5TPcfjU3gzcRmQzjY 2023-11-16 00:19:49,604:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-16 00:19:49,604:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2023-11-16 00:19:49,605:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-16 00:19:49,605:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-16 00:19:49,606:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-16 00:19:49,606:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-16 00:19:49,606:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-16 00:19:49,607:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-16 00:19:49,608:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-16 00:19:49,645:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2023-11-16 00:19:49,905:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2023-11-16 00:19:49,906:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2023-11-16 00:19:49,907:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2023-11-16 00:19:49,910:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-12-13 20:31:01 UTC. 2023-11-16 00:19:49,910:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2023-11-16 00:19:49,911:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2023-11-16 00:19:49,915:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: Prep: True 2023-11-16 00:19:49,915:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2023-11-16 00:19:49,915:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2023-11-16 00:19:49,919:DEBUG:certbot._internal.main:Picked account: ), creation_host='SERWER', register_to_eff=None))> 2023-11-16 00:19:49,920:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2023-11-16 00:19:49,921:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2023-11-16 00:19:50,443:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 752 2023-11-16 00:19:50,444:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:19:49 GMT Content-Type: application/json Content-Length: 752 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "ZafTmxDc-7U": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-01/renewalInfo/", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2023-11-16 00:19:50,444:INFO:certbot._internal.main:Renewing an existing certificate 2023-11-16 00:19:53,869:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\6842_key-certbot.pem 2023-11-16 00:19:57,220:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\6840_csr-certbot.pem 2023-11-16 00:19:57,221:DEBUG:acme.client:Requesting fresh nonce 2023-11-16 00:19:57,221:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2023-11-16 00:19:57,395:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2023-11-16 00:19:57,396:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:19:56 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: GEqhmX18KMCkGUKdS_zEIvgW6wuBG57M7y4YQMwxDJUUda3zdRI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2023-11-16 00:19:57,396:DEBUG:acme.client:Storing nonce: GEqhmX18KMCkGUKdS_zEIvgW6wuBG57M7y4YQMwxDJUUda3zdRI 2023-11-16 00:19:57,396:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2023-11-16 00:19:57,404:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiR0VxaG1YMThLTUNrR1VLZFNfekVJdmdXNnd1Qkc1N003eTRZUU13eERKVVVkYTN6ZFJJIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "kOSUESEUCbBTNFXJiTqVWta5JHtP10y1dmq6l6YPKmpf3OjH18IUMGJhS2k373bGxWFJGjFE_Xs6Wt9ijmTx82v9YxOBqFJJ62W7_JC3VVmHsO-sy1IT7EVYmkSr8_BJplwiaxq8jVUlmKdlH12jN9cU3fb8tY32mgozhiXzJFKTFPIShu5qKxynAM6zBoePuIf5rpzyuhSwSx0c-RRBEOGGZ3ChgveCuZaXYFkxZHUuJoY5k3f2DdLPrt193ZzN2TdEZAzrqUDUxtIg-7hFi_rZye986HuSOEw_O_1_B-LYZCBpFDPbvPhmc4P29cM0FKVwEk8hNX9VsG3gZRAfOg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2023-11-16 00:19:57,601:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2023-11-16 00:19:57,602:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 15 Nov 2023 23:19:56 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/222054677986 Replay-Nonce: fTELRHZhDUpXwxHU-G8ieKnlog5HT-veKgtWaxL5WtxrM2GNWJA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2023-11-21T03:42:29Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612771016" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/222054677986" } 2023-11-16 00:19:57,602:DEBUG:acme.client:Storing nonce: fTELRHZhDUpXwxHU-G8ieKnlog5HT-veKgtWaxL5WtxrM2GNWJA 2023-11-16 00:19:57,603:DEBUG:acme.client:JWS payload: b'' 2023-11-16 00:19:57,608:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/283612771016: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZlRFTFJIWmhEVXBYd3hIVS1HOGllS25sb2c1SFQtdmVLZ3RXYXhMNVd0eHJNMkdOV0pBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8yODM2MTI3NzEwMTYifQ", "signature": "ysrcl1k4L4a-S8CP68PP87PhoL_G7kCP5jWAoSoIja8Oyy2eZ6pWqetxoTjSWBgygruX2r8624xpgipmqv3QJDQsAX-W7W-uyZB7VojxDqqZx2sLV78P_6HdwT_1JiRprochnxNLe6JGnXuzS0v7hYwtY6AJTgz8oqjaeymgDnCmGtsdvh_o7hqrralKey2efvlZubwMYqFAhSlU5x0fvXks8psr6koqxwb8RHCgcGBUkZanpv30me_2TTzoLm1XhBLqRu0l1ebUplu5UkSFRJe4rMDLYbEZ6oP8NfE3hWf2y172g3oh_HTrfYxu4h0ltqNoV2xiVyNNy1RKyUPMCQ", "payload": "" } 2023-11-16 00:19:57,785:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/283612771016 HTTP/1.1" 200 805 2023-11-16 00:19:57,786:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 15 Nov 2023 23:19:57 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: GEqhmX18ginbVQUO7p0ZUUleFt2wiGprahgSIbvVzq6dLAuCc84 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2023-11-21T03:42:29Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612771016/NXssXA", "token": "fBQUbQwPgLxd5Q_xY3yj1324L93-p0HcHbbwXfA2ky8" }, { "type": "dns-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612771016/srEC8w", "token": "fBQUbQwPgLxd5Q_xY3yj1324L93-p0HcHbbwXfA2ky8" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/283612771016/pqGTdw", "token": "fBQUbQwPgLxd5Q_xY3yj1324L93-p0HcHbbwXfA2ky8" } ] } 2023-11-16 00:19:57,786:DEBUG:acme.client:Storing nonce: GEqhmX18ginbVQUO7p0ZUUleFt2wiGprahgSIbvVzq6dLAuCc84 2023-11-16 00:19:57,786:INFO:certbot._internal.auth_handler:Performing the following challenges: 2023-11-16 00:19:57,787:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2023-11-16 00:19:57,787:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2023-11-16 00:19:57,787:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2023-11-16 00:19:57,788:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-16 00:19:57,788:DEBUG:certbot._internal.error_handler:Calling registered functions 2023-11-16 00:19:57,788:INFO:certbot._internal.auth_handler:Cleaning up challenges 2023-11-16 00:19:57,788:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2023-11-16 00:19:57,790:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2023-11-16 00:19:57,790:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2023-11-16 00:19:57,790:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2023-11-16 00:19:57,791:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2023-11-16 00:19:57,792:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)